Blogs

Home/Blogs

We are information security and technology managers, and our blog serves as the way to share useful industry information with you.  Here you will find updates about our company as well as stories about key issues in small business IT.

COVID-19 prompts the activation of disaster response plans

By |2020-03-02T08:29:45-05:00February 24th, 2020|Categories: Blogs|

TechBento considers the COVID-19 threat as a high-risk event with severe disruptions to systems, business operations, and financials.  We anticipate heavy influx of ill-prepared organizations seeking last-minute guidance on continuity planning, remote access, requests for additional capabilities, hardware purchases, communication tools.  As a result we have activated our Disaster Recovery & Response plan for large-scale cybersecurity [...]

ActivTrak on macOS using Addigy and your own MDM Solution

By |2020-01-14T14:58:26-05:00January 14th, 2020|Categories: Blogs|

Monitoring employee activity on macOS is hard.  One of the most popular players in this space is Veriato with a close second of Ekran. Verioto is the owner of Cerebral and Vision, some of which was once known as SpectorSoft 360.  There are several other on-premise and cloud hosted solutions out there, and most do not [...]

CISA Cyber Essentials for Small Business

By |2019-11-12T09:40:15-05:00November 11th, 2019|Categories: Blogs, Client Stories|

The Cybersecurity and Infrastructure Security Agency (CISA) has launched Cyber Essentials, an effort to assist small organizations in understanding and addressing cybersecurity risks. Developed in partnership with small businesses and small state, local, tribal, and territorial (SLTT) governments, Cyber Essentials aims to equip these organizations with basic steps and resources to improve their cybersecurity resilience. CISA’s Fall [...]

TrialWorks Hosting Ransomware Incident

By |2019-11-11T14:33:25-05:00October 16th, 2019|Categories: Blogs, Client Stories|

This has been a tough week for TrialWorks users; as we write this blog the fourth day of a ransomware disaster hosting outage.  According information shared by customers, the hosting system has been down since Sunday morning due to a ransomware attack.  Update:  reports of customers returning to operation have started to come Thursday. Ransomware can [...]

Mitigating Credential Compromise

By |2019-10-07T17:34:21-05:00October 7th, 2019|Categories: Blogs|

Majority of us continue to make bad choices with credential hygiene.  The formula for protecting credentials is fairly simple: unique passwords stored securely and multi-factor authentication.  Implementing that formula requires little more than the willingness to be inconvenienced slightly and a company policy that demands nothing less than "use unique passwords on every system and always [...]

Deploying anti-virus to multiple macOS devices at once

By |2019-10-07T08:55:12-05:00August 23rd, 2019|Categories: Blogs|

The Apple macOS security and privacy features make remote management tough.  Apple's macOS Sierra introduced new security features that simplify apps from the App Store, but complicate everything else.  This spells trouble for applications that need a lot of access, such as antivirus.  The reason they are complicated is quite simple: these applications expect lots of [...]

Cybersecurity for maritime commercial vessels and their operators.

By |2019-10-07T08:52:21-05:00July 12th, 2019|Categories: Blogs|

Once in a blue moon we have a business owner dismiss security risk based on claiming they are simply not interesting enough, or not valuable enough, to be targeted by malicious actors.  They see themselves as isolated, perhaps somewhat like ships at sea.  Well, even ships at sea are targeted and the recommendations from the United [...]

Apple Business just validated the Shared Responsibility Model

By |2019-10-07T08:50:23-05:00September 15th, 2018|Categories: Blogs|Tags: , |

The shared responsibility model has been the center of our end-user solutions, despite the idea being a tough sell.  Even today, it is relatively common for organizational staff to expect "help-desk" or "tech support" for issues big and small. While we modeled our business practices on shared responsibility within organizations, only Amazon Web Services was doing [...]

No-cost, secure, and high-performance DNS

By |2019-10-07T08:49:27-05:00April 2nd, 2018|Categories: Blogs|

Domain Name Servers (DNS) are the Internet’s equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because although domain names are easy for people to remember, computers or machines access websites based on IP addresses. TechBento DNS brings together cyber threat intelligence [...]

Self-Service Software

By |2019-10-07T08:47:50-05:00December 1st, 2017|Categories: Blogs|

Our macOS management agent offers two key features that were hugely important in November. The first, the ability to push updates and commands on the fly. We patched your systems for the macOS Root Vulnerability behind the scenes as soon as the information became public. The second feature is our expansion of the Self-Service application [...]

Cybersecurity

Cybersecurity means protecting electronic devices and electronically stored information. Cybersecurity is a component of information security and addresses protection and restoration of information technology within an organization. All organizations are different and thus require different levels or protections. Likelihood is the chance that a threat will affect a business and serves as a guide in determining what protections should be put into place.

Readiness

Strategic thinking is at the heart of information security and each organization needs to meet demands of adequate security. Any company, big or small, should be capable of doing an inventory of all information technology assets and analyzing risks. For small organizations this can be as simple as understanding each asset’s confidentiality, integrity, and availability needs; rating it’s importance to the business and acceptable recovery points and time windows; and allocating resources for methodical solutions to the most important parts.