Phalanx specializes in technology advisory and support services focusing on small business clients. Providing IT budgeting, cloud technology, security and helpdesk support for 17 years.
Operating as usual
It's no secret that finding employees is becoming more difficult by the day, and it does not appear that it will get better anytime soon. The labor shortage is impacting businesses across all industries not just restaurants and retail. People once eager to start a career as an IT professional are now difficult to find as well. So, what does this mean for small and medium businesses with ongoing IT needs? It means they will have to be creative and consider alternative ways of accomplishing their technology objectives. One thing to consider is outsourcing. Working with a local IT services company can help you keep things moving forward and it will likely be more cost effective than hiring a full-time resource. If you consider how much you can save in recruiting costs, on-boarding, insurance, benefits, and other costs associated with hiring someone full time why not outsource? If you already have an internal resource but they are overwhelmed trying to keep up with everything, consider getting them some outsourced supplemental support. They may be the next position you are trying to fill once they burn out. If you have 100 or fewer employees a full-time network administrator probably doesn't make sense from a financial standpoint. The time to be creative is now. You can keep waiting and searching for the perfect candidate or you can partner with a well-established managed services provider like Phalanx. We treat our clients like partners by working collaboratively to help you secure, modernize, and maintain a network that meets your IT needs now and into the future. Contact us for a no cost consultation today so we can help you right size your support needs.
Small businesses say their revenues are plummeting as they're forced to turn down business because of the labor shortage The owner of a dog-walking company in Atlanta, Georgia, said she got, on average, four new enquiries a day, "and we have to turn all of them away."
This is just another example as to why your data, and your business is safer in the cloud. Whatever your reasons for not moving to the cloud they are likely unfounded. Yes, it will change the way you do business but for the better. If you haven't made the move because you do not fully understand the benefits you should talk to someone who can explain it to you. Fear of the unknown is the main reason that people hesitate to make changes. It doesn't have to be all, or nothing so start slowly making the transition until you are comfortable with the technology but start planning to make the move sooner than later. You can rest assured that your competitors have made the move or soon will. That gives them advantages that you cannot compete with using a traditional approach to technology to run your business. #microsoft #azurecloud
Microsoft Fends Off 2.4Tbps DDoS Attack, Second Largest on Record The attack targeted an Azure customer and originated from '70,000 sources' based in countries across Asia and the US, Microsoft says.
What's that password again? We talk about security a lot in our posts and that's because security is important. It is can also be complicated leading people to take shortcuts or oversimplify things such as passwords. Yes, passwords are a pain to manage and especially if your organization has a policy that requires you to change it every 90 days, and on top of that it must be complex aka hardened. There are tools out there today to help you make managing your passwords easier by using things like dual authentication or password vaults, but each has it challenges, potential vulnerabilities, and complexities. The following article outlines some cool new authentication methods that we can expect to see replace traditional passwords in the not-too-distant future. Things like FIDO, or Fast Identify Online will certainly be a welcomed change to trying to manage multiple passwords. Until then, you should be using a combination of things such as hardened password policies and MFA, Multi Factor Authentication. However, you decide to manage your passwords a sticky note on bottom of your keyboard is not the answer!
You might not be saddled with human-unfriendly, insecure password technology much longer Security keys, biometrics and a technology called FIDO are upgrading today's feeble security foundation.
October is Cybersecurity Awareness Month and in this increasingly threat-prone time, we want to share practical ways for all of us to protect our own data and information, along with the data and information for our clients, members, attendees, and stakeholders.
Hackers and other malefactors generally target the “low hanging fruit” – so join our conversation to learn how to add simple but effective protection to your devices & learn some of the best practices for internet usage and storage of data and information.
✅Learn how & why to protect personal data.
✅Learn how & why to protect attendee, member, and stakeholder data.
✅Understand the ramifications of having data stolen or compromised.
AMPS Member - K.C. Hopson,MS, CMP, Founder EventRebels, Head of Registration, Cadmium
Kelly Ye, President, Phalanx Technology Group, Inc.
Date: October 12, 2021
Time: 5:30 pm - 7:00 pm
Register Here ---> https://ampsweb.org/event/cybersecurity-practical-applications-to-utilize-on-a-budget/
This article goes hand in hand with another one that we recently posted about 60% of small businesses going out of business within six months of a major cyber-attack. Insurance companies are increasing rates on cyber security insurance given the rise of ransomware attacks and other types of security breaches. The cost for coverage will vary from industry to industry but if you are handling any type of PII or "Personally Identifiable Information" be prepared to pay more and be ready to invest in your security posture to meet insurers requirements. Things like MFA "Multi Factor Authentication" will be a requirement, and honestly you shouldn't need your insurance company to tell you that. MFA is an inexpensive way to secure your credentials that every company and organization should be using already. Security can be expensive. But exposing the PII of your clients will far exceed the cost of securing their information. We offer a free security assessment to help clients identify areas of risk, and we partner with companies who can provide the highest levels of security where needed. Give us a call to schedule a conversation about where you are today in terms of security and let us help you plan for where you need to be. It's a free call but recovering from a security breach won't be.
Will cyber insurance rates double in the next couple years? Prices in the cyber re/insurance market could rise sharply between 2021 and 2023, in some cases doubling from current levels, according to a report from S&P Global Ratings. “Depending on the region and [terms and conditions], policyholders could expect rate…
The following article should be an eye opener for all small businesses. If you are still avoiding moving to the cloud for fear of change, then fear of going out of business should be of equal concern. If you haven't invested in real network and end point security, you should be making plans for how you will explain to your clients that their sensitive data has been breached. You should also be thinking about how you will replace clients if you do have a breach because most of them will likely drop you. It is no longer a matter of if, but when most small business will experience a security event. There are many cost effective ways to improve your security posture and we would be happy to discuss those options with you. You can keep rolling the dice on security but sooner or later you will pay the price.
60 Percent of Small Companies Close Within 6 Months of Being Hacked Small to mid-sized companies should be monitoring networks for suspicious activity
As we have been posting about on a regular basis, Microsoft Office apps pose a security risk to your organization that you may not discover until it is too late. Ensuring that your end users know about these vulnerabilities is critical to keeping your network safe. Clicking random links, opening attachments from unknown or suspicious senders is the leading cause of kicking off these attacks. It is urgent that you educate your end users on a regular basis if you want to avoid the damage that these hacks can cause. Additionally, making sure that systems are patched and updated is another level of protection that you can control. Having great security tools and products in place is all well and good but the simple click of a mouse can take all that protection out of play. People are the leading cause of almost all security breaches. Phalanx offers training on end user security best practices so if you are struggling to come out with an effective ongoing training program for your employees we can help. The following article will provide more insight as to why you need to develop a consistent training program if you expect to keep your employees up and running and hackers out of your network!
Recently reported Microsoft zero-day gaining popularity with attackers, Kaspersky says A flaw in the MSHTML engine that lets an attacker use a malicious Office document to install malware is currently being used against the energy, industrial, banking, medical tech and other sectors.
Earlier this year, Microsoft make it possible for their business clients to use multifactor authentication, or MFA, to log into systems and devices using their authenticator app. They are now pushing this same technology to all windows user as a way of replacing traditional passwords. A lot of people have been using MFA for a few years now and we recommend it to all our clients and its starting to catch on as people realize that their passwords are not enough. Most password polices don't go far enough in requiring strong or hardened passwords. The traditional password is a thing of the past or soon will be. This article provides a good overview of the rise of MFA. Envision a world where you never need to create a password again. The reality is you have likely given away enough information for a hacker to crack your password if you have ever played any of the quizzes you see on various social media sites. What's your favorite color, what was your first pets name, where did you go to school, and so on. Those are what we call phishing attempts. The point is passwords are no longer the best way to secure your information. We have helped clients implement MFA solutions and we use then ourselves and I will never go back to the old way. Contact us to discuss how you can better secure your network using MFA. It's not as difficult as you might think.
Microsoft's passwordless plans lets users switch to app-based login Microsoft says users can delete all passwords from their accounts and use a different login system.
The ongoing Microsoft Printnightmare issue is yet another reason all small to medium businesses should be developing a cloud migration strategy. Moving everything at once can be scary for some but moving certain aspects of your network into the cloud is a must. Security alone should be a good enough reason not to mention the disaster recovery capabilities. The reasons are almost too many to list and if the technology gains don't impress you the cost savings should. It is a completely different way of doing business but in five years or less all your tools will be in the cloud like it or not. Hardware is costly and expensive to maintain. Popping new servers in the cloud is fast, easy and way more cost effective than buying, building, and supporting new server hardware. As with any technology there are considerations before making the move. That said, why wait until you are forced into the cloud vs. making a well-planned move at a pace that fits your comfort level and your budget? We can help ease some of your concerns and talk to you about a commonsense plan to get you into the cloud. Give us a call to discuss your options and we will help put your concerns behind you. #cloud #crn CRN
Microsoft discloses another Windows print vulnerability A day after company released more updates.
We can probably expect to see more of what this article is talking about when it comes to microchip production. It was only a matter of time really. Big technology firms have been slowly developing their chip sets for a while. The worldwide chip shortage is a big issue for lots of industries right now and will likely last into next year and beyond. So what do you do when you cant get microchips? You make your own of course.
Tech giants are rushing to develop their own chips — here’s why Apple, Amazon, Facebook, Tesla and Baidu are all shunning established chip firms and bringing certain aspects of chip development in-house.
How Microsoft AMMP Expansion Can Unlock Cloud Potential For Partners Microsoft's Tanuj Bansal talks about how the company's expanded Azure Migration and Modernization Program (AMMP) can help partners take advantage of the scalability, remote work enablement, and cost efficiencies of migrating to the cloud.
Another Microsoft vulnerability was announced this week that we thought you should be aware of. This one targets Office applications on end user systems. We promote security a lot in our posts, and one important component of end point security is applying patches and updates on a regular basis. Depending on the size and complexity of your network, this can be a full-time job. Currently Micrsoft is recommending 110 patches to its operating systems, so if you do not have the manpower or tools to remotely deploy these patches you are surely vulnerable to any number of attacks. The following article, which our Founder and President, Kelly Yeh, is quoted in provides an overview of this latest threat. Phalanx Technology Group specializes in helping small to medium size businesses secure and manage their networks. Contact us for a complimentary consultation to discuss how we can help you secure your network now and into the future.
Microsoft Finds Attack Attempts With Office Files Vulnerability with MSHTML, Windows and Office documents identified in Microsoft report.
This article provides a glimpse into the mind of ransomware hackers and how they operate. It points out that not all hacks are due to unsecured systems and vulnerabilities. Hackers will pay people big money for working credentials. In fact, corporate espionage is one of the leading sources of data breaches in the US. Dumpster diving for data is a real thing, disgruntled/compromised employees are another big risk. Securing your data from inside threats is just as important as protecting it from outside attacks if not more so. Access controls, multifactor authentication, and other tools should be used to limit access to sensitive data to a need-to-know basis. If someone doesn't need access to your accounting information don't give it to them. Limit external contractor access to only what they need to get their work done. There are lots of ways for people to steal and share your information. Phalanx can work with you to review your overall security posture and make recommendations on how to lock everything down as securely as possible allowing employee access only where needed. Contact us today to schedule a complimentary consultation.
This is the perfect ransomware victim, according to cybercriminals An investigation into what ransomware groups want has painted the picture of the perfect target.
We have talked a lot about ransomware recently, so we wanted to share the following video with you to illustrate how serious this issue really is. If you haven't taken steps to protect yourself from these types of attacks at this point it isn't a matter of if but when you will experience an attack. Hackers never rest and neither should you when it comes to protecting your valuable company and personal data. Contact us today for a free security assessment so we can help you discover just how at risk you really are.
Ransomware 2021, Ep. 2 | Webroot No single layer can defend you or your clients from all cyber threats. But effective security shouldn’t be complicated. You have a business to grow.
|Monday||9am - 5pm|
|Tuesday||9am - 5pm|
|Wednesday||9am - 5pm|
|Thursday||9am - 5pm|
|Friday||9am - 5pm|
WELCOME TO QUICKETCH Quicketch is one among the top emerging Graphic design and Image editing companies in the world, primarily dealing with real Graphic design, web design, Image editing, SEO services since 2003.
It's all about accurate pricing to help sell homes!
Germane Systems designs, tests and manufactures ruggedized computers and equipment that combine standard components with custom engineering, testing and expertise.
EmeSec Incorporated works with government agencies and cloud service providers to ensure, manage, and evolve their security postures.
Provide IT products and services to the Public Sector www.4points.com
IT Training | IT Services | Consulting
Building on the power of OSSEC, the world’s leading open source IDS, Atomicorp protects workloads in the cloud, on-premise and in hybrid environments.
CIP Reporting provides configurable reporting and workflow software that captures critical information when and where it occurs with analysis tools.
Technology Decisions Aren't Black and White. Think Red.
Soft Tech is an Innovative IT Solutions Small Business Consulting Firm based in Chantilly, VA. Learn more about us at www.softtechconsulting.com
We are a Computer IT company based out of Chantilly, specializing in Managed IT services, Cloud implementation, network installations, and VoIP phone solutions.