(630) 844-9434 info@trtechnologies.net

The Costs of Email Mistakes

While often understandable, user error is most commonly the root reason for the majority of IT problems. While not necessarily not only creating technical issues, users making mistakes can cause problems for IT to secure other systems. Something as simple as sending an email to the wrong email address, or replying to all on an email containing confidential information can cause catastrophic problems that cause IT to react quickly to attempt to reverse mistakes. These types of mistakes are often very costly if not caught in time as it allows secured information to quickly become public information that can be used for malicious intent. These issues can also cause compliance issues for some organizations. Examples of Email Mistakes College Accidentally Sends Thousands of Student Records to the Wrong Email Address In 2014 a California community college employee accidentally sent thousands of student records to the wrong email address. What happened is that an employee of the community college was to send these records out to an external address. Because of how large the data was, the mail was rejected and sent back to the employee saying that it couldn’t be sent. This employee then tried to send using a personal email address, but accidentally typed in the incorrect address of the intended recipient and sent the email. At the time the email was sent it appeared that the mistyped email address was an invalid account and the records were never compromised, however the school still had to lock down its systems and provide credit monitoring for all those that would have been potentially affected. Bank Sends Confidential Information to...

Data Center Backup and Disaster Recovery BDR Solution

Project Data Center Backup and Disaster Recovery BDR Solution Company Profile Hosts SaaS solution for a QMS and ERP product Has greater than 400 clients Employs a local development staff and environment Company Situation They want better data retention of their client solution They want to have a backup and disaster recovery (BDR) solution for their data centers They want to backup local data for backup and disaster recovery solution Client Technical Situation Client has a production data center that their clients access their SaaS solution through Client has a backup data center that has a disaster recovery environment for failover that is replicated from production data center Client has a local environment with multiple lab and production development servers 4 server instances at each data center and network location, along with multiple physical host servers Our Discovery The customer is replicating all data from the production data center to the backup data center, however the data has not been backed up incrementally for time period snapshot data recovery. The local environment had backup software, but no images for bare metal recovery and for disaster recovery. Additionally, backups were full backups to an offsite host, containing terabytes of data. The backups were taking too long to complete and accurate data was not consistently backed up. Our Solution TR Technologies, Inc. is a vendor of several Backup and Disaster Recovery solutions. Our solutions vary depending on case. In this case, a unified solution that could be backed up to client specified locations without the use of a 3rd party storage location would be ideal. The client wanted to be able to...

5 Examples of Social Engineering Attacks

In 2012, a Wal-Mart store manager in Canada received a phone call from a “manager in the headquarters of Wal-Mart in Bentonville, AK” about a possibility of winning a large government contract. During the course of this conversation, the “manager” took detailed notes of key corporate information from questions he was asking the Canadian store manager. Of this information the “manager” was able to obtain physical logistics such as the janitor contract, the cafeteria provider, staff schedules and pay periods. He was also able to obtain information on the computer systems in use at the store along with critical pieces of information about the types of security measures that were used. The problem is – THERE WAS NO MANAGER IN THE HEADQUARTERS AND THERE WAS NO GOVERNMENT CONTRACT. The call was part of competition run by DefCon. DefCon is a hacker convention where hackers show each other their newest and cutting edge hacking timps. The “manager” had managed to get the identity of a real manager in the headquarters of Wal-Mart and used this to play a game of ‘capture the flag’ where he was able to capture all items of significance on a checklist in this competition. Examples of Social Engineering This is all social engineering. So much is done technically to thwart attackers when it comes to securing a network, including using firewalls, desktop and server security software, etc., but the use of social engineering can completely circumvent all these protection methods when the inside of an organization can so easily and willingly give away all the information and ways to access it. The following are examples...

How to Join a Computer to a Domain

To check if a computer is joined to a domain 1)  On Windows Vista or newer: Click Start>Right Click Computer, then Click Properties On the left side, click Advanced system settings, then skip to step 3 2)  On Windows XP: Right Click on My Computer, then Click Properties 3)  Click the Computer Name tab 4)  Click the Change button If the Domain: radio button is selected, it’s part of the domain.  If the Workgroup: radio button is selected, it’s part of a workgroup and you’ll need to change to domain. Click Cancel twice to exit out of this process To Join or Rejoin to the domain 1)  You’ll need domain administrator credentials and the domain name to complete the following 2)  Complete steps 1-3 in the first section – ‘To check if a computer is joined to a domain’ 3)  Click the Network ID… button 4)  Make sure that ‘This computer is part of a business network;…’ is selected and click Next 5)  Make sure that My company uses a network with a domain is selected and click Next 6)  Click Next again 7)  Type in your username, password and domain NOTE: don’t type the administrator name here, unless that’s the user you are adding to this computer 8)  If this computer has the same name or if it was previously joined to the domain, you’ll get the following message, Select Yes 9)  To add the user to this computer as a local user, click Next 10)  Choose the account type for this user, then click Next 11)  Click Finish, Then click OK on the System Properties window You’ll...

What is MSP?

What is MSP, or what is a MSP? Broadly speaking, MSP stands for Managed Services Provider.  A Managed Service Provider provides IT, and network services to an end user that may be an individual, a small business, or an enterprise. Managed Services take many forms, but provide a service or set a of services that complement the IT services for an entity.  These MSP’s could be hosting companies, network providers for networking of multiple locations, or telephone service providers. A managed service provider will provide the IT service that is needed, and will typically provide all the hardware and software that facilitate the management of the IT service. Examples of Managed Services could be any of the following: A company that manages the backups and disaster recovery services, ensuring that backups are scheduled and run successfully so that an organization doesn’t spend time wondering if they have good backup information for either recovery/discovery/archival purposes or for complete restoration in the event of a disaster An IT company that provides monitoring, management, and/or helpdesk services or IT services to an entire small business’ or to an enterprise computer and network systems. This takes the burden off of the IT staff in larger organizations or a non IT person in a smaller organization that’s been tasked with taking care of users’ problems by assisting all the users in an organization directly. The managed services provider in this case will typically take care of monitoring all systems to find that they are running properly or notify the organization of a potential systems error, to take action prior to any major systems downtime....

Server or Cloud for Small Business

Server or Cloud for Small Business – Comparison With server 2003 End-of-Life just around the corner, many businesses find themselves deciding what to do about a new server.  There’s been a lot of big talk lately about cloud what I can do for you, and if you go out and search you’ll find all kinds of options. However, do you think but the cloud will be best for you? Or, should you think about replacing that server with another server? The Cloud Is a Great Option The cloud is a great option; however there are differences between going to the cloud for a server, and using the cloud for services.  If you’re just looking for a file sharing option for all of your end users, then going to the club may be a good option. They can use their mobile devices to connect to it, there would still be security, and it would allow for easy collaboration no matter where the end users are. However a lot of businesses find themselves in different circumstances on what they need from their server. There are also other cloud services available such as data backup services, endpoint security services, email filtering services, employee monitoring services, etc. If these are the only types of things you use, the cloud might be a good option. Replacing Server with another Server Still a Good Option For a lot of our clients, replacing the server with another physical server and updated software is still the best option. Many of our clients have a line of business application that they use. This is usually a typical circumstance....