fbpx
Open post

If you use google drive/photos, be ready to switch your files around!

Recently announced by google, their application used by many for businesses and private use, Google Drive and Google Photos, will be shut out.

Google Drive/Photos is being replaced with a new application called Google Backup and Sync. This new application is essentially the same as Google Drive/Photos, however it consolidates the applications into one single application and offers the extra functionality of on demand file access (File stream version only, which is the paid version released Sept 26th).

Google has been planning to consolidate their applications for a while now. Starting December 11th the Google Drive/Photos will lose official support. Be sure to transfer over your files/photos before this occurs to ensure the security of your documents! If your worried about missing the deadline, don’t fear! Google is sending out mass reminders starting in October as desktop reminders!

As an I.T. business, we at Re2tech make sure to stay up to date with relevant information on technology and services that our customers use. This helps them stay efficient and us to be able to better understand the inner workings of our customers, and what they may or may not need in terms of technology/ security services!

Give us a call today and inquire about our services for technology and network security! 

Open post

Equifax hack leaves 143 million with roaming SSN

Mid May to July of 2017, Equifax had a security breach of their consumers private personal information, including social security numbers, birth dates, addresses and some drivers license numbers.

Adding to the issue, it has been noted that around 209,000 credit card numbers of consumers were breached as well. If you have had any interaction with Equifax it is highly suggested you keep an eye on your bank accounts and use of SSN.

The breach was discovered on the 29th of July and was immediately acted upon to prevent any more loss of sensitive information. The investigation is reported to be almost through and done, and should be expected to wrap up in the coming weeks.

The Chief Execitive Officer stated that there will be comprehensive services to support all U.S. consumers, even if this breach left them unaffected.

A website has been set up to help consumers see if their information was breached, click here to be brought to the support site.

Despite Eqiufax’s goal of being a leader in data managing and protection, they too had become a victim of a security breach. This should be taken as time to learn from this experience and ensure your network is as strong as it possibly can be.

No matter how small your network may be, without proper monitoring and maintenance, you are subject to hacking and data breaches. Entrust your network to us at Re2tech, a business that is small, but has strong flexibility, and the knowledge of a large enterprise, we are in this for the long haul! We make I.T. happen!

Contact us today and inquire how we may help you secure your network, don’t wait until you are already a victim! 

Open post

Switch Port Protection

There are multiple ways to secure your network, but one of the easiest is with a secured access switchport.

What is a switchport?

A switchport, or network switch, is a networking device that allows the connection of devices to computer networks. This is accomplished through packet switching that grants the ability to receive, process, and forward data to the designated device.

So how can securing a switchport help secure your network?

A secured access switch restricts access to users and devices, thus preventing some random people/hackers to run through your network. By default, access switch ports are in a dynamic-desirable mode, which means it basically follows the orders of any device connected to it.

 

Ways that we at Re2tech can help you secure your access switch:

  • Enabling BPDU guard, which will protect against unauthorized network devices.
  • Restrict input to an Ethernet switchport, by statically assigning the MAC address of an end device to a specific switchport.
  • Set the switchport into “Sticky” mode which allows the remembering of a devices MAC address as soon as it first connects, which can then be treated as the static address.
  • Configuring the access switch to shut down or restrict access when an attempt of an unauthorized device is detected. This in turn can also send out an SNMP trap message to the administrator, alerting them of the violation.
  • Create a black hole VLAN which guarantees isolation for any unauthorized devices connected to the switch.

There is a long list of possible ways you can secure a switchport. Securing a switchport is simple and easily changed, while also giving an essential base security to a network.

Give us a call at Re2tech today and let us secure your switchports and network! while your at it, inquire about our other I.T. services! Because we make I.T. happen! 

Open post

What is DNS hacking?

Hacking comes in a variety of forms, and most are accomplished through connecting to your network directly in some way. However DNS hacking is a form of hijacking that is indirect but can have huge direct consequences.

DNS stands for Domain Name System. The DNS is your known name, this is something that would show up when you google a word or phrase that would involve this name. Its basically your public listing on the internet.

DNS hijacking takes your DNS functions and interrupts the flow, so instead of a possible customer traveling to your site, they may get routed to a different site/page that doesn’t actually serve your purpose. This form of hacking can completely disrupt an online service. The hacker intercepts the route to your site and inserts a new path to follow. This could mean no one who wants your services can get the information they need, and bring a business to an abrupt halt.

Persons who are transferred to a false site could actually become at risk as well, for their information could become identified.

So how do you help protect yourself from this form of attack? We at Re2tech could ensure the domain registrar is a multi-factor authentication domain.  This would require anyone attempting to change a site’s DNS settings to have access to a form of authenticator, which they wouldn’t have unless they are actually authorized to have that level of access. Another precaution could be to ‘lock’ your DNS, which would make it so no one could change the DNS unless the registrar called a sites administration directly to get approval.

DNS hijacking can be a huge inconvenience and possible threat to customers, so take the time to implement precautions and ensure a stronger online security! Give Re2tech a call today and let us help you with your technology needs and online security! We may be a small business but that allows us to have flexibility to support our top class services and knowledge of a large enterprise!

Posts navigation

1 2
Scroll to top