Archive for October, 2014

Why the Biggest Threat to Your Company’s Network Security Could Be Coming From Within

Written by Tiffiny Hladczuk. Posted in ITS Blog

network security systemsDespite all the network security systems and IT consulting services your company invests in, there might not be much to stand in the way of the latest threat to network security management.

Because according to the Department of Homeland Security, your biggest network security threat won’t be coming from an external source — it will likely be from angered, disgruntled current and former employees.

According to VentureBeat, both the FBI and the Department of Homeland Security are warning companies against potential hacks from these employees, especially former workers who still have the login information needed to access their former employer’s networks and servers.

These workers are able to access their employers’ networks and server information with the increasing availability of cloud computing resources, which lets them hack into a server from a remote location. Companies hacked by their current and former employees have had losses ranging from $5,000 to more than $3 million, Bloomberg reports.

“There has been an increase in computer network exploitation and disruption by disgruntled former employees,” the FBI’s public service announcement reads. “The FBI and DHS assess that disgruntled and former employees pose a significant cyber threat to US businesses due to their authorized access to sensitive information and the networks businesses rely on.”

Studies confirm the major threat that these employees, both current and former, have to any business’ network security systems. Approximately 57% of all small businesses have reported an internal, staff-related cyber breach within the last few years.

How can businesses protect themselves against their own employees? The answer lies in being more vigilant of one’s own network security systems, and staffing network security specialists to monitor any possible cyber breaches. With the assistance of an IT compliance firm, it’s possible to help keep a business’ network safe from being breached from an internal source.

What do you think about the FBI and Department of Homeland Security’s warning? Share your thoughts with us in the comments below.

Watch Avaya Collaboration Services Advance Productivity

Written by Fritz Brown. Posted in ITS Blog

Avaya Collaboration Services  –
Avaya collaboration solutions can help your business create a more flexible, adaptive and productive workforce.   These short videos will show you how.

Are you leveraging the power of today’s technology to stay ahead of the competition?

Watch these short videos to learn more about how Avaya IP Office™ can help you empower your small to medium workforce to connect, engage and succeed in today’s fast-changing, mobile world.
See how Avaya one-X mobile lets employees stay fully engaged and productive from the road.
Watch a service supervisor use GeoPresence and Avaya one-X mobile to quickly locate and deploy a field service technician to address a customer escalation issue.
Watch employees move business forward. With Avaya Flare Experience, they can locate colleagues, IM, call, conference and collaborate-all from their iPad devices.
Watch Avaya software turn a snowed-in employee’s home phone into his office phone for the day, allowing him to remain fully engaged and productive.
Watch how Avaya Scopia lets you overcome geographic barriers by enabling, productive face-to-face meetings with rich interactive capabilities like document sharing.
See how Avaya Scopia allows businesses to provide better, more personalized service.
“Helping You Get There” ™ Integrated Technology Services
164 Market Street
Suite 245
Charleston, SC
Twitter LinkedIn

© 2014 Avaya Inc. All Rights Reserved, Avaya, the Avaya Logo, and all trademarks identified by ®, TM or SM are registered trademarks, trademarks, or service marks of Avaya Inc, and may be registered in certain jurisdictions. All other trademarks are the property of their respective owners.

Avaya Collaboration Services,  –

How to Establish and Maintain a Successful Partnership Between Your Business and its IT Consulting Firm

Written by Tiffiny Hladczuk. Posted in ITS Blog

onsite computer servicesInvesting in an IT consulting or IT compliance service for your business is a great way to ensure your onsite technology is running as efficiently and effectively as it should be.

But how can you tell if the onsite computer services your IT firm is providing are streamlining and improving your business’ technology like they should be?

Experts typically advise businesses to choose an IT or onsite computer services provider according to both the current and future needs of your business.

“IT buyers should be looking for a solution provider that can do everything,” Beau Perna, senior manager for configuration services at CDW, explained in a recent BizTech article. “Enterprises shouldn’t have to go to one vendor for telecom and another vendor for onsite implementation and design and another vendor for configuration. Instead, they should look for somebody that can provide a turnkey, all-inclusive solution.”

Another important thing to consider when working with your business’ IT consulting firm is the level of security they can add to your network.

Advanced computer services such as enhancing your business’ network security systems with security auditing and penetration testing is a necessity these days. This is especially true when data breaches are increasingly common and 75% to 80% of these breaches stem from an internal source.

Lastly, you should choose an IT service provider based on its ability to be productive and time-efficient with the services it delivers to your business. According to BizTech, an ideal IT firm should be able to provide almost 4,000 configurations to your technology and network each day.

Ultimately, your choice of an IT service provider will determine how well your business’ technology runs on a day to day basis. And when you work with your IT servicer in a partnership, you can benefit from a streamlined, highly-effective relationship.

How did your business choose its onsite computer services provider? Share with us in the comments.

JPMorgan’s Data Breach to Affect 76 Million Households, Prompting Doubts Over Network Security

Written by Tiffiny Hladczuk. Posted in ITS Blog

network security systemsJPMorgan Chase has become the latest major corporate entity to suffer a cyberattack that has exposed the personal information and data of as many as 76 million households and 7 million small businesses across America.

According to the New York Times, JPMorgan announced last week that the data breach took place over the summer. The news, which follows similar massive data leaks at Target and Home Depot, continues to erode many consumers’ confidence in the effectiveness of network security systems at large corporations.

JPMorgan’s data breach stands apart from similar breaches at retail companies, however — as the country’s largest bank, JPMorgan’s databases contain their customer’s private banking information such as account numbers, passwords and Social Security numbers.

In its statement, JPMorgan maintained that their customers’ sensitive banking details were not compromised in the data breach of their network security systems, according to the New York Times.

Yet the information that was exposed — customers’ addresses, phone numbers and other information — could still allow hackers to steal their identities. At press time, JPMorgan stated it has detected no evidence of customer fraud in its system.

How are the nation’s largest corporations — companies that undoubtedly have the budget required to invest in high-security and advanced computer services — still falling victim to these data breaches?

“We’ve migrated so much of our economy to computer networks because they are faster and more efficient, but there are side effects,” Dan Kaminsky, a researcher and network security specialist at White Ops, a network security management company, said.

According to the New York Times, JPMorgan’s hackers operated from overseas. They somehow obtained a “road map” of JPMorgan’s computer applications and programs, a list of computer services the company uses. The hackers then crosschecked this list with known weaknesses in the programs to find a way in to the bank’s databases.

The cyberattack reveals much about the weakness that even the largest financial entities possess against computer hackers — and does little to improve consumer wariness of how secure their data may be.

Charleston South Carolina 2014 Regional Economic Scorecard – Advancing Information Technology City

Written by Tiffiny Hladczuk. Posted in ITS Blog

Information Technology Sticky Notes Sun

2014 Regional Economic Scorecard

From Source: –

The Charleston Regional Development Alliance partnered with the Charleston Metro Chamber of Commerce to produce the 2014 Regional Economic Scorecard for the community.

“It is intended to be a resource; to guide & inform discussions by local leaders regarding strategies for building a globally competitive economy now and into the future.”

The Chamber’s Center for Business Research facilitated the research & analyzed the data, which was primarily sourced through the Charleston Regional Competitiveness Center.  The Lowcountry Graduate Center and the Riley Center for Livable Communities at the College of Charleston provided the academic lens.

Highlighting data captured from 2005 to 2013, the 2014 Scorecard uses data to measure how our market is performing compared to six similar communities in the Southeast and two leading economies of Austin and Raleigh.

Want to talk about the Economic Scorecard? Click here to join the conversation.

Economic Scorecard Advocacy Action Plan

Click here to download a PDF Version – Charleston Economic Scorecard