AllConnected Blog

man working on laptop computer with global network graphic and server
AllConnected News
Mariah Prendergast

The Way We Work Continues to Change as We Enter 2021. Find an IT Partner that Knows Your Business and Can Help You Succeed and Stay More Secure in the New Year

The onset of the Covid-19 pandemic triggered mass transitions to work-from-home setups, rather than on-premise offices and conference rooms. Working remotely became the new normal for many businesses, and those that were prepared to make the adjustment thrived during the unprecedented circumstances; those that were unprepared spent a lot of time and resources coming up with a way to continue operations remotely. It may have been easier for them and their entire team if they had a business continuity plan already in place for just that kind of disaster.

Read More »
Perch Security MDR
AllConnected News
Brennan Smith

AllConnected Develops MDR Service with Perch Partnership

AllConnected will partner with Perch Security, a 24×7 co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC) and comprehensive SIEM (Security Incident and Event Management) service.

AllConnected MDR will be able to detect breaches sooner, enabling engineers to respond and remediate quickly.

Read More »
NCSAM October 2020 - Do Your Part, Be Cybersmart
National Preparedness Month
Brennan Smith

National Cybersecurity Awareness Month – October 2020

The National Cyber Security Alliance (NCSA) and the U.S. Department of Homeland Security (DHS) launched National Cybersecurity Awareness Month (NCSAM) in October 2004 as a broad effort to help all Americans stay safer and more secure online.

From 2009-2018, NCSAM’s theme was “Our Shared Responsibility,” the role we all have, as individuals or as organizational leaders, to secure the digital assets under our control.

Read More »
Cisco Umbrella GIF with rain falling on umbrella
Managed Services
Mariah Prendergast

Cisco Umbrella: Your Cybersecurity Shield

Just as cybercriminals become more advanced with email spoofing, malware, and ransomware, your organization’s IT security must advance to defeat them.

You wouldn’t leave your business PC without Anti-virus software, but many businesses leave their email communications and Internet use to unsecured wi-fi and legacy firewalls.

Don’t be one of them.

Read More »
CPA
Managed Services
Brennan Smith

Simplify Compliance of New Security Requirement for CPA License

Now for 2020, the FTC Safeguards Rule requires every tax professional, whether you are a partner in a large firm or a sole practitioner, and every Authorized IRS e-File Provider, to create and enact security plans to protect client data.

The new IRS Form W-12: Paid Preparer Tax Identification Number (PTIN) for Application and Renewal now includes a legal requirement for data protection:

Read More »
woman wfh on laptop in bubble
AllConnected News
Mariah Prendergast

Employee Cyber Attack Readiness – WFH 8 Tips for Zero Trust

From an IT Security perspective, the term “social engineering” refers to cybercriminals using any number of psychological tricks to get users to perform actions (click on an email or link) or divulge personal or confidential information.

While technical hackers seek vulnerabilities in the networks or software, social engineering cybercriminals exploit an end user’s tendency to trust…

Read More »
Multi-factor authentication: something you know, something you are, something you have
AllConnected News
Mariah Prendergast

How Secure Is Your Multi-Factor Authentication?

If today’s cybercriminal obtains your login credentials, he can change your account settings, steal sensitive personal or company data, send out phishing emails as you, and possibly access additional accounts within your organization.

Criminals can attempt this “malicious account takeover” through:

Hacking: Automated scripts run through various password combinations (AKA, brute force attack) to discover the correct access.
Phishing and Spear Phishing: Highly targeted emails from seemingly credible sources trick users into to revealing personal information.
Social Engineering: Researching online databases and social media to data mine potential password information based on your name, location, phone number, or names of family members, etc.
Botnets: Bots from multiple IP addresses perform high-volume username and password hacks to take over a number of accounts while staying unnoticed.
Credential Stuffing: Stolen or leaked credentials are tested against multiple websites in the hope that the victim uses the same password for everything.
In order to prevent the above, connecting to your network and critical applications has developed from a simple password into a process of multi-factor authentication (MFA).

Read More »