Blogs

Home/Blogs

We are information security and technology managers, and our blog serves as the way to share useful industry information with you.  Here you will find updates about our company as well as stories about key issues in small business IT.

CISA Cyber Essentials for Small Business

By |2019-11-12T09:40:15-05:00November 11th, 2019|Categories: Blogs, Client Stories|

The Cybersecurity and Infrastructure Security Agency (CISA) has launched Cyber Essentials, an effort to assist small organizations in understanding and addressing cybersecurity risks. Developed in partnership with small businesses and small state, local, tribal, and territorial (SLTT) governments, Cyber Essentials aims to equip these organizations with basic steps and resources to improve their cybersecurity resilience. CISA’s Fall [...]

TrialWorks Hosting Ransomware Incident

By |2019-11-11T14:33:25-05:00October 16th, 2019|Categories: Blogs, Client Stories|

This has been a tough week for TrialWorks users; as we write this blog the fourth day of a ransomware disaster hosting outage.  According information shared by customers, the hosting system has been down since Sunday morning due to a ransomware attack.  Update:  reports of customers returning to operation have started to come Thursday. Ransomware can [...]

Mitigating Credential Compromise

By |2019-10-07T17:34:21-05:00October 7th, 2019|Categories: Blogs|

Majority of us continue to make bad choices with credential hygiene.  The formula for protecting credentials is fairly simple: unique passwords stored securely and multi-factor authentication.  Implementing that formula requires little more than the willingness to be inconvenienced slightly and a company policy that demands nothing less than "use unique passwords on every system and always [...]

Deploying anti-virus to multiple macOS devices at once

By |2019-10-07T08:55:12-05:00August 23rd, 2019|Categories: Blogs|

The Apple macOS security and privacy features make remote management tough.  Apple's macOS Sierra introduced new security features that simplify apps from the App Store, but complicate everything else.  This spells trouble for applications that need a lot of access, such as antivirus.  The reason they are complicated is quite simple: these applications expect lots of [...]

Cybersecurity for maritime commercial vessels and their operators.

By |2019-10-07T08:52:21-05:00July 12th, 2019|Categories: Blogs|

Once in a blue moon we have a business owner dismiss security risk based on claiming they are simply not interesting enough, or not valuable enough, to be targeted by malicious actors.  They see themselves as isolated, perhaps somewhat like ships at sea.  Well, even ships at sea are targeted and the recommendations from the United [...]

Apple Business just validated the Shared Responsibility Model

By |2019-10-07T08:50:23-05:00September 15th, 2018|Categories: Blogs|Tags: , |

The shared responsibility model has been the center of our end-user solutions, despite the idea being a tough sell.  Even today, it is relatively common for organizational staff to expect "help-desk" or "tech support" for issues big and small. While we modeled our business practices on shared responsibility within organizations, only Amazon Web Services was doing [...]

No-cost, secure, and high-performance DNS

By |2019-10-07T08:49:27-05:00April 2nd, 2018|Categories: Blogs|

Domain Name Servers (DNS) are the Internet’s equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because although domain names are easy for people to remember, computers or machines access websites based on IP addresses. TechBento DNS brings together cyber threat intelligence [...]

Self-Service Software

By |2019-10-07T08:47:50-05:00December 1st, 2017|Categories: Blogs|

Our macOS management agent offers two key features that were hugely important in November. The first, the ability to push updates and commands on the fly. We patched your systems for the macOS Root Vulnerability behind the scenes as soon as the information became public. The second feature is our expansion of the Self-Service application [...]

TechBento Pulse Expansion

By |2019-10-07T08:44:42-05:00November 1st, 2017|Categories: Blogs|

Our systems infrastructure team leverages TechBento Pulse, our remote management and monitoring platform, for auditing and administering your servers and critical systems. Along with the on-premise and helpdesk service expansions, we are also launching the next generation of TechBento Pulse. TechBento Pulse now extends the same level of audit and control we have over infrastructure down [...]

24/7 Level 1 HelpDesk

By |2019-10-07T08:44:22-05:00November 1st, 2017|Categories: Blogs|

We are committed to a manageable customer base and remaining a bespoke IT management and security services company.  While we encourage our customers to remain self-sufficient and use IT for issues beyond break/fix support, we recognize the need to support an ever-more complex world of devices and users. You can now add 24/7 help-desk and support [...]

Cybersecurity

Cybersecurity means protecting electronic devices and electronically stored information. Cybersecurity is a component of information security and addresses protection and restoration of information technology within an organization. All organizations are different and thus require different levels or protections. Likelihood is the chance that a threat will affect a business and serves as a guide in determining what protections should be put into place.

Readiness

Strategic thinking is at the heart of information security and each organization needs to meet demands of adequate security. Any company, big or small, should be capable of doing an inventory of all information technology assets and analyzing risks. For small organizations this can be as simple as understanding each asset’s confidentiality, integrity, and availability needs; rating it’s importance to the business and acceptable recovery points and time windows; and allocating resources for methodical solutions to the most important parts.