Welcome!

News Feed Item

According to BIS Computer Solutions: Think of Hackers as Electronic Safecrackers Who Can Loot a Company’s Data in Seconds

CEOs and business owners can no longer feel secure with just alarm systems and guards at their offices and warehouses.

“Even small to midsize businesses face a growing threat from hackers-- electronic safecrackers who can slip into their data vault without making a sound and loot critical information in seconds,” warns Michael Macho, division president of BIS Computer Solutions of Los Angeles.

Hackers vary their attacks on companies and people. Currently, they are infecting computer systems with a software called CryptoWall Ransomware, a virus that sneaks in as an attachment and encrypts all data files so the user can’t open them. “Thieves then demand a ransom, holding a company’s computer system and its information hostage until it’s paid,” says Macho.

When corporate data is breached, it’s not just the company suffering the loss, he maintains. “The privacy and personal information of their customers, employees, stockholders, vendors—virtually everyone they do business with—are victims of the theft.”

The reputation of a company and its brand can be damaged as well, and any sized business is at risk, according to Macho.

10 Ways to Safeguard Company Data Against Hacker Attacks:

(www.biscomputer.com/security-top-ten)

The global publicity triggered by the brazen heist of Target’s credit card customers at its 1,797 stores in the U.S. and on E-Bay’s multi-million name customer-base should make senior managers and owners aware of the fallout of a cyber-attack.

While digital attacks on Fortune 500 companies grab headlines and shrewd hackers will still target them, smaller, privately owned companies are vulnerable, said the BIS executive. “Why? Because they usually do not have database security programs, policies and products in place.”

Boss Must Understand Hacker Threat

There are data security solutions that cost between $3000 and $5000 and can be installed in a day, explains Macho. “But the boss must first understand his or her exposure and the consequences of a breach. It’s as critical as understanding the accuracy of their accounting systems.”

Protecting the corporate data does not disrupt a company’s operations. The first step is a site evaluation where an IT security consultant ‘walks’ through a company’s system looking for vulnerabilities, weak spots, viruses.

Based on their findings, explains Macho, the consultant recommends hardware and software needed to secure the system from penetration, viruses embedded by hackers and establishing a firewall. BIS often recommends the new Watchguard XTM 330 can be used as a ‘next generation firewall’ or as a ‘unified threat management’ device known as a network security appliance.

“Network security has never been more critical to the ability of organizations to operate successfully in today’s business environment where their vital information is constantly exposed to global hackers,” says Sandra Raygoza, Watchguard’s channel account manager for the Southwest.

With a network security appliance in place, the company’s software is either upgraded or, preferably, replaced with newer, more powerful protection. “Of all the anti-virus software programs on the market today, we usually recommend the new Malwarebytes Premium,” says Macho.

At $25 a year, it is economical but not 100% impenetrable, he notes. “No database security program can totally protect a company but it can dramatically reduce the risk of a hacking.”

About BIS Computer Solutions

Based in La Crescenta, a Los Angeles suburb, BIS Computer Solutions (www.biscomputer.com) creates customized software programs, applications and consulting to a variety of industries. A large emphasis of its operations are placed on security and infrastructure solutions, and protecting data.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
CI/CD is conceptually straightforward, yet often technically intricate to implement since it requires time and opportunities to develop intimate understanding on not only DevOps processes and operations, but likely product integrations with multiple platforms. This session intends to bridge the gap by offering an intense learning experience while witnessing the processes and operations to build from zero to a simple, yet functional CI/CD pipeline integrated with Jenkins, Github, Docker and Azure...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
You want to start your DevOps journey but where do you begin? Do you say DevOps loudly 5 times while looking in the mirror and it suddenly appears? Do you hire someone? Do you upskill your existing team? Here are some tips to help support your DevOps transformation. Conor Delanbanque has been involved with building & scaling teams in the DevOps space globally. He is the Head of DevOps Practice at MThree Consulting, a global technology consultancy. Conor founded the Future of DevOps Thought Leade...
An edge gateway is an essential piece of infrastructure for large scale cloud-based services. In his session at 17th Cloud Expo, Mikey Cohen, Manager, Edge Gateway at Netflix, detailed the purpose, benefits and use cases for an edge gateway to provide security, traffic management and cloud cross region resiliency. He discussed how a gateway can be used to enhance continuous deployment and help testing of new service versions and get service insights and more. Philosophical and architectural ap...
By 2021, 500 million sensors are set to be deployed worldwide, nearly 40x as many as exist today. In order to scale fast and keep pace with industry growth, the team at Unacast turned to the public cloud to build the world's largest location data platform with optimal scalability, minimal DevOps, and maximum flexibility. Drawing from his experience with the Google Cloud Platform, VP of Engineering Andreas Heim will speak to the architecture of Unacast's platform and developer-focused processes.
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
Serveless Architectures brings the ability to independently scale, deploy and heal based on workloads and move away from monolithic designs. From the front-end, middle-ware and back-end layers, serverless workloads potentially have a larger security risk surface due to the many moving pieces. This talk will focus on key areas to consider for securing end to end, from dev to prod. We will discuss patterns for end to end TLS, session management, scaling to absorb attacks and mitigation techniques.
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
"We focus on SAP workloads because they are among the most powerful but somewhat challenging workloads out there to take into public cloud," explained Swen Conrad, CEO of Ocean9, Inc., in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...