Our Blog

Cybersecurity Awareness Month- Tips to Keep Your Data Safe and Secure

From computers to cell phones, tablets, and more, we are constantly connected and sharing data with the world. With October being Cybersecurity Awareness Month, our team here at ICC have gathered some tips to make sure you stay on top of your cybersecurity measures to keep your data protected.

  1. Think before you click

Hackers will send emails disguised as shipping confirmations, past due notices, or emails from your boss. Take a second to think before you click, check the email address, and make sure nothing looks out of the ordinary.

  1. Use multi-factor authentication (MFA)

Multi-factor authentication is an extra layer of protection when accessing your data. Once you enter your password, a code is sent to confirm your identity. MFA makes it harder for hackers to access your account.

  1. Keep up with updates

Make sure to stay on top of all updates so your system isn’t left vulnerable to hackers. Outdated security measures and technology can put your system at risk or may cause crashes or downtime. An assessment conducted by the ICC team will help to ensure that your business’ software is up to date and secure.

  1. Back up your data

Anything could happen at any time and it is best to be prepared! Back up your system often to improve restore times and accuracy. Work with our IT professionals at ICC and they will help you set a plan for backing up your data that suits your needs.

  1. Ensure you understand all policies and procedures

Joining unsafe networks from your personal device when accessing company information could put your data at risk. Speak with us about safe ways to access this information and how to manage your risk.

  1. Don’t overshare on social media

The information you post on social media is easier to find than ever. Be careful what you share for hackers are always on the prowl for easy access to data.

  1. Ensure your security awareness training is ongoing

ICC is here to help! We have training sessions that can teach your employees how to recognize suspicious emails or activities.

  1. Use your mobile devices securely

Open or public Wi-Fi networks can expose you to cybersecurity threats. When possible, use your own personal hot spot for internet access or your cellular data.

  1. Look out for phishing scams

Phishing emails are the number one-way malware/ ransomware is delivered. We can provide email phishing training to your employees to lower the risk of opening unwanted emails and attachments.

  1. Properly dispose of electronic media

ICC can help dispose of electronic hardware and devices, so it doesn’t fall into the wrong hands.

  1. Create a cybersecurity friendly culture

Our team at ICC is here to help your team navigate the world of cybersecurity. We value our relationships and want to create the best plan of action according to your budget and needs.

  1. Monitor your credit and financial statements

Keep an eye out for any suspicious charges or activity on your credit card or financial statements. Make sure to follow up with your financial institution if anything looks suspicious and update your passwords.

  1. Don’t underestimate a hacker’s interest in your data

58% of cybersecurity attack victims are small businesses. Let us help protect your data and create a personalized I.T. strategy today.

  1. Virtually and physically secure sensitive information

In our 20+ years of business, we have come across unlocked server rooms, servers placed out in the open, and passwords written on sticky notes. Data breaches aren’t always online so it’s important to keep your data protected and secure.

The ICC team is available to assess your business’ security, technology, and overall IT plan. Contact us today to learn more 970.821.8592.

Read On

October 28, 2020

Security

The Risks of Using Outdated Technology

Technology is everchanging, and as businesses continue to evolve and adapt in the world, they must keep up. From the cloud to updated software and new applications, updating your technology is essential. If you do not update your technology, there are many risks that can affect your business such as security, system downtime, higher support costs, and trailing behind the competition.

Security

The most important risk factor for outdated technology is security. With the capabilities of the internet, and technology today, security is a number one priority in keeping your business safe. With new online scams popping up every day, outdated software and security tools can compromise your business operations. A proper assessment will ensure your systems are safe.

Crashes and system downtime

Nowadays, business takes place 24/7, 365 days a year. Computers and operating systems are important to your daily business and must always be working efficiently and effectively. If your security or software applications are not updated, you may experience crashes and system downtime. Software updates become outdated and may not be readily available if your system unexpectedly comes to a halt. That is why it is important to stay on top of security patches.

Higher support costs

A risk of using outdated technology is the cost you can incur maintaining and repairing it. Older technology is less energy-efficient than today’s technology and uses more power. It also takes more time to keep older systems up and running. In addition, updates may not be readily available with an older system. Although new technology may be more costly upfront, the cost will balance itself out with less need for maintenance and repair as time goes on.

Sets you behind your competition

Older technology may not produce results as quickly, leaving your business operating slower and not functioning at its full capacity. Time is money, and an updated system will help produce work faster and keep you in line with your competition. If your competitors continue to advance their technology and you trail behind, your business will be left trying to catch up.

If you have questions about your systems technology and would like the ICC team to assess your needs, contact us at 970.821.8592 or at info@iccusa.net.

Read On

August 10, 2020

IT News

Welcome Josh Layton to the ICC Team!

We are proud to announce Josh Layton as our newest employee here at Integrated Computer Consulting (ICC). He will be working in the Business Development department to assist in growing our clientele here in northern Colorado.

Josh comes to us from Limon, Colorado. He studied Finance at the University of Denver and has held various positions in multiple industries before becoming an IT technician and then moving into sales. Josh has experience in healthcare IT solutions and with a background in finance can assist clients in understanding their system and cost analysis.

Josh will bring professionalism, attention to detail, and great communication to our clients to make the overall sales process an enjoyable experience.

When Josh is not selling IT solutions, he enjoys spending time with his fiancé, Jennifer, and his 9- year old daughter, Adilynn as well as going to the gym, golfing, hiking, and wake surfing. He also has four pets: a 2.5-year-old puggle named, Henri, a 7-month-old golden retriever named Dug, and two fish names Glowie and ‘Merica.

We are so happy to have Josh Layton on our ICC team!

Read On

July 10, 2020

ICC Team Members

What is a Cyber Security Risk Assessment?

With the majority of work being completed online with access to company information, assessing your cybersecurity risk is critically important for keeping your company’s private and valuable information safe.

What is a Cyber Security Risk Assessment?

A Cyber Security Risk Assessment is a service that ICC provides to assess the data that is at risk when a cyber breach occurs.

What does a Cyber Security Risk Assessment entail?

ICC uses leading assessment tools that run in your environment for a period of days to gather information. ICC will compile the results and present this information in an easy to understand format. ICC’s assessment includes:

Data Risk Assessment – Data such as PHI, payment info, health records, photos, addresses, names, SSNs, etc. will be assessed. If that data is not properly protected or destroyed if not needed, it can lead to serious financial implications.

Fake Phishing Test – Since 91% of attacks come though employees clicking on malicious links, phishing tests are important for assessing risk.

Patch Management Status – The status of an operating system and application patches is a huge factor in the overall strength of a network’s ability to ward off attacks.  If the operating system is outdated or the patches are not current, this is a huge vulnerability and can leave your business exposed to malware/ransomware.  Additionally, updates for applications like Java and Adobe are two avenues hackers will use to gain access.

Dark Web Scan – What data has been compromised from employees and the business.

Scanning Network Port and Service – Yes, if certain ports are left open, someone can gain access to your network simply by typing an IP address in their browser’s address bar.  ICC examines the vulnerable ports which can allow access to sensitive information.

Network Mapping – ICC will provide a network diagram for you to see how the network is connected and where the emphasis should be directed.

Reporting – ICC will compile a detailed report of all findings as well as any recommendations for a secure computing environment.

Incident Response Plan – This is an additional service ICC can provide to your cybersecurity assessment.  ICC will outline a very detailed set of instructions in case of a variety of scenarios such as a breach, physical theft, server crash, cyber-attack, or even natural disasters. This service is not included in the assessment.

The I.T. landscape has changed and a cybersecurity risk assessment is critical.  Cyber-attacks have increased by 72%, especially with COVID-19.  With technology being such a crucial component of any business’s ability to operate, proper management and security practices are important for the health of a business’s network and the safety of patient/client data.  Many businesses feel as though they are not a target or simply choose not to employ the resources to protect themselves against an attack. This will have a significant financial impact when data or the network are compromised. For more information on ICC’s cybersecurity risk assessment, give us a call at 970.821.8592 or contact us at info@iccusa.net.

Read On

June 16, 2020

IT Services

How to Keep Your Home WiFi Network Secure

With working from home being the norm these days, it is important that you keep your home WiFi network safe. Many remote employees are accessing onsite servers and cloud resources or other important and confidential information that if leaked, could cause harm to their work and their company’s business. Here are a few steps to make sure that your home WiFi network is updated and secure.

Change the Administrator Password for Your Router

Administrator passwords are different from the one you use to connect to your router and WiFi. Administrator passwords are fairly common and any novice or advanced hacker can easily find this password. Changing this password will help to keep your WiFi network safe.

Follow these steps to change the administrator password:

  1. Look for the label on your router with the IP address, administrator username, and password
  2. Open a new tab in your web browser
  3. Enter the IP address in the web address bar
  4. Enter the administrator username and password on the login screen
  5. Look for the administration area and change the password. Make sure you set a long password using a variation of letters, symbols, and numbers.
  6. Make sure to disable remote administration. This allows someone from outside your home to connect to your WiFi and access information.

Update Firmware

When you are logged in to change your administrator password, make sure to update your router’s firmware. There may be fixes or updates needed since it was last updated. It is essential to update your router’s firmware to protect it from threats. In the administrator window, you should be able to locate where to perform this update. We recommend setting your router to auto update if possible.

Configure WiFi Security Settings

There are three settings that you should make sure to check: SSID, encryption method, and WiFi password.

  1. WPA3 is the newest wireless encryption standard but most routers offer WPA2 encryption so that is the best selection. Be sure to select WPA2-PSK, WPA2-PSK (AES), or WPA2-personal.
  2. Be sure to change your wireless password to something more complex using letters, symbols, and numbers.
  3. Change the SSID or name of your wireless network to something generic and hard to identify.

If you have any additional questions about how to keep your home WiFi network secure or if you need any assistance, contact the IT team at Integrated Computer Consulting (ICC) at info@iccusa.net or 970.821.8592.

Read On

April 27, 2020

IT News

VoIP- Internet Phone Systems to Help You Work from Home

Working from home these days is slowly becoming the new normal. With the recent virus threat, majority of businesses have sent their employees home to work from a more safe and comfortable space. However, when working from home, employees don’t have access to some of the hardware needed to conduct business effectively on a daily business. They are also scrambling to set-up an in-home office to create a productive and reliable workspace.

Integrated Computer Consulting or ICC has seen an influx over the last week for remote phone systems as more people are working from home. Voice over IP or VoIP phone systems use the internet and not a traditional phone line, so you can access to your office’s phone system anywhere with an internet connection. VoIP systems have many benefits that allow you to continue to work remotely and conduct business as usual. The benefits include:

  • Setting up a fully functional phone system in less than a day.
  • Installing the computer application and mobile application allows employees to make and receive calls through their computer or cellphone app without revealing their cellphone number.
  • Voicemail can be sent to email as an audio file or transcription.
  • The ability to set up a custom call flow.
  • Calls can be parked or transferred.
  • Calls can be recorded if you wish to do so.
  • Instant messaging and video conferencing (up to 50 users) allows for an easier way to communicate with our employees and hold meetings.
  • Once you are back in your office, the same configurations can be set but with the use of a new desk phone.
  • Compliant with HIPAA.

VoIP or remote phone systems are an easy way to keep your employees connected and to keep your company doing business. Now through June 30, 2020, Polycom is offering a $35/phone rebate when you purchase more than 5 phones. If you are looking for more information on remote phone systems or VoIP, call ICC at 970.821.8592 or email us today at tylerharnden@iccusa.net.

Read On

March 24, 2020

IT Services

Keep IT Safe While Working Remotely

With the current state of the world, many employees are being encouraged to work remotely. Working remotely allows the flexibility of location whether it is in your own home or at a local coffee shop. You can access company files, video chat with co-workers, and have the freedom to work when and where you want. On the flip side, working remotely can pose some risks to your company’s private information.

It’s important to follow this checklist when working from home to help keep your company’s important information and data safe:

I.T. Checklist

  • Enable local encryption
  • Make sure admin accounts are confirmed with strong passwords
  • Limit external sharing of Cloud applications (OneDrive, SharePoint, etc.)
  • Enable MDM for remote wipe capabilities
  • Review and enable remote endpoint security tools that can be centrally reviewed and monitored (RMM, SentinelOne, NovaSOC, etc)
  • Provide ability to securely exchange files and information externally and internally (i.e. OneDrive, DLP, email encryption, etc)
  • Enable Multifactor Authentication for remote connectivity. Make sure authentication expires after 4-8 hours of use
  • Review incident response procedure with all relevant parties

Employee Checklist

  • Secure workspace
  • Ability to lock laptop and any business relevant information when not in use
  • Safely perform conversations without visitors eavesdropping or shoulder surfing
  • Wireless Security
  • Change default Wi-Fi Router passwords
  • Enable WPA-2 or higher encryption; Strong WEP password
  • Ensure your local router firmware is updated
  • Personal Device Security
  • Update IOT Device firmware (Smart Thermostats, etc).
  • Ensure default passwords are changed
  • Update software on all devices within your home network (Corporate laptop, IOT devices, personal laptops/tablets, etc)
  • Review corporate policies and procedures

Security Awareness

  • Corporate vs personal
  • Do not share your corporate laptop for use with family or friends
  • Limit social media use
  • Don’t reveal business itineraries, corporate info, daily routines, etc.

Integrated Computer Consulting (ICC) is here to help. Please don’t hesitate to give us a call if you have any questions or need more information about safely working remotely. Contact us at 970.821.8592 or at info@iccusa.net.

Read On

March 20, 2020

IT News

Offsite Backup vs Onsite Backup

Backing up your digital files is super important to keep a copy of your company’s important and private information. If suddenly your computer or network goes down and files are lost, it is key to have that information backed up in some form or another. The two main options for backup storage are off-site or on-site backups.

Offsite backups are a secondary location that houses your company’s data. The benefits of off-site storage include the ability to access the information from any location via the internet or FTP. It is a safer place to house the data in case an event occurs at your business’ location. Offsite backups can also be accessed by many other remote locations. On the other hand, the risk of offsite storage includes the servers being down for maintenance at a time when you may need to access the files. This may be unfortunate if you need immediate access to files; however, most clients are notified in advance that access may be limited so they are able to plan better.

Onsite backups are physically located at your place of business. This includes saving information to external hard drives, DVDs, and CDs. The benefits to on-site backups are that the files are readily available, it is a more cost-effective option and no internet is needed to access them. However, on-site backups could be lost if a catastrophic event were to occur such as a fire, flood, or robbery.

When choosing a backup system, it is up to you and your business if an offsite or onsite backup is the better option for you. Depending on budget or if you have remote employees, one option may make more sense for your company than the other. Either way, backing up your system is a must for any and all businesses. If you have any questions on the system that is right for you, contact Integrated Computer Consulting or ICC today! 970.821.8592

Read On

January 8, 2020

Education

October is National Cybersecurity Awareness Month. Is Your Business Protected?

Cyber threats are becoming more prevalent in today’s internet world. According to Cybintsolutions.com, “64% of companies have experienced web-based attacks, 62% phishing & social engineering attacks, 59% malicious code and botnets and 51% denial of service attacks.” Integrated Computer Consulting (ICC) has recently had a handful of businesses that have experienced a cyber threat in one form or another.

Examples of the situations and outcomes below:

  • ICC Customer: Gift card scam – Successful, $1000 payment
  • ICC Customer: Domain name spoof – Averted
  • ICC Customer: Extortion emails containing old passwords – Averted
  • Some customers and some non-customers: Business Email Compromise – Mostly averted, one $42k payment
  • Non-customer: Ransomware – Successful, $6000 payment. Another requested $12k and lost all data
  • Non-customer: Banking Trojan – Successful, Emotet virus on 30+ machines
  • Non-customer: Remote Desktop brute-force – Successful, attacker gained access to PC and attempted a lateral move to other machines/server

The cost to protect your personal and your businesses’ important information is minimal compared to the cost to recover from an attack. ICC recently worked with a customer in Fort Collins, dealing with an Emotet virus that could cost up to $1 million to remediate. Fortunately, ICC was able to effectively mitigate the virus for substantially less. For a cost way less than $1 million, ICC was able to save the company money and the potential risk of shutting down their company.

Cybersecurity is no joke and businesses should make sure they are protected to save themselves from the potential loss of time and money in the future. Let ICC evaluate your company’s security measures today. 970.821.8592 or info@iccusa.net.

Read On

October 4, 2019

Security

Meet Our New Team Member: Patrick O’Brien

We asked Patrick a handful of questions to learn a little bit more about him!

In a nutshell, my job entails: Helping businesses run smoothly by providing technical support
How long you’ve been with ICC: started on 7/29/2019
Hometown: Loveland, CO
In my spare time, you can find me: Mountain or road biking, hiking, camping, rock climbing, and woodworking
Pets? None currently, but I grew up with 2 springer spaniels and would like to get a dog of my own
If you looked at my desk right now, you’d find: A water bottle, a coffee mug, a Cloud9 coaster and various chargers, cables, and storage disks
Fun facts about me: I made my desk and table at home and have completed an IronMan triathlon and would like to do more
Preferred OS? Windows 10
Connect with me on: LinkedIn      https://www.linkedin.com/in/patrick-o-brien-b1a060161/

Read On

August 22, 2019

ICC Team Members