Sophisticated Systems has partnered with KnowBe4, a proven solution that effectively teaches end users, who are the most important line of defense, how to protect your organization from joining the growing statistics of organizations who have fallen victim to these attacks. Continue
Columbus, OH., January 1, 2017 – Sophisticated Systems, Inc. (SSI) has launched its enhanced website, (www.ssicom.com), effective today. The update reflects the improved internal organizational structure and company growth, through a more client-centric set of solution offerings in addition to a strengthened representation of the SSI brand. Continue
Columbus, OH., December 8 – Sophisticated Systems, Inc. (SSI) is proud to be a strategic partner to library systems across the state of Ohio and to announce that Licking County Library (LCL) system recently engaged the SSI team to help them implement a very exciting project– the first Envisionware 24-Hour Library in the state! Continue
Since the initial push and transition to work from home in recent weeks, we have observed and shared in the experiences a number of our clients have had and would like to provide insight into the model and recommend items to consider going forward. We offer these additional considerations as teams are now settling into the new model. Continue.
With employees working from home offices, your organization’s IT Infrastructure is under increased pressure from a myriad of cyber attacks. There are many layers to an organization’s defense system against cyber criminals and their arsenal of attacks. However, we have identified two areas that are great places to start; increasing your organization’s security awareness and evaluating your Phishing posture. Let’s take a quick look at these two recommendations.Continue.
With employees working from home, it is more important now than ever to utilize a wide array of tools and practices to keep your environment secure. This can range from employee education to policy development to the implementation of sophisticated tools to safeguard your data. One such tool, known as Multi-factor Authentication (MFA) is a security mechanism that requires an individual to provide two or more credentials in order to authenticate their identity. In IT, these credentials take the form of passwords, hardware tokens, numerical codes, biometrics, time, and location. Many assert multi-factor authentication has evolved as the single most effective control to insulate an organization against remote attacks, and when implemented correctly, can prevent most threat attackers from easily gaining an initial foothold into your organization, even if credentials become compromised. Continue.
Most businesses are familiar with the use of a VPNs (Virtual Private Networks) for typical remote workers or occasional access to company resources from home. These solutions work very well, and allow employees to access file shares and other network resources as if they were sitting in their office. Because of this, businesses may feel that this is the obvious remote work solution when planning for Telework in response to an emergency or pandemic situation, but there are several considerations when making determinations about how best to work remotely on a company-wide scale. Continue.
According to the Federal Emergency Management Agency (FEMA), “Roughly 40 to 60 percent of businesses never reopen their doors following a disaster,” and “90 percent of smaller companies fail within a year unless they can resume operations within five days.”
It’s easy to delay Disaster Recovery planning, and you certainly hope to never have to use it, but a lack of planning could possibly mean that your business becomes another statistic.
So where do you begin? That’s where we come in. We have outlined nine key elements to developing a Disaster Recovery plan.Continue.
The pace at which technology changes and evolves presents businesses with the ongoing challenge of maintaining an effective, efficient and secure environment while continually planning for “what’s next” in the IT world. Continue.
The advent of hosted solutions has resulted in the ability of smaller businesses to access the types of infrastructure previously only available to enterprise-class organizations. These “As-a-Service” solutions run the gamut and deserve serious consideration. Continue.
Exchange is the gold standard for business Email. However, purchasing and maintaining your own Exchange server can be a costly endeavor. Through Office 365, you can get the power of Exchange for a nominal cost and increase your business’ security and functionality exponentially. Continue
Even though it has become a buzz word phrase in the last several years, the term Managed Service Provider or “MSP” is not a new “thing” at all. The history and evolution of the modern day Managed Service Provider or “MSP” started around the 1990’s with the emergence of Application Service Providers or “ASPs”. This subset of value-add IT providers really helped to lay the foundation for remote IT support. Back then is was primarily around IT infrastructure but today the proliferation of remote IT support is pervasive in just about any piece of technology that is connected to the internet via wired, wireless, or cellular methods. Continue
Ransomware. Just the name makes a Systems Admin sweat until they check the status of their backups. According to a study conducted by the Kaspersky Security Network, “the number of Kaspersky users encountering any type of ransomware increased 17.7% over the two years of the study. However, during the same period, the number of users encountering the cryptoware variant increased 5.5 times (from 131,111 instances in 2014-2015 to 718,536 instances in 2014-2016).” Meaning, there is more than one form of cryptoware and it is constantly evolving, creating more susceptibility and vulnerability to attack. The best protection against this new wave of threats is to educate yourself and prepare. Continue