Re-secure your passwords!
In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses, federal agencies, and academic institutions. Now retired, the author admits that his document was misguided. Find out why and what great passwords are made of.
The problem
The issue isn’t necessarily that NIST advised people to create passwords that are easy to crack, but it did steer people into creating lazy passwords, using capitalisation, special characters, and numbers that are easy to predict, like “P@ssW0rd1.”
This may seem secure, but in reality, these strings of characters and numbers could easily be compromised by hackers using common algorithms.
To make matters worse, NIST also recommended that people change their passwords regularly, but did not define what it actually means to “change” them. Since people thought their passwords were already secure with special characters, most only added one number or symbol.
NIST essentially forced everyone, including you and your colleagues, to use passwords that are hard for humans to remember but easy for computers to guess.
The solution
One cartoonist pointed out just how ridiculous NIST’s best practices were when he revealed that a password like “Tr0ub4dor&3” could be cracked in only three days while a password like “correcthorsebatterystaple” would take about 550 years.
Simply put, passwords should be longer and include nonsensical phrases and English words that make it almost impossible for an automated system to make sense of.
Even better, you should enforce the following security solutions within your company:
Multi-factor Authentication - which only grants access after you have successfully presented several pieces of evidence
Single Sign-On - which allows users to securely access multiple accounts with one set of credentials
Account Monitoring Tools - which recognize suspicious activity and lock out hackers
When it comes to security, ignorance is the biggest threat. If you’d like to learn about what else you can do to fortify security, just give Multi IT a call on 011 435 0450.
VIEW MORE
Office 2019 is on its way
As a convenient cloud solution, Office 365 boasts nearly 30 million users. But that’s nothing compared to licensed versions of Microsoft’s productivity suite, which have more than one billion users. Office 2019 was announced in September and it will mean big changes for businesses that want simpler versions of Word, PowerPoint, Excel and more.
Microsoft Office 2019: release and features
For the past ten years, Microsoft has updated its suite of productivity software every three years. The current version is Office 2016, and in sticking with the schedule Office 2019 will be available for purchase at the end of next year. However, previews of the next version will become available several months before the final release.
According to Microsoft, the newest version of Office will include:
The usual Office applications (Word, Excel, PowerPoint, etc.)
Office server programs (Exchange, SharePoint and Skype for Business)
Security and IT management enhancements
Improved “inking” features for touchscreen usability
Streamlined data analysis features in Excel
New PowerPoint presentation features like Morph and Zoom
Office 2019 vs. Office 365
The biggest difference between Office 2019 and Office 365 will be price. For the former, users pay a one-time fee to acquire a software license. Once users have a license, they own that version of Office forever (although Microsoft will stop providing support 10 years after the product is released).
With Office 365, users pay a monthly subscription fee and can use applications as long as they don’t fall behind on the bill. Programs included in the Office suite can be accessed online or installed locally (as long as you connect to the internet at least once per month).
Thanks to cloud technology, Office 365 can be updated much more easily than other versions of Office. O365 users will probably have access to Office 2019 features around the same time as its release, possibly sooner.
Much like an O365 subscription, our managed IT services are charged based on a flat monthly rate. We can help your small- or medium-sized business enjoy all the benefits of the cloud. Just give Multi IT a call today on 011 435 0450.
VIEW MORE
5 Tricks to Avoid Downtime
“Penny wise, pound foolish.”
This British saying has endured through time because its wisdom holds true even today – particularly when it comes to technology. Nothing kills the bottom line like downtime. Often, downtime is easily prevented but, someone along the way decided to “save money” instead.
Like the business owner who hired his brother-in-law to manage the IT department of a multimillion dollar company well known for its customer service. It seemed like everything was going well: the IT support bill was low, and computers were running pretty well. Until ransomware hit the company. Not wanting to pay the ransom, they went to restore their backups only to find their systems had not been backed up in over 3 months!
At this point, many businesses would simply pay the ransom and get back to work. This company, however, didn’t want to spend the money, so they tried to restore their data without the backups… for two weeks.
Think about this. This company, well known for its customer service was down for two weeks. Recent studies show the average cost for downtime is $100,000 per hour. You can do the math. $100,000 x 80 hours! This figure doesn’t even include losses to business reputation and customer confidence. And you can be sure that those losses definitely occurred in this scenario.
Because most businesses can’t afford to be down for two weeks (or even two days!), we’ve put together these 5 tips to make sure you aren’t stuck in a penny-wise, pound-foolish situation.
1. Plan for business continuity/disaster recovery
You must have an effective backup and disaster recovery (BCDR) plan in place that includes multiple redundancies. The end game is to eliminate single points of failure within your IT environment, whether that’s a person, a server, a switch or even your internet service.
2. Test your backups
Daily testing to verify the success of your backup system is highly recommended. That way you won’t be held hostage by ransomware demands because you’ll have your data safe and easy to access.
3. Standardise your IT platform
Non-standard IT environments are more likely to fail and difficult to restore. These are platforms that are not well known or are “cobbled” together by someone on the fringes of the IT industry. If you aren’t sure about your platform, have a security assessment done. Reinforce a commitment to a standardised platform with a strategy and supporting budget.
4. Primary and secondary internet connections
By using unique internet options that have automatic failover, you’re covered if one connection goes down. By using SD-WAN (Software Defined Wide Area Network), you can reduce network downtime with real-time outage detection and automatic switch-over to working links.
5. Move to the cloud
To help with redundancy, you should move files line-of-business apps and telephone functions to the cloud. Enterprise cloud infrastructure and VoIP keep your business up and running, even when your on-premise systems go down.
Wouldn’t it be nice to simply go back 15 minutes in time and restore your data instead of paying a hefty ransom or manually restoring data for weeks? Make sure your IT provider is implementing these tips and protecting you from downtime.
Is your company at risk of downtime? Contact Multi IT on 011 435 0450 for a risk assessment.
VIEW MORE
Guest Wi-Fi 101
No matter who they are, people today expect Wi-Fi access when they’re guests of your office. Setting up your Wi-Fi the wrong way can create a tedious experience for them and even expose your confidential information. So what’s the right way to do it?
Never give guests access to your primary Wi-Fi
While giving guests password to your company’s main Wi-Fi might be the easiest way to get them connected, you should avoid this at all costs.
Anyone with a little technical know-how can potentially access everything on your company network, including confidential data. Not to mention, guests’ devices connected to your business network increase the risk of a malware infection or cyber attack since you can never be sure that they’re safe and secure.
Ways to create secondary Wi-Fi for guests
If you router has built-in guest Wi-Fi support (you can check this feature through a quick web search) you could use it to create a separate “virtual” network. This means guests will have access to the internet without connecting to your main company network.
If your router doesn’t support multiple Wi-Fi networks, you can implement a separate wireless access point that bypasses the rest of your network and connects directly to your Internet service provider (ISP) connection.
Both options will keep your guests’ connectivity separate from your company network so you’ll never have to worry about unauthorized persons accessing your company data.
Keep in mind that guest Wi-Fi still uses your ISP connection so you should limit bandwidth usage on your guest network. The last thing you want is a guest streaming videos that slow down the Internet for your employees. With that in mind, you can even have your employees use guest Wi-Fi for their personal devices too. This minimizes the chance of employees hogging company bandwidth for personal use.
Your guest Wi-Fi should only provide outsiders with internet access, nothing more. While proper setup isn’t rocket science, it can be a tedious process. Having said that, if you need a team of experts to take care of it all for you, or simply have questions about how else to leverage your hardware for better efficiency and security, just give Multi IT a call on 011 435 0450.
VIEW MORE
Microsoft launches My Workspace for macOS
If you’re using Office 365 on a Mac computer, here’s some good news: Microsoft has introduced a new tool that will help you manage your Office 365 apps much more easily. My Workspace is a productivity-enhancing application that offers quick access to frequently used apps and files.
Office workspace for Mac
My Workspace sits in the Menu bar along the top of the screen and provides macOS users of Office 365 with a quick and easy access to pinned documents, recently accessed files, OneDrive files, Skype calls, and iCloud Calendars. It also makes their lives easier by offering quick buttons to Word, PowerPoint, Outlook, Excel, and OneNote. You can download the app for free at myworkspace.microsoft.com.
The app is the brainchild of four interns at the Vancouver offices of Microsoft Garage, Microsoft’s Washington-based experimental projects division. It was created when the interns were tasked with developing a tool to “add value to a person’s day.”
Benefits to macOS users
For those who use several Office apps at once, My Workspace’s unobtrusive placement and long list of accessibility features will make their Office experience far more efficient.
By clicking the icon located at the right-hand corner of the screen, you can get a quick overview of your day, respond to event invitations in your calendar, and join Skype calls. The intuitive tool determines recently opened files and displays them on the Recent tab, which gives you quick access to your most important documents.
Under the Pinned column, you'll find a full list of recently opened files along with shareable links, making collaboration easier.
Account management and customization features
With My Workspace, you can easily access your Office 365 account settings, making account management a breeze. From this window you can manage Subscriptions, Security & privacy, App permissions, Install status, and other general settings.
What’s more, My Workspace allows you to customize your App Settings, where you can set the number of events and recent documents you can see, and decide which apps you would like displayed in the launcher.
Small yet substantial improvements such as My Workspace make Office 365 a thoroughly convenient business tool. There’s plenty of productivity-boosting functionalities within Office 365 regardless of device, and if you want to explore its useful features, call Multi IT today on 011 435 0450 for tips and recommendations.
VIEW MORE
New phishing scam targets Office 365 users
With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped an age-old trick. This time, they come up with a highly targeted, well-crafted spear-phishing scam that's even more difficult to identify. Here's everything you need to know.
What makes it different from other scams?
The new threat comes in the form of spear phishing, an old familiar method in which hackers send emails that purport to be from trusted sources and dupe you into disclosing sensitive information. In this particular attack, the email messages are admirably well-crafted, making them even harder to spot.
The emails are also rid of the usual telltale signs such as misspelled words, suspicious attachments, and dubious requests. You might have to recalibrate what you know about phishing scams, because this new threat ticks all the boxes that make it look legitimate.
How does it work?
The hackers behind the attack craft personalized messages, pretending to be from trusted sources, such as your colleagues or Microsoft itself, and send them to your inbox. The messages could contain a link or a PDF file that leads to a legitimate-looking landing page. Upon clicking the link, the user will be prompted to enter his or her credentials, which the hacker will use to launch attacks within the organization.
Once they gain control of your account, they might set up new forwarding rules to monitor your communication patterns, which will be useful for their future attacks. They might even use your account to send further phishing emails to your co-workers to collect more sensitive information.
As for the phishing emails with PDF attachments, there will be instructions to fill in username and password to view the document. And once you do, your account is no longer yours.
Another way they can get your credentials is by sending an invoice that requires you to log on to a web portal to view the file. Attackers can also use this technique to trick you into performing a certain action, such as forwarding sensitive information or paying an invoice.
What can you do to stay protected?
Your first line of defense is multi-factor authentication, whereby you use a password and another authentication method -- like an SMS code -- to secure your account. This function is already included in Office 365 and here's a step-by-step guide on how to activate it.
The second line of defense is training yourself and your employees to spot common phishing techniques. In particular, verify the accuracy of the wording and the sensibility of the requests in the messages.
For good measure, your organization can also install an email-validation system which is designed to detect and prevent email spoofing, such as the Domain-based Message Authentication, Reporting and Conformance (DMARC).
Identifying phishing emails and planning and implementing a robust defense system are ways to protect you and your organization against the new Office 365 threat. For tips on how to spot this type of scam and how to plan thorough security practices, contact our experts at Multi IT today on 011 435 0450.
VIEW MORE