Skip to content Skip to content
Close
Search
Palitto Consulting Services
  • Home
  • About
    • Company Profile
    • Employment Opportunities
    • Employee Information
    • Community Involvement
    • Alliance Companies
    • Contact Us
  • Services
    • Hardware & Software Consulting
    • Custom Programming & Design
    • Business Consulting
    • LAN / WAN Networking
    • VoIP & Telephony Implementation
    • System & Data Security
    • Maximizing Mitel
  • News

cyber security

The Risks of Rushing Remote Desktop Solutions: A COVID-19 Case Study

March 26, 2020March 26, 2020 by Kevin Denee
the-risks-of-rushing-remote-desktop-solutions

The Scenario in Brief:

Our client performs medical billing services for their clients across the country and had recently acquired a new customer in New York. Each time they intake a new customer our team is engaged to set up secure remote access to that customer’s site.

Given the sensitivity of the data being accessed it was necessary to provide an extremely secure solution, compliant with HIPAA regulations. In this case we deployed remote access utilizing the SolarWinds Remote Monitoring & Management (RMM) platform, with the included Take Control software. This solution provides an encrypted connection protected by multiple factors of authentication to gain access.

As soon as this monitoring software was installed it began reporting attacks from a host of different public IP addresses from multiple countries. We know from experience that when this activity is seen, typically someone has forwarded Microsoft’s Remote Desktop Protocol (RDP)  port through the firewall, for simple (albeit insecure) remote access. One of the greatest dangers of utilizing this antiquated remote access methodology, is that it has become a go-to method for bad actors to infiltrate and launch ransomware attacks against the target.

This particular chiropractic customer had recently employed an acquaintance to implement this solution. Given that the state of New York was recently shutdown, they had little time to act or properly plan for this sudden change. Unfortunately, the party was either not thinking through the cybersecurity ramifications or perhaps was unaware that ransomware is often spread through open RDP ports.

The Solution:

Our team quickly consulted with the parties involved, and offered options, including alternative remote solutions that were flexible enough to fit their workflow of iPad’s and Windows devices. We also suggested engaging with a local IT company if that was their preference. The client was relieved to know that this attack was caught in time (even if it was outside of the scope of our initial intent) and the opportunity was given to avoid business disaster. This would have conceivably shut down their business in the short-term in the middle of an already difficult situation.

We are thankful we can help this business stay in business through an already difficult time.

The Lesson:

We know that everybody is scrambling to setup remote access but you could make a bad situation worse if it is not accomplished in a secure method. Contact your trusted IT provider, or find a firm that can help you. If you have questions, don’t hesitate to reach out.
Categories Technology and Business News Tags cyber security, Cybersecurity, it services, ransomware

Learn About Cyber Security With Bryon Palitto of Palitto Consulting Services

December 13, 2019 by Kevin Denee
Cyber Security

Technology helps businesses become more efficient and connected, but it comes with downsides as well. Flaws in security can allow criminals to access important data, putting both companies and clients at risk. Cyber security is getting the attention of many businesses, but few know what to do.

Recognizing this issue, Bryon Palitto, CEO and founder of Palitto Consulting Services, has spoken on the topic at several venues over the course of 2019. Even if you can’t hear his presentation in person, you can learn about the most important points: why you’re a target, recent attacks and how to avoid becoming a victim.

Reasons Cyber Criminals Target Businesses

Bryon Palitto News Story PhotoCommercial enterprises have a wealth of data, even if they don’t know it. According to a recent survey, 54% – 68% of small businesses have personal customer information on file, including the following:

  • Billing addresses
  • Email addresses
  • Phone numbers

Online crooks can use this information to access accounts and potentially gain more critical data such as credit card numbers.

Businesses are also at risk for ransomware. These programs lock down systems so hackers can hold them hostage and demand ransom. In the end, cyber criminals are looking for power to force others to give them what they want.

Attacks You Should Know About

According to 2018 surveys, 67% of businesses were affected by attacks, making cyber security more important than ever. You may have heard of some of the biggest cases:

  • DDoS attack on Telegram Messenger
  • Stuffing attack on Dunkin’ Donuts
  • Hackers breach Citrix servers
  • Toyota data breach

Ways To Protect Yourself

Despite the dangers, there are ways to prevent breaches. First of all, you should hire professionals to do a risk assessment. This identifies weak areas in security protocol and systems, which you can then bolster.

You should also make sure all employees understand basic email security, password protocol and other relevant cyber security measures. Everyone is responsible for protecting a company, from the CEO to part-time workers.

Want to improve your security? Interested in Bryon speaking at your event? Palitto Consulting Services has been helping businesses protect their technology for over 20 years. For more information, give us a call at 330-335-7271 or contact us online.

Categories Technology and Business News Tags bryon palitto, cyber crime, cyber security, data protection, data security, Palitto Consulting Services, security Leave a comment

PCS Engineering Team Members Obtain Sophos Central Architect Certification

June 28, 2019 by Kevin Denee

Security threats of all sorts are a real concern to businesses these days. Sophos UTM (Unified Threat Management) is one of the leading next-generation cybersecurity systems specializing in keeping data safe in the rapidly developing cloud computing environment. To better serve our clients, two members of the PCS engineering team recently completed their Sophos Central Architect Certification. PCS congratulates Dan Allen and Ryan Ward for completing this advanced level of training.

Arrayed To Advance Our Service Level

Staying abreast of the latest technologies that enable businesses to protect themselves from security threats and breaches is a significant component of our philosophy of continual learning at PCS. By completing the required courses, attaining the Sophos Central Architect Certification and advancing their knowledge of network security to the next level, these engineers have positioned themselves to serve the needs of our customers better. They are now ready to assist our clients with advanced design and implementation of systems to increase security for wireless networks and web servers.

Committed To Remain on the Cutting Edge

As online attacks and business computing requirements become more complex, PCS remains committed to the challenge of equipping our team members with the tools necessary to provide simple, straightforward solutions for our clients. By mastering the intricacies of deploying and maintaining advanced tools such as Sophos, we can take much of the burden of IT management off of our clients’ shoulders. We focus on the details of cloud-based computing, helping you to make intelligent use of technology so that you can focus on expanding your business and reaching your goals.

We are ready to help you take the next step by leveraging technology to your full advantage. Contact PCS today and find out how our commitment to learning can help you improve your operation and move your organization toward more profitability and growth.

Categories Technology and Business News Tags certification, cyber security, pcs staff, security, sophos Leave a comment

Recent Posts

  • “Aunt Kate” Retires after 17 Years at PCS
  • Trent Gasser Obtains Firewall Certification
  • Ben Zelei Speaks about Cyber Security on Podcast
  • Javan Miller Acquires Several Certifications
  • Palitto Consulting in Top 20 IT Services Firms in Northeast Ohio

Recent Comments

    Archives

    • November 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • June 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • November 2020
    • October 2020
    • July 2020
    • June 2020
    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • June 2019
    • April 2019
    • March 2019
    • February 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • September 2017
    • August 2017
    • May 2017
    • April 2017
    • December 2016
    • March 2016
    • January 2016
    • December 2015
    • November 2015
    • October 2015
    • July 2015
    • June 2015
    • May 2015
    • February 2015
    • November 2014
    • October 2014
    • July 2014
    • June 2014
    • March 2014
    • February 2014
    • January 2014
    • December 2013
    • October 2013
    • September 2013
    • August 2013
    • July 2013
    • June 2013
    • May 2013
    • April 2013
    • March 2013
    • February 2013
    • January 2013
    • December 2012
    • November 2012
    • October 2012
    • September 2012
    • August 2012
    • July 2012
    • June 2012
    • May 2012
    • April 2012
    • March 2012
    • February 2012
    • January 2012
    • December 2011
    • November 2011
    • October 2011
    • September 2011
    • August 2011
    • February 2011
    • January 2011
    • December 2010
    • November 2010
    • September 2010
    • July 2010
    • June 2010
    • March 2010
    • February 2010
    • January 2010
    • December 2009
    • October 2009
    • September 2009
    • August 2009
    • January 2008
    • August 2007
    • March 2007
    • January 2007
    • November 2006
    • September 2006
    • August 2006
    • July 2006
    • May 2006
    • March 2006
    • February 2006
    • January 2006
    • December 2005
    • October 2005
    • September 2005

    Categories

    • Technology and Business News
    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Palitto Consulting Services

    150 Main Street
    Wadsworth, OH 44281
    P: 330.335.7271
    F: 330.335.7275
    Email Us
    Location Map

    Copyright © 2023 Palitto Consulting

    Content

    • Home
    • About
    • Services
    • News
    • Privacy Policy
    • Terms & Conditions
    • Maximizing Mitel

    Recent News

    • “Aunt Kate” Retires after 17 Years at PCS
    • Trent Gasser Obtains Firewall Certification
    • Ben Zelei Speaks about Cyber Security on Podcast
    • Javan Miller Acquires Several Certifications
    • Palitto Consulting in Top 20 IT Services Firms in Northeast Ohio
    Microsoft Gold Partner Logo International Association of Microsoft Channel Partners Logo Better Business Bureau Accredited Business Logo