AllConnected Blog

man working on laptop computer with global network graphic and server
AllConnected News
Mariah Prendergast

The Way We Work Continues to Change as We Enter 2021. Find an IT Partner that Knows Your Business and Can Help You Succeed and Stay More Secure in the New Year

The onset of the Covid-19 pandemic triggered mass transitions to work-from-home setups, rather than on-premise offices and conference rooms. Working remotely became the new normal for many businesses, and those that were prepared to make the adjustment thrived during the unprecedented circumstances; those that were unprepared spent a lot of time and resources coming up with a way to continue operations remotely. It may have been easier for them and their entire team if they had a business continuity plan already in place for just that kind of disaster.

Read More »
Cisco Umbrella GIF with rain falling on umbrella
Managed Services
Mariah Prendergast

Cisco Umbrella: Your Cybersecurity Shield

Just as cybercriminals become more advanced with email spoofing, malware, and ransomware, your organization’s IT security must advance to defeat them.

You wouldn’t leave your business PC without Anti-virus software, but many businesses leave their email communications and Internet use to unsecured wi-fi and legacy firewalls.

Don’t be one of them.

Read More »
fire rescue
Disaster Recovery
Mariah Prendergast

DRaaS: Misconceptions of Data Backup and Data Recovery

There are many players in the data protection, backup and recovery space, many who claim to provide a “DRaaS” service, but not many provide for all aspects you should expect in a Disaster Recovery Solution.

AllConnected believes you should have the facts so you can make an informed decision.

Regardless of what business you run, your Disaster Recovery plan begins with backup.

Read More »
Security Services
Mariah Prendergast

Secure and Stabilize the #WFH experience for the Long Term

Your employees need executive leadership whether you’re in-office, on-the-road, or working-from-home. As you adapt to the new business environment and implement effective WFH communication, consider how a comprehensive WFH solution will drive productivity and satisfaction.

Read More »
woman wfh on laptop in bubble
Security Services
Mariah Prendergast

Employee Cyber Attack Readiness – WFH 8 Tips for Zero Trust

From an IT Security perspective, the term “social engineering” refers to cybercriminals using any number of psychological tricks to get users to perform actions (click on an email or link) or divulge personal or confidential information.

While technical hackers seek vulnerabilities in the networks or software, social engineering cybercriminals exploit an end user’s tendency to trust…

Read More »
Multi-factor authentication: something you know, something you are, something you have
AllConnected News
Mariah Prendergast

How Secure Is Your Multi-Factor Authentication?

If today’s cybercriminal obtains your login credentials, he can change your account settings, steal sensitive personal or company data, send out phishing emails as you, and possibly access additional accounts within your organization.

Criminals can attempt this “malicious account takeover” through:

Hacking: Automated scripts run through various password combinations (AKA, brute force attack) to discover the correct access.
Phishing and Spear Phishing: Highly targeted emails from seemingly credible sources trick users into to revealing personal information.
Social Engineering: Researching online databases and social media to data mine potential password information based on your name, location, phone number, or names of family members, etc.
Botnets: Bots from multiple IP addresses perform high-volume username and password hacks to take over a number of accounts while staying unnoticed.
Credential Stuffing: Stolen or leaked credentials are tested against multiple websites in the hope that the victim uses the same password for everything.
In order to prevent the above, connecting to your network and critical applications has developed from a simple password into a process of multi-factor authentication (MFA).

Read More »
Dogs on computer talking about internet comic
Security Services
Mariah Prendergast

How to Prepare Your Organization to Fight Ransomware

These threats include four key areas of concern:
Phishing – using the subject of coronavirus or COVID-19 as a lure
Malware distribution – using coronavirus- or COVID-19- themed lures
Registration of new domain names containing wording related to coronavirus or COVID-19, and
Attacks against newly—and often rapidly—deployed remote access and teleworking infrastructure.

AllConnected encourages all of its clients to take appropriate steps to prevent ransomware attacks in their organization.

Read More »
laptop, tablet, smartphone graphic
AllConnected News
Mariah Prendergast

Keeping Remote Workers Secure and Productive

Just one week ago on Thursday, March 19th, within hours of each other, the State of California, Los Angeles County, and Ventura County issued ‘Safer at Home’ orders to their citizens. Within this last week, our helpdesk, network, and application teams at AllConnected have fielded 200+ tickets solely focused on supporting local businesses in implementing secure Work From Home strategies to ensure employees stay secure, healthy, and productive.

Whether you prepared an effective business continuity plan for your organization or not, the outbreak of COVID-19 has kept most “non-essential” employees at home.

But you know no one is “non-essential” in your organization. So, consider the following steps to make sure your employees are both productive and secure working remotely. Our engineering team has assembled some important observations and recommendations below for your organization to ensure Continuity of Business operations with Remote Workers:

Read More »
covid-19 virus
AllConnected News
Mariah Prendergast

Regarding COVID-19 and AllConnected

As the situation with the spread of the COVID-19 disease continues to develop worldwide and in our community, our team at AllConnected is continuing to monitor the situation. As is likely the case in your business, we’ve made adjustments to implement regular sanitizing of our office space, raised awareness on how we can minimize the spread of disease, and made additional arrangements for remote work.

We will be making more use of virtual meetings with Cisco WebEx for our regularly scheduled Technology Business Reviews, incorporating video to ensure that we deliver a similar level of engagement, effective immediately.

Although local engagement and onsite interaction has always been a key way we support clients, our Engineers will be using these tools more often to remotely consult with our clients.

Read More »