For the third straight year, TechGen has maintained the ISO 27001 certification. Very few companies our size have achieved this. Basically, it means our own IT house is in order, so we’re not just saying we can help you do the same — we’re proving it.
Two common, insidious cyber-related crimes — employee fraud and fake email requests for wire transfers — can bleed your SMB’s bottom line over months or years. Learn the five internal cybersecurity controls that accounting experts recommend to prevent these and other losses.
https://techgen.com/wp-content/uploads/2019/08/iStock-480137882.jpg8361254Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2019-08-14 08:00:422019-09-17 01:55:31Five Cybersecurity Controls That Thwart Wire Transfer Scams and Employee Fraud
A cyber thief once tricked an employee into transferring millions of dollars from the employer’s account into the thief’s account. How? By mimicking the employee’s CEO’s distinctive writing style. This wasn’t an attack on the company’s IT network. It was something far darker.
https://techgen.com/wp-content/uploads/2019/07/iStock-169957915-e1564499297637.jpg453680Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2019-07-31 08:00:402019-08-02 16:08:235 Keys to Creating Cybersecurity Awareness Training Your Team Won’t Snore Through
For small to medium-sized financial advisor firms, the best cybersecurity tool you may never have heard of is FINRA’s “Checklist for a Small Firm’s Cybersecurity Program.” Follow these tips on completing it, and your clients’ sensitive data — and your business — will be much safer.
https://techgen.com/wp-content/uploads/2019/07/iStock-1011182136-e1563327660252.jpg236680Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2019-07-17 08:00:572019-07-17 13:13:30How to Use the FINRA Cybersecurity Checklist for Small Firms
Say goodbye to Windows 7, especially if your firm must comply with cybersecurity regulations. In less than six months, if you have even one PC on Windows 7 still connected to your IT network, you’ll open a backdoor exposing your data to hackers. Close that door now.
https://techgen.com/wp-content/uploads/2019/06/iStock-959550642-e1561595694617.jpg459680Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2019-06-27 08:00:392019-08-22 22:09:265 Common Mistakes for SMBs to Avoid as Windows 7 and Server 2008 Demise Looms
The more your business’s IT system grows, the more you need an up-to-date network diagram. You or your IT services provider may need it in an urgent troubleshooting situation. And that’s only one of the five reasons to have a network diagram — especially if you’re not an IT expert.
https://techgen.com/wp-content/uploads/2019/01/iStock-1065240764-e1548088834935.jpg245490Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2019-01-22 08:00:002019-07-10 11:56:18Why Your Small Business Needs an IT Network Diagram Before Trouble Hits
Microsoft is retiring Windows 7 soon, and small businesses still using it are risking data breaches and deteriorating performance. Waiting until the last minute to upgrade to Windows 10 from Windows 7 could be risky. Instead, discover a smarter way to handle this and future upgrades.
https://techgen.com/wp-content/uploads/2018/12/iStock-808814122-e1544991240797.jpg452679Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2018-12-17 08:00:312019-07-10 11:58:26Small Business Dilemma: Should I Upgrade to Windows 10 From Windows 7?
Malware-packed phishing emails to small businesses are increasing — because they flat-out work. And the fallout for you and your customers can be catastrophic. Learn to spot typical phishing ploys, and follow four best practices to protect your business from phishing.
https://techgen.com/wp-content/uploads/2018/11/iStock-873960136-e1543429206325.jpg250333Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2018-11-30 08:00:282019-07-10 12:06:26How to Prevent Phishing Attacks: 4 Ways to Protect Your Small Business
For an entrepreneur, a breakthrough product or service idea is the seed. Research makes it grow. Here’s how Twin Cities startups and small businesses can get professional help researching key business areas, plus some IT areas you’re probably wasting time trying to learn yourself.
https://techgen.com/wp-content/uploads/2018/11/iStock-469370814-e1541170176261.jpg326489Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2018-11-05 08:00:372019-07-10 12:08:57Twin Cities Startups and Small Businesses Can Get Free Professional Research Help
Giant data breaches at giant corporations make headlines just about every month. But small businesses have become the favorite target of hackers. Fight back: Defend your small business’s IT network by following our annual 11-point IT security checklist.
https://techgen.com/wp-content/uploads/2018/10/hand-e1540222550499.jpg377666Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2018-10-17 16:13:382019-07-10 12:11:41The 11-Point IT Security Checklist for Small Businesses
It’s a seller’s market for Minnesota small businesses. But Andy Kocemba, who counsels small business sellers, says you can still leave big money on the table. Before putting your business on the market, answer four critical questions — one of which relates to your IT infrastructure.
https://techgen.com/wp-content/uploads/2018/08/Picture2.jpg415824Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2018-08-30 08:00:222019-07-10 13:08:59Why a Minneapolis Business for Sale Needs to Consider its IT Infrastructure
Scheduling meetings can be tricky when you run a small business, especially when you include people from outside your business. If you use Microsoft Office, learn how to share your Outlook calendar. Here’s a quick guide, plus tips on two free apps that help you set up meetings quickly.
https://techgen.com/wp-content/uploads/2018/07/iStock-842826736.jpg25783863Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2018-07-23 17:29:562019-07-10 13:10:42How to Share a Calendar in Outlook, FindTime, Calendly
We all have favorite apps that we use every day. Here are a few that will make you more productive and efficient.
Jog.ai – This is a neat web service that you can use to take meeting notes for you. Jog.ai acts as a middle-man recording your telephone calls. It not only gives you a high-quality recording, but will also transcribe your call, so it is searchable later. While you’re on a call, you can use the jog.ai web app to ‘mark’ important parts to refer back to later. Best of all, it will “listen” for keywords like “action item” and automatically highlight that part of your call. Just make sure you let the other caller know if you’re talking to someone in a state that requires that kind of notification.
LastPass – Lastpass stores your passwords securely behind a super-strong “master password” and also supports multi-factor authentication to further protect your credentials. Lastpass syncs between your different computers, and mobile devices, so you can always access your important sites. Other really useful features; securely sharing credentials with others, and storing credit card and bank information – automatically filling out web-forms so you don’t need to track down your wallet!
Boomerang – A great plugin for Outlook or gmail.com Boomerang reminds you to follow up on emails at some point in the future if the recipient doesn’t send you a reply. But – one of the most powerful features is the ability to “share” preferred meeting dates with someone via email. For example; if you’re trying to setup a conference call, you can pick a couple of dates/times that are available on your calendar and include those in the message. Boomerang will automatically send an invite to both of you with the time-slot that the recipient selects. I find this to be a little more personal than services like Calendly.com
Calendly – This is a great service that automatically syncs with your calendar and creates a simple website that shows your availability. You can create different “booking templates” for things like 30-minute calls, 60-minute face-to-face meetings. Calendly will let you specify specific minimum & maximum availability ranges, as well as custom fields that are added to the meeting. Now when someone says; “Hey are you available next week?” You can reply with your Calendly link, and they can pick a time that you’re available – that works for them too!
Interested in trying out any of these apps? We can help you install them and integrate them with your existing systems! Just contact us and we’ll be happy to help!
PCI-DSS, ISO, HIPAA; you have probably heard many acronyms like these in reference to IT security. There are so many laws and organizations these days, it can be difficult for a person to know where to begin looking. This blog post will help introduce you to the topic so you can consider what might apply […]
Another large Ransomware attack this month forced an Indiana hospital to pay four Bitcoins, or $55,000. This is unfortunately an increasingly common story, but this one has a twist – they had backups of their data but still chose to pay. Why? Restoring their backups could have taken weeks, and it would have been too […]
It’s the end of the year, and with the holidays wrapping up it means “time to get back to work” for most of us, but it means “time to kick into high gear” for hackers. With many companies running with partial staff, identity thieves see them as prime targets. When employees have extra workloads, they […]
https://techgen.com/wp-content/uploads/2017/12/HNY_Card_Firework.png10001000William Amos//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngWilliam Amos2017-12-26 23:18:572018-12-14 21:43:51End of Year Scams
No matter how secure your network is, the first line of defense is always your employees. They are the gatekeepers to your network – deciding which emails are opened and allowed in. Hackers know that they can’t do anything until they get inside. Just like someone who wasn’t invited to the party, they will pretend to know someone, pretend to be someone else, or make up whatever other lies they can to get inside. In the computer world, those fake and malicious emails are called “phishing emails.” Because of how dangerous they can be, the ability to recognize phishing emails is critical to network security.
Here are some things to look for to help you and your employees determine if an email is legitimate, or a party crasher.
Make sure the email is something you were expecting to get. Unsolicited requests, invoices, and links should be suspicious.
Hover your mouse over every link before you click it. You will see a small popup that tells you where the link goes. Make sure the link goes to the correct place before you click. One way to always be safe is to navigate to the website yourself in your browser and don’t click the link at all.
Double check the email address that the email is coming from. Sometimes fake emails will use addresses similar to real sites (e.g. “Techgem.com” instead of “techgen.com”)
Did they misspell my company name or make other mistakes on the email? Do they use a generic name instead of mine?
Do you know the person sending the email? Is this the type of email they usually send? Look at the signature of the email and make sure it matches their usual signature. If their identity is in doubt, you can always call them and verify the authenticity of the email.
Phishing emails will try to make you click without reading. Check to see if the email implies urgency or extreme importance. For example: “IMMEDIATE ATTENTION – YOUR ACCOUNT WILL BE CLOSED”
Look for misspellings and poor grammar. Many people who send phishing emails don’t speak English as a first language.
There can be other, subtle red flags. For instance, does the email have a strange subject line, signature, or layout?
Sometimes, a legitimate email may have one of the above, but by looking at a combination of the above, you can usually tell a phishing email from a normal one.
Attached below is an example of a real phishing email, with the suspicious features we used to identify it pointed out. Take a look at how we applied the tips mentioned above.
Once again high profile hacking is in the news. Accounting firm, and security advisor Deloitte was illegally accessed by unnamed hackers last month who had managed to compromise an administrator account and used it to access one of Deloitte’s Microsoft Azure accounts. So far, at least six of their clients have been informed that data including […]
Its clear that the Equifax breach is a big deal due to the type of information exposed. We’re sharing some simple tips to protect your personal information, and protect your business at the same time. Still relevant a year later!
https://techgen.com/wp-content/uploads/2017/01/contact-us.png350407Reid Johnston//techgen.com/wp-content/uploads/2016/04/techgen-logo-300x88.pngReid Johnston2017-09-09 16:35:242018-12-14 21:57:35Simple Ways to Protect Your Online Accounts and Your Business [Updated!]
Everyone should use a password manager like LastPass, 1Password or Roboform to ensure they’re using separate, complicated passwords on each website visited. This article will specifically show some quick tips/videos about using LastPass. You’ll primarily use the app through Chrome/IE extension. The video below will show you how to use it. Creating secure passwords is easy. […]
TechGen is pleased to announce that it has been awarded the ISO 27001:2013 certification.
ISO 20071 is an internationally recognized set of security standards that outlines hundreds of controls designed to protect IT infrastructure as published by the International Organization for Standardization (ISO). These standards address a wide range of physical, technical, and legal controls relevant to mitigating vulnerabilities and risks to data. The 2013 edition of the standards is the most recent, and most rigorous; addressing policies around access control, business continuity, human resources, incident management, physical security, and technical procedures.
TechGen has demonstrated to A-LIGN, an independent, third-party auditor, that it has technical controls in place and formalized IT Security policies and procedures. A-LIGN is an ISO / IEC 27001 certification body accredited by the ANSI-ASQ National Accreditation Board (ANAB) to perform ISMS 27001 certifications. Customers can be assured that TechGen takes concerns about the safety of their data extremely seriously, and has committed to meeting the highest standards available to protect them. This certification is a demonstration of that commitment to clients. TechGen continues to design, implement, monitor and maintain security controls that protect client information.
Everyone has heard a lot about password security, but as of June the suggested practices have changed. With the constantly evolving world of cyber threats in mind, researchers at the National Institute of Standards and Technology (NIST) have gathered a significant body of evidence about what types of passwords work and which ones don’t. A […]