<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.concentricsolvesit.com/blogs/tag/bdr/feed" rel="self" type="application/rss+xml"/><title>Concentric IT Solutions - Tech Talk #bdr</title><description>Concentric IT Solutions - Tech Talk #bdr</description><link>https://www.concentricsolvesit.com/blogs/tag/bdr</link><lastBuildDate>Fri, 27 Mar 2026 14:16:13 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Ransomware and You]]></title><link>https://www.concentricsolvesit.com/blogs/post/Ransomware-and-You</link><description><![CDATA[<img align="left" hspace="5" src="https://www.concentricsolvesit.com/files/Pictures/Fortress_Hackers_LargeRes.jpg"/>Ransomware's effects are expensive and far-reaching. Protect your business.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_sg0A-Tx6Szy-1zgWAMlqug" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_byMrpOHZSp6xBy0gzOpEQw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_pj6IYuqMS2-HLPMJZu0U6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_O0ughjg9THyoWxcPvV8W4Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_O0ughjg9THyoWxcPvV8W4Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Ransomware gangs want to get to know your business</h2></div>
<div data-element-id="elm_HH-F1hGpScaDSnrDExB19w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HH-F1hGpScaDSnrDExB19w"].zpelem-text { color:#FFFFFF ; border-radius:1px; } [data-element-id="elm_HH-F1hGpScaDSnrDExB19w"].zpelem-text :is(h1,h2,h3,h4,h5,h6){ color:#FFFFFF ; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p><span style="background-color:rgb(0, 0, 0);">Ransomware has become a major threat to organizations and businesses worldwide.&nbsp; Ransomware is a type of malicious software that encrypts files on a computer system and demands payment in exchange for the decryption key.&nbsp; The cost of ransomware attacks is staggering, with businesses paying millions of dollars per event to retrieve their data.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">The impact of a ransomware attack can be catastrophic, as it can lead to the loss of critical data, damage to reputation, and financial losses.&nbsp; In some cases, the cost of the ransom is less than the cost of the data that was lost.&nbsp; Moreover, there is no guarantee that paying the ransom will result in a full decryption of the data.&nbsp; Imagine first negotiating with the same criminals who attacked your business, then jumping through the hoops to pay them their ill-gotten gains only to find the decryption key doesn't even work properly.&nbsp; That's a bad day.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Ransomware attacks used to be a single form of extortion - encrypted data requires the key to decrypt.&nbsp; Thus, the exchange was in exchange for the key to get back into your systems and access your data.&nbsp; Today's ransomware attacks are double and triple extortion events that including data exfiltration and even DDOS attacks to bring down your web facing services.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">The best recovery against ransomware's data encryption is to have a comprehensive backup system in place.&nbsp; Backing up your data regularly ensures that you can restore your system to a previous state in case of an attack.&nbsp; It is important to also keep backups offsite and disconnected from the network to prevent them from being encrypted by the ransomware.&nbsp; This is sometimes referred to as an air-gapped backup.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Another important defense against ransomware is to patch information systems against disclosed vulnerabilities.&nbsp; Software vendors frequently release security patches to address vulnerabilities in their products.&nbsp; Failing to apply these patches can leave your system vulnerable to attack.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Furthermore, organizations should have a comprehensive security program that includes training employees on how to identify and avoid phishing emails and other social engineering attacks that are commonly used to spread ransomware.&nbsp; It is important to educate employees on how to recognize suspicious emails and links, and to report them to the appropriate person in the organization.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p><span style="background-color:rgb(0, 0, 0);">Ransomware is a significant threat that can have severe consequences for organizations and businesses these days.&nbsp; Backing up your data regularly, patching information systems against disclosed vulnerabilities, and educating employees on how to avoid social engineering attacks are essential measures to mitigate the risk of ransomware.&nbsp; By implementing these measures, organizations can reduce the impact of ransomware attacks and ensure that they are better prepared to recover from them.</span></p><p><span style="background-color:rgb(0, 0, 0);"><br></span></p><p>If you're interested in learning more, please contact us and schedule an appointment.&nbsp; We offer services and solutions that help to prevent ransomware attacks and can dramatically reduce time to containment and recovery if there is an event.</p></div></div>
</div><div data-element-id="elm_MbvxiU3dRQKqgXNlkhGMQw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 27 Apr 2023 13:23:59 -0700</pubDate></item><item><title><![CDATA[Why you should audit your IT systems annually]]></title><link>https://www.concentricsolvesit.com/blogs/post/Why-you-should-audit-IT-annually</link><description><![CDATA[<img align="left" hspace="5" src="https://www.concentricsolvesit.comhttps://images.unsplash.com/photo-1556761175-b413da4baf72?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ"/>Is your IT provider auditing your technology annually? They should be.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_EOoF6ZE-QcehAwQif2EZxQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_p0ULqvRWSZ2yk2fkPf2W5Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ICgKyXM0ScyWlC8kfWpwiw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_kPodg8qlSOOWA-rzoW2Z1g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_kPodg8qlSOOWA-rzoW2Z1g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:rgb(36, 172, 228);">Auditing - for more than accounting reasons</span></h2></div>
<div data-element-id="elm_Zx9kM50HTq6K_xA4tWMZ7A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Zx9kM50HTq6K_xA4tWMZ7A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">In most cases, the unfortunate truth about business systems and technology is that they can go out of date very quickly.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">How do you keep up with new technologies and make sure you have a competitive advantage?</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">In this article, we will outline some simple example steps your IT provider should be doing on an annual basis, to keep you informed and your business up to date with the latest IT technologies. </span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">An IT systems audit should be scheduled, conducted and reviewed at least annually.&nbsp; When this takes place very much depends on your business operation.&nbsp; A good rule of thumb is to carry out an audit before quieter times of the year.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">This helps the business to plan any upgrades and projects to coincide with those quieter times which will cause less disruption to the business.</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">&nbsp;</span></p><p style="text-align:left;"><span style="color:rgb(255, 255, 255);">The following items are examples of some components an audit should include.&nbsp; This is&nbsp;<span style="font-style:italic;text-decoration-line:underline;">not</span>&nbsp;a complete list.&nbsp; Let's get started:</span></p><p><span>&nbsp;</span></p><p><span style="font-size:30px;"><span style="color:rgb(36, 172, 228);">Age of equipment</span></span></p><p><span>&nbsp;</span></p><ul><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">An inventory of all IT equipment should be kept, this should include model numbers, serial numbers, manufacturer and more importantly warranty status.</span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">IT equipment which includes desktops, laptop, servers tend to have an optimal performance life cycle of between 3 - 5 years.&nbsp; </span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">Maintaining an inventory with this information allows the business and IT provider to plan for upgrades.&nbsp; You can easily prioritize which machines should be renewed or upgraded using the inventory list.</span></li></ul><p><span>&nbsp;</span></p><h2><span style="color:rgb(36, 172, 228);">Automation</span></h2><p><span>&nbsp;</span></p><ul><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">The audit should also look to include an overview of manual tasks or problems in the business.</span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">Is there a manual, repetitive task that could be automated?&nbsp; This could be something as easy as duplicate data input by a member of staff.&nbsp; </span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">You might have 2 systems in place that require the same data to be input, why not automate this so data it is entered manually only once?&nbsp; </span></li><li style="text-align:left;"><span style="color:rgb(255, 255, 255);">Automation is becoming more common in the workplace and services such as Microsoft Power Automate and Zapier allow business to work smarter, not harder.</span></li></ul><p><span>&nbsp;</span></p><p><span>&nbsp;</span></p><h2 style="line-height:1.5;"></h2><h2 style="line-height:1.5;"><span style="color:rgb(36, 172, 228);">Disaster Recovery Test</span><span style="font-size:16px;"><p><br></p><ul><li style="text-align:left;">Backups should be tested monthly to ensure files can be successfully restored, but disaster recovery is meant for larger events</li><li style="text-align:left;">More insurance providers are now offering &quot;Cyber Insurance&quot; critical insurance that any business that has been hacked will make a top priority when renewing.</li><li style="text-align:left;">A little known fact about cyber insurance is the need for a disaster recovery plan with answers to questions such as &quot;how long will it take your business to recover&quot;&nbsp; and &quot;when was the last time your disaster recover was tested?&quot; </li><li style="text-align:left;">This highlights the need for at least an annual test of your recovery process and should be included as part of an IT audit.</li></ul><p><br></p><p>&nbsp;</p><p><span style="font-size:18px;">For more information about how we can help your business and provide an independent 3rd party IT audit of your systems and technology, follow the &quot;Get Started Now&quot; link below.</span></p><p><span style="font-size:18px;"><br></span></p></span></h2></div>
</div><div data-element-id="elm_TxBo4naeTyCz8YY-bo8xOQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 12 Jun 2020 23:46:46 -0700</pubDate></item></channel></rss>