In today’s world where technology like cell phones, computers and digital entry to the Internet exist, we are at risk of having our digital data compromised and manipulated. Cyber Security means being protected against the criminal or unauthorized use of electronic data and the measures taken to achieve this.
Our experts can help with all cyber security needs in Reno/Sparks and Northern Nevada.
PacStates is proud to be your first call for technology and cyber security threats, as our team of highly-skilled professionals is here to protect your business from all types of challenges and threats. We have simple, one-call solutions that are customized for you to help with all of your technology, phone and cyber security needs.
A cyber crime is not only about a simple computer hack, user error, or even malicious attacks against small businesses. Over the last 5 years, some of the largest and most advanced companies in the world are falling victim to cyber attacks that are destroying businesses, families, and more.
We want you to know: we are here for you. No matter how simple the technology question is or how advanced the cyber security challenge might be. Businesses need to treat cyber security as one of the most essential business decisions moving forward, and set aside a budget for it.
Our PacStates vCIO recommends we follow the Onion approach for network security as a Multi layer line of defense for you. We will work with you to create a customized solution package to protect what is most important to you. We are standing by and available for your cyber security and technical support 24/7. We will get through your challenge together as a team.
Ryan Baskahroon vCIO
Why do I love what Just in the last 30 days one of my local govt. agency clients has over 10 phishing attack ATTEMPTS, 4 scamming and 6 impersonations.
A mortgage company received an email stating they needed their wire transfer sent to a different account number without verifying who the email was or who it was from they sent over $100,000 to a scammer through a phishing attack.
Even Last Pass your password protection and storage company was compromised.
That is why I do the onion approach! It gives my client an me a peace of mind. Most of our clients say they don’t have a budget for cyber security but they don’t realize it is like leaving your front door and garage open all day with a sign out front telling everyone on the internet where the valuables are in the event they happen to come by.
If there was ONE most important message I can give -
You can rebuild your business if you back up your data correctly. That means you MUST have a verified and secured physical and cloud based backup.
I received a call do an assessment from a flooring company. Instead of the onion approach I look for, they had only a router in place. That means they had NO protection between them and a BIG box store company. The problem is one phishing email could have compromised both companies by way of middle man attack. This is due to the big box company white listing the local flooring company to access their quoting and inventory system.
Backup!!! We Backup your backing up of a backup because there’s never enough.
Cyber Security: a state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
Malware: all forms of malicious software designed to wreak havoc on a computer. Common forms of threats include: viruses, trojans, worms, ransomware, bots, spyware, clickjacking, DDoS, and rootkit. There are several types of threats to be aware of, and in the past, software damage viruses like Stuxnet have caused physical damage as well.
Ransomware: an automated intelligence designed specifically to steal data from your computer and hold it hostage.
Virus: a type of malware that aims to corrupt, erase or modify information on a computer before spreading to other computers.
Trojan Horse: malware that often allows a hacker to gain remote access to a computer through a “back door.”
Worm: a piece of malware that can replicate itself in order to spread the infection to other connected computers.
Bot: a type of software application or script that performs tasks on command, allowing an attacker to remotely take complete control of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker, also known as the “bot-herder.”
Spyware: it spies on user activity without their knowledge. The capabilities include activity monitoring, keystroke collecting, data harvesting, account information, logins, financial data, and many more.
Rootkit: a malware that allows cybercriminals to remotely control your computer. These are especially damaging because they are hard to detect, making it likely that this type of malware could live on your computer for a long time.
Firewall: Physical appliance that works as a first layer of defense for your business End point protection: Software that works as a second layer of defense for your business.
Antivirus: Software that acts as a third layer Email Security: Software that acts as an internal layer of protection.
Group policy: Internal layer of protection. Policy built into your domain controller.
DNS protection: Domain name server protection (website domain) that stops scammers from spoofing your website.
Anti spoofing: Spoofing is a term used when a scammer mirrors your email and/or your website and sends phishing or malicious emails to your clients. It appears close to a trusted source so many don’t catch them in time before damage is discovered.
DDoS attacks: A distributed denial-of-service. They flood your network with pings and useless data and will shut down your firewall and network.
Social Engineering: Using human interaction online or by cell phone texting as a trusted/recognized source’s name/title. This practice is used to manipulate people into breaking normal security procedures and best practices to divulge confidential information and gain unauthorized access to systems networks physical locations or for fraudulent purposes or financial gain.
Man in the middle attacks: An ease dropping method where the attacker has a foothold on the network which positions themselves between a user and an application they are communicating with. That means that someone is on your computer watching every move you are making without you knowing about it. The average minimum time they are on your computer 3-6 months before you realize they are on your computer and have already sole all of your data.
Firmware Hacking: A cyber attacker is able to get into a manufacturers firmware database and inject malicious code that will compromise computers and company workstation.
IP Spoofing: A creation of internet protocol packets (IP) with a false source IP address to impersonate another computing system. This is used to have human interaction give unauthorized access/confidential information to a scammer.
IOT based attacks: This is when someone hacks into an Arlo, Google Nest, Ring, Vivint video doorbell system, wireless camera, sensors, access control device, or similar to the story about someone hacking into our Alexa account and ordering items from your Amazon account.