BizTekConnection Managed Services, managed it, network monitoring Sun, 18 Feb 2018 04:03:24 +0000 en-US hourly 1 BizTekConnection 32 32 5 Things You Need To Know About Cloud Services Thu, 25 Jan 2018 22:52:43 +0000 The post 5 Things You Need To Know About Cloud Services appeared first on BizTekConnection.


Cloud computing - real cloud

5 Myths about “The Cloud”

During the past few years, we have seen a definite uptick among central Arkansas businesses taking advantage of “the cloud”. In the US, over 72% of all businesses have already adopted the cloud to some degree. Of those, 82% have saved money by making the switch; and 80% have recognized improved processes and productivity.

The term “cloud” is used so broadly that it is difficult to grasp the concept. This causes much confusion about the cloud and how it could improve their business. So we thought we would help you better understand the cloud, and how it can improve your business.

Myth #1: Today’s cloud is like the Wild West, with few controls and security.

While there are hundreds of cloud providers, they fall into 3 categories: public, private and hybrid (a combination of the two). Examples of public cloud are Google Drive, Dropbox and Microsoft’s OneDrive.  These provide an economical place to store data, but you have no control over it, or where the data is stored.  Private cloud provides the opportunity to have much greater control of your data. Most businesses utilize the private cloud for maximum security and support.

Myth #2: The cloud is the reason so many businesses are getting hacked.

Businesses are being hacked because they are struggling to keep up with hackers that are constantly searching for security holes to pillage.  Without an equally vigilant data security team, this is a losing battle. The right private cloud provider is far more likely to maintain enterprise-class security that will minimize chances of a breach.  Today’s typical small- to medium-sized businesses’ security can be no match for today’s hackers.

Myth #3: My company’s data is more secure under my own lock and key.

Even with proper backup disaster recovery plans, firewalls, and anti-virus/anti-spam solutions, it is difficult to afford the level of security available from a reputable cloud provider. Typically they utilize multiple, mirrored data centers for redundancy. They employ around-the-clock professionals to manage their security and monitor all systems. They have redundant internet providers, backup power supplies, and access controls.

Myth #4: My systems will be slower if I am accessing data in the cloud.

With today’s bandwidth and data transfer technologies, you will not likely notice any data latency. In some cases, your systems may even run faster. Many businesses today not only maintain their data in the cloud but utilize computer processing in the cloud as well.  Rather than purchasing and maintaining their own processing power, they rent it from a cloud provider.  This provides improved processing speed that more than overcomes any latency during data transfer.

Myth #5: Making the move to the cloud is traumatic for my daily business processes.

Choosing the right cloud provider is key to a smooth transition. It is their business to assure that the transition is almost transparent to all users with little interruption to normal business processes.

Fact: BizTek can provide customized recommendations for your business to maximize the benefits of the cloud.

The post 5 Things You Need To Know About Cloud Services appeared first on BizTekConnection.

]]> 0
Ransomware – Coming to a Computer Near You! Thu, 25 Jan 2018 22:20:59 +0000 The post Ransomware – Coming to a Computer Near You! appeared first on BizTekConnection.



It seems like it never ends… It seems that Malware is cropping up quicker than the industry can update the virus definitions and today is not different.  But there appears to be a new variety of Ransomware that has recently hit the market.  From what the industry has found so far, KEYHolder appears to be from the same folks that were behind Cryptorbit. It goes by the name KEYHolder.  Although Ransomware may seem like a relatively new type of attack, it actually goes back to the “AIDS” Trojan (also known as “PC Cyborg”) as far back as 1989.  In other words, they are really good at making, and propagating, this type of attack.

Like other Ransomware, KEYHolder will encrypt files (anything/everything from documents, music, videos to images, etc.) on any attached drives, including network mapped file shares. Once the encryption is complete, a ransom of $500 is demanded for the unlock key. The user is directed to download a Tor compliant browser and make the ransom payment through a Tor masked server.

It is thought, although no one is positive at this point, that the initial infection occurred via email.  As this is still developing, the industry as a whole is working to mitigate this threat, there is still much speculation around KeyHolder.  There is some chatter in the security community about infections happening through direct control of systems from the outside, but we have seen no evidence of this. Source files are still being investigated and signatures, to mitigate the risks will be updated by Antivirus vendors as quickly as possible.

This is a very valid, potential threat. Until more is known, and the industry has released fully functioning definition files to reduce the related risks, it is strongly recommended that you inform your users of the following:

1. Do NOT open attachments from unknown senders. While we have seen Ransomware attacks sourced from watering hole attacks, or social harvesting attacks, the vast majority are coming in through email via spear-phishing attacks.

2. Backup often.

3. Do not click on links that seem suspicious

4. Do not allow any software that you do not know the origins of to be installed on your system.

5. Keep endpoint security versions update

6. Keep endpoint signatures up to date

7. Contact BizTek support staff if you have any doubt about your current level of protection, or suspect that you are infected in any fashion.

Malware in any variety, is a pain, even in it’s simplest form.  But some, such as Ransomware and other, can bring your business to its knees.  If you are not confident that you have this base covered, give us a call.

The post Ransomware – Coming to a Computer Near You! appeared first on BizTekConnection.

]]> 0
POODLE Bug Presents a Major Network Security Risk Thu, 25 Jan 2018 22:00:58 +0000 The post POODLE Bug Presents a Major Network Security Risk appeared first on BizTekConnection.


POODLE bug security threat-featured image

No, I’m not joking around. It’s real. You may be familiar with bugs known as Heartbleed and Shellshock, which I’ve addressed them in earlier BLOG posts. But now, it’s time that you be made aware of a new bug called POODLE (Padding Oracle On Downgraded Legacy Encryption). Simply put, POODLE allows hackers to access and steal information on encrypted connections.

It is important to note that this is NOT a flaw in SSL certificates, their private keys, or their design but in the old SSLv3 protocol. The bug hijacks pieces of information by using this outdated web communication protocol, leaving systems susceptible to information theft. It’s not believed to be as serious as the Heartbleed bug in OpenSSL, since the attacker needs to have a privileged position in the network to exploit the latest. The usage of Hotspots, public Wi-Fi, does make this attack a real problem. This type of attack falls into the “Man-in-the-middle” category.

How Do They Do It?

Did you ever wonder why you don’t have to log into your e-mail account each time you use it? This is because your browser has a cookie installed which lets your e-mail know that you are who you claim to be. While this is convenient, it can present a problem. If a hacker tricked you into connecting to a bogus wireless hotspot, for example, this bug could allow them to steal a cookie from your computer. This would give hackers a chance to steal enough information from a web connection that they that they would then be able to steal your cookies and effectively pretend to be you.

The Risks

When POODLE emerged, security officials got to work and quickly patched many of the sites that were most vulnerable. Unfortunately, it seems, the experts did not go far enough. The bug formerly attacked an outdated version of SSL (Secure Socket Layer), which is no longer used on modern browsers, but is around due to some older sites, which still require it. Another newer layer of security called TLS (Transport Layer Security) has now been found to also be susceptible to POODLE and a fix has yet to be implemented. By the way, some banks are susceptible to the new iteration of this bug.

There are ways to keep your browser safe and to find out whether or not you’re at high risk for such bugs. BizTek Connection wants to make sure you’re doing everything you can to keep your company’s web presence and security safe. For more information, contact us via phone at 501-542-4241 or email at

The post POODLE Bug Presents a Major Network Security Risk appeared first on BizTekConnection.

]]> 0
What Are The Benefits And Drawbacks Of Wireless Mice? Thu, 25 Jan 2018 21:00:51 +0000 The post What Are The Benefits And Drawbacks Of Wireless Mice? appeared first on BizTekConnection.


benefits and drawback of wireless mice - wired mouse

Wired or wireless mice? This is a debate that’s been going on for years now, and there is still no definitive winner. The truth is, there are advantages to each type of mouse, and it’s all about which attributes matter most to you.


The advantages of wired mice are plentiful. Some of the major ones include:

  • Extended life expectancy
  • Faster response time
  • More cost efficient
  • Better accuracy – a big pro for gamers
  • No possibility of inadvertently gaining control of someone else’s computer

Some of the major drawbacks to wired mice include less freedom to roam and just a lack of convenience.

benefits and drawbacks of wireless mice- wireless mouse


Despite the occasional dead batteries, wireless mice have several strong points. They offer a level of convenience that can’t be reached with a wired mouse, no matter how long the cord is. Some of the key benefits include:

  • Greater freedom – another favorite feature among gamers, who often control their TVs from the couch
  • Improvements in response time and accuracy
  • Fewer cords
  • Smoother movement due to the lack of a cord

Although there are plenty of advantages to wireless mice, there are several disadvantages as well. The two biggest concerns tend to be the occasional bad signal and dead batteries – both of which can be extremely frustrating if they come at the wrong time.

In general, the decision between wireless and wired mice is all about preference. If you require accuracy and fast response times, a wired mouse would most likely suit you best. If you’re someone who likes to work from the couch or other untraditional spots, you may enjoy the convenience and freedom of a wireless mouse. There are plenty of great wired as well as wireless options, so you can’t go wrong either way.

For more information on the debate between wireless and wired mice, check out this website.

The post What Are The Benefits And Drawbacks Of Wireless Mice? appeared first on BizTekConnection.

]]> 0