Login 

Call Us Now:

Weston Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Subscribe to this list via RSS Blog posts tagged in Security

Mobile Device ManagementAs a business owner, you’re likely familiar with locking down the data on your corporate-owned computers. With technologies like disk encryption and strong password policies and other security measures, you can assure that it will be pretty difficult to access data that shouldn’t be accessed.

But what about those computers in your employees’ pockets, the fancy smartphones they carry around? Have they ever used them to access company email, files, documents, calendars, or contacts? It is certainly very convenient and can increase productivity to have access to that data with you at all times. What would happen if they were to lose that phone or if the employee left? Would your data or access to your company’s data fall into the wrong hands?

Not if they were secured by WestonSecureMobile, powered by IBM MaaS360. Previously, if you wanted full control of your employee’s mobile access, you’d have to buy them all phones and lock them down. With WestonSecureMobile, you can allow them to bring their own personal devices and you won’t have to worry.

WestonSecureMobile uses industry-leading technologies to allow your employees to access company resources on their mobile devices securely without putting their personal or your corporate data at risk. WestonSecureMobile is a suite of secure applications that gets installed on your phone that keeps your corporate data access secure and separate from the personal data on your phone. It provides centralized management of the devices, allowing you to selectively control access to corporate data, much as you would with your Windows Server back at the office.

If a phone is lost or an employee leaves, you can wipe and lock down portions of the phone that were accessing that data so the user’s personal data is left alone. It also allows tracking of the devices if they are lost or stolen.

It’s certainly cheaper to allow your employees to bring their own devices. With WestonSecureMobile, you can be assured that bringing their own device won’t compromise your company’s data or put it at risk. Contact us today for more information and pricing.

twofactorWe’ve obviously chatted about passwords and passphrases and tips for managing too many passwords. Obviously, strong passwords are very important in protecting your online accounts, but there is an additional way you can protect many of your accounts: two-factor authentication. What is it and why should you use it? Read on for all the details.

WannaCry Ransomware Outbreak

Posted by on in Alerts

You may have heard about the WannaCry ransomware attack that affected computer users worldwide (see this BBC story for the full details along with some technical details at Bleeping Computer). If Weston patches your Windows systems as part of our CompleteCare or other managed patching services, we applied a Microsoft patch to your covered machines back in mid-March that will help protect your computer from this particular ransomware (we also forced the install of the patch recently for machines that hadn’t been online for a while). However, this is yet another reminder to be extremely vigilant about what links you click on and what emails you open. Backups and business continuity planning are also critical if you are infected (read our recent whitepaper for more information on the Business Guide to Ransomware).

Even if you get an email and attachment from someone that you know, if you were not expecting it, contact that person and make sure it was sent by them. Many of these attacks utilize software that will attempt to impersonate an email user and send an email to everyone in their contact list.

If you are a HIPAA-regulated environment (or even if you're not), we recommend reading our blog article on ransomware and HIPAA and the various ways you can help protect yourself

Backups are still the best way to protect yourself. If you do manage to get encrypted with early variants of WannaCry, don’t reboot your computer as the recently-released Wannakey tool might be able to get the encryption keys. The early versions of the malware were poorly written and had a kill switch that slowed things down from becoming a lot worse than it was (new variants have since fixed those flaws).

It's a brave new world out there, stay vigilant.

-- Your Weston Support Team

Have You Signed BAAs with your Vendors?

Posted by on in Security

healthcareIT2If you are a HIPAA-regulated business or deal with HIPAA-regulated industries, you really have to trust your vendors. A security breach at a vendor’s office may as well be a breach in your office, as far as HIPAA is concerned. You need to have a business-associate agreement (BAA) signed with those vendors. And if that vendor has no idea what a BAA is, you might want to reconsider your relationship with them, for your own protection. In a recent news story, an Illinois-based clinic was fined $31,000 because they didn’t have a BAA signed with a vendor hired to store paper records containing patients’ protected health information (PHI) (that vendor is the focus of other investigations). You can read the full cautionary tale here. If you need any assistance with your vendors or other HIPAA regulations, don’t hesitate to contact your local Weston office today.

Microsoft Word Vulnerability

Posted by on in Alerts

Microsoft Word 2013 logoA vulnerability has been discovered in Microsoft Word that could allow malware to get into your system. Microsoft is working on a fix or this, but for at least the next couple of weeks be especially vigilant if you receive a Microsoft Word attachment from someone that you don't know.

If you get a document from someone that you do know that you were not expecting, it is a good idea to check with them and make sure that they sent it. It only takes a minute to check versus the hours to clean up and the possible loss of data if something gets through.

This is a good reminder that it's a cruel digital world out there so definitely don't click on links or attachments from anyone you don't know, and view with suspicion any links or attachments from someone you do know that you were not expecting (especially those that are asking for you to pay an invoice or transfer money). WestonBlock and our antivirus software should block most of these but nothing beats plain old vigilance.

More technical info on the Microsoft Word vulnerability for those of you interested can be found here

Don't hesitate to contact us at if you have any further questions.

-- Your Weston Support Team