Silloway Networks
  • Home
    • Services >
      • Compliance
    • About >
      • Testimonials
  • Security
    • XG Firewall
  • Compliance
  • Backup
  • O365
    • TEAMS >
      • Teams Training Video
  • VOIP
  • Contact
  • Blog
  • Home
    • Services >
      • Compliance
    • About >
      • Testimonials
  • Security
    • XG Firewall
  • Compliance
  • Backup
  • O365
    • TEAMS >
      • Teams Training Video
  • VOIP
  • Contact
  • Blog

3 ways online collaboration tools can boost company productivity

6/24/2020

 
Picture
Online collaboration tools help employees with
​
  • Prioritization
  • Decrease travel expenses
  • Improve work-life balance

But the biggest benefit is the increase to productivity. With extensive online collaboration tools, you can host webinars, engage with customers easily, and more.

At Silloway Networks, we specialize in helping businesses implement online productivity solutions and modernize their IT strategy.

Contact us today to find out how we can help.

Microsoft increases productivity and protects assets with OneDrive for Business

6/9/2020

 
Picture
Losing data because a device goes down is not an option. Cloud solutions like OneDrive for business can help you keep your data backed up and protected. With features like SSL encryption and the ability to set expiration dates on certain permissions, your data will be taken care of. Integrating new cloud solutions is tough for any business. Learn More

That's why we're here to take care of you.

Contact  Silloway Networks today to find out more on how we can help.

Work remotely, stay secure — Important tips for security

5/20/2020

 
Picture
With many employees suddenly working from home, there are things an organization and employees can do to help remain productive without increasing cybersecurity risk.

While employees in this new remote work situation will be thinking about how to stay in touch with colleagues and coworkers using chat applications, shared documents, and replacing planned meetings with conference calls, they may not be thinking about cyberattacks. Business owners, ED's and admins need to look urgently at new scenarios and new threat vectors as their organizations become a distributed organization overnight, with less time to make detailed plans or run pilots.

Based on our experiences working with customers who have had to pivot to new working environments quickly, I want to share some of those best practices that help ensure the best protection.

What to do in the short—and longer—term

Enabling official chat tools helps employees know where to congregate for work. Whichever software you pick, provision it to users with Azure Active Directory (Azure AD) and set up single-sign-on, and you won’t have to worry about download links getting emailed around, which could lead to users falling for phishing emails.

You can secure access to cloud applications with Azure AD Conditional Access, protecting those sign-ins with security defaults. Remember to look at any policies you have set already, to make sure they don’t block access for users working from home.

Azure AD Application Proxy publishes on-premises apps for remote availability, and if you use a managed gateway, today we support several partner solutions with secure hybrid access for Azure AD.

While many employees have work laptops they use at home, it’s likely organizations will see an increase in the use of personal devices accessing company data. Using Azure AD Conditional Access and Microsoft Intune app protection policies together helps manage and secure corporate data in approved apps on these personal devices, so employees can remain productive.

Intune automatically discovers new devices as users connect with them, prompting them to register the device and sign in with their company credentials. You could manage more device options, like turning on BitLocker or enforcing password length, without interfering with users’ personal data, like family photos; but be sensitive about these changes and make sure there’s a real risk you’re addressing rather than setting policies just because they’re available.

You’ve heard me say it time and again when it comes to multi-factor authentication (MFA): 100 percent of your employees, 100 percent of the time. The single best thing you can do to improve security for employees working from home is to turn on MFA. If you don’t already have processes in place, treat this as an emergency pilot and talk to our Silloway Support Team to implement MFA.

Longer term, I recommend Azure Information Protection to find and label the most critical data so you can track and audit usage when employees work from home. We must not assume that all networks are secure, or that all employees are in fact working from home when working remotely.

Track your Microsoft Secure Score to see how remote working affects your compliance and risk surface. Use Microsoft Defender Advanced Threat Protection (ATP) to look for attackers masquerading as employees working from home.

How to help employees

As more organizations adapt to remote work options, supporting employees will require more than just providing tools and enforcing policies. It will be a combination of tools, transparency, and timeliness.

Remote workers have access to data, information, and your network. This increases the temptation for bad actors. Warn your employees to expect more phishing attempts, including targeted spear phishing aimed at high profile credentials. Now is a good time to be diligent, so watch out for urgent requests that break company policy, use emotive language and have details that are slightly wrong—and provide guidance on where to report those suspicious messages.

Establishing a clear communications policy helps employees recognize official messages. For example, video is harder to spoof than email: an official channel like Microsoft Stream could reduce the chance of phishing while making people feel connected. Streaming videos they can view at a convenient time will also help employees juggling personal responsibilities, like school closures or travel schedule changes.

Transparency is key. Some of our most successful customers are also some of our most transparent ones. Employee trust is built on transparency. By providing clear and basic information, including how to protect their devices, will help you and employees stay ahead of threats.

For example, help employees understand why downloading and using consumer or free VPNs is a bad idea. These connections can extract sensitive information from your network without employees realizing. Instead, offer guidance on how to leverage your VPN and how it’s routed through a secure VPN connection.

Employees need a basic understanding of conditional access policies and what their devices need to connect to the corporate network, like up-to-date anti-malware protection. This way employees understand if their access is blocked and how to get the support they need.

Working from home doesn’t mean being isolated. Reassure employees they can be social, stay in touch with colleagues, and still help keep the business secure.

Crash Course in Microsoft Teams

4/28/2020

 
Picture
The "Crash Course in Microsoft Teams" eBook helps you to discover how to quickly start using Microsoft Teams to communicate instantly with chat, online meetings, calls, and more. The eBook also explains how to set up meetings with file sharing, recording, and transcription; co-edit documents in real time; and collaborate with people inside and outside the organization. For more information on Microsoft Teams, Contact us today.

Download the Free Teams eBook

Workplace Agility: The True Secret To Improving Productivity And Efficiency

4/15/2020

 
Picture
How do you maintain easy collaboration, save costs, pull talent from everywhere, and provide employees with the flexibility to work where and when they want?

Some employers are adopting SaaS platforms and the cloud to facilitate remote work safely and simply. Tools like Microsoft 365 and Teams are invaluable assets to a modern agile workplace. But adoption requires planning to execute. With experts from Silloway Networks at your side you'll be ready for the modern workplace, and so will your employees.

Read More...


Welcome to Microsoft Teams

Picture
Microsoft Teams is a collaboration app that helps you and your staff stay organized and have conversations—all in one place. Watch "Welcome to Teams" to see how Microsoft Teams helps you achieve more together. To learn more about how Teams can improve collaboration for your organization, contact us today.
Picture
Watch 2 minute video

Do more with Microsoft Teams

Download the one-page Microsoft Teams feature sheet
Picture
Picture

Silloway Networks Support and the Coronavirus

3/17/2020

 
Picture
The Coronavirus outbreak continues to evolve and we have been closely monitoring the situation.  Our Support Team wants to let you know about the steps we are taking to support your business to limit the impact the virus may have on your organization's technology and employees productivity.
 
Hours of Operation
Our offices will remain open for the foreseeable future. Should it become necessary for us to close our office Silloway Networks employees are fully equipped and able to work remotely to provide you with uninterrupted service.
 
Service and Support
We are committed to providing our clients with the same levels of support through this ongoing event. Please be patient as we expect higher than normal call and support request volume.
 
Hardware Purchases (laptops/desktops/monitors)
We have seen delays in the procurement of new equipment from our vendors with delivery times at two to three weeks. These lead times may increase as many companies implement work from home plans.
 
Onsite Support
We will be suspending all onsite support beginning Wednesday, March 18. Most of our client support is performed remotely. We do not anticipate this will impact our service level for our clients. Onsite requests for emergency support will be handled on a case by case basis.
 
Updates
Silloway Networks will be providing updates to keep you informed of any additional delays. We are dedicated to minimizing the impact this event has on your business. Should you have any questions or concerns, please contact us at 802 282-4255 or email ticket@silloway.net
 

Kelly Roofing - Providing excellent customer service with the support of Microsoft Dynamics

3/4/2020

 

Kelly Roofing – Providing excellent customer service with the support of Microsoft Dynamics from Digital GTM on Vimeo.

Microsoft Dynamics 365 Business Central offers the unique ability to run all aspects of a business through a single, customizable system. For Kelly Roofing, this means a platform that can grow with them, allowing them to provide the best possible service to their customers at all times.

Understanding Firewalls for Small Office Use

9/11/2018

 
Original release date: September 10, 2018

When your computer is accessible through an internet connection or Wi-Fi network, it is susceptible to attack. However, you can restrict outside access to your computer—and the information on it—with a firewall.
​
What do firewalls do?
Firewalls provide protection against outside attackers by shielding your computer or network from malicious or unnecessary network traffic. Firewalls can also prevent malicious software from accessing a computer or network via the internet. Firewalls can be configured to block data from certain locations (i.e., computer network addresses), applications, or ports while allowing relevant and necessary data through. 

What type of firewall is best?
Categories of firewalls include hardware and software. While both have advantages and disadvantages, the decision to use a firewall is more important than deciding which type you use.
  • Hardware – Typically called network firewalls, these physical devices are positioned between your computer and the internet (or other network connection). Many vendors and some internet service providers (ISPs) offer integrated small office / home office routers that also include firewall features. Hardware-based firewalls are particularly useful for protecting multiple computers and controlling the network activity that attempts to pass through them. The advantage of hardware-based firewalls is that they provide an additional line of defense against attacks reaching desktop computing systems. The disadvantage is that they are separate devices that require trained professionals to support their configuration and maintenance.
  • Software – Most OSs include a built-in firewall feature that you should enable for added protection, even if you have an external firewall. Firewall software is also available separately from your local computer store, software vendor, or ISP. If you download firewall software from the internet, make sure it is from a reputable source (i.e., an established software vendor or service provider) and offered via a secure site.  The advantage of software firewalls is their ability to control the specific network behavior of individual applications on a system. A significant disadvantage of a software firewall is that it is typically located on the same system that is being protected. Being located on the same system can hinder the firewall’s ability to detect and stop malicious activity. Another possible disadvantage of software firewalls is that—if you have a firewall for each computer on a network—you will need to update and manage each computer’s firewall individually.
How do you know what configuration settings to apply?
Most commercially available firewall products, both hardware and software based, come pre-configured and ready to use. Since each firewall is different, you will need to read and understand the documentation that comes with it to determine whether the default firewall settings are sufficient for your needs. This is particularly concerning because the “default” configuration is typically less restrictive, which could make your firewall more susceptible to compromise. Alerts about current malicious activity  sometimes include information about restrictions you can implement through your firewall.
Though properly configured firewalls may effectively block some attacks, do not be lulled into a false sense of security. Firewalls do not guarantee that your computer will not be attacked. Firewalls primarily help protect against malicious traffic, not against malicious programs (i.e., malware), and may not protect you if you accidentally install or run malware on your computer. However, using a firewall in conjunction with other protective measures (e.g., anti-virus software and safe computing practices) will strengthen your resistance to attacks. 

Ask us about our Sophos XG Firewall

This product is provided subject to this Notification and this Privacy & Use policy.

Securing Enterprise Wireless

9/4/2018

 
 What is enterprise network security?
Enterprise network security is the protection of a network that connects systems, mainframes, and devices―like smartphones and tablets―within an enterprise. Companies, universities, governments, and other entities use enterprise networks to help connect their users to information and people. As networks grow in size and complexity, security concerns also increase.

What security threats do enterprise wireless networks face?
Unlike wired networks, which have robust security tools—such as firewalls, intrusion prevention systems, content filters, and antivirus and anti-malware detection programs—wireless networks (also called Wi-Fi) provide wireless access points that can be susceptible to infiltration. Because they may lack the same protections as wired networks, wireless networks and devices can fall victim to a variety of attacks designed to gain access to an enterprise network. An attacker could gain access to an organization’s network through a wireless access point to conduct malicious activities—including packet sniffing, creating rouge access points, password theft, and man-in-the-middle attacks. These attacks could hinder network connectivity, slow processes, or even crash the organization’s system. (See Securing Wireless Networks for more information on threats to wireless networks.)

How can you minimize the risks to enterprise Wi-Fi networks?
Network security protocols have advanced to offset the constant evolution of attacks. Wi-Fi Protected Access 2 (WPA2) incorporates Advanced Encryption Standard (AES) and is the standard employed today to secure wireless enterprises. In June 2018, the Wi-Fi Alliance began certifying devices that support Wi-Fi Protected Access 3 (WPA3), which replaces WPA2. Users should employ the new standards as WPA3 devices become available. IT security professionals and network administrators should also consider these additional best practices to help safeguard their enterprise Wi-Fi networks:
  • Deploy a wireless intrusion detection system (WIDS) and a wireless intrusion prevention system (WIPS) on every network.
  • Ensure existing equipment is free from known vulnerabilities by updating all software in accordance with developer service pack issuance.
  • Use existing equipment that can be securely configured.
  • Ensure all equipment meets Federal Information Processing Standards (FIPS) 140-2 compliance for encryption.
  • Ensure compliance with the most current National Institute of Standards and Technology. (See Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i.)
  • Establish multifactor authentication for access to your network. If this is not possible, consider other secure authentication means beyond a single shared password, such as Active Directory service authentication or an alternative method (e.g., tokens) to create multifactor authentication into your network.
  • Use Extensible Authentication Protocol-Transport Layer Security certificate-based methods (or better) to secure the entire authentication transaction and communication.
  • Use Counter Mode Cipher Block Chaining Message Authentication Code Protocol, a form of AES encryption used by Wireless Application Protocol 2 (WAP) enterprise networks sparingly. If possible, use more complex encryption technologies that conform to FIPS 140-2 as they are developed and approved.
  • Implement a guest Wi-Fi network that is separate from the main network. Employ routers with multiple Service Set Identifiers (SSIDs) or engage other wireless isolation features to ensure that organizational information is not accessible to guest network traffic or by engaging other wireless isolation features.
What else can you do to secure your network?
Employing active WIDS/WIPS enables network administrators to create and enforce wireless security by monitoring, detecting, and mitigating potential risks. Both WIDS and WIPS will detect and automatically disconnect unauthorized devices. WIDS provides the ability to automatically monitor and detect the presence of any unauthorized, rogue access points, while WIPS deploys countermeasures to identified threats. Some common threats mitigated by WIPS are rogue access points, misconfigured access points, client misassociation, unauthorized association, man-in-the-middle attacks, ad-hoc networks, Media Access Control spoofing, honeypot/evil twin attacks, and denial-of-service attacks.
​
The following list includes best practices to secure WIDS/WIPS sensor networks. Administrators should tailor these practices based on  local considerations and applicable compliance requirements. For more in-depth guidance, see A Guide to Securing Networks for Wi-Fi (IEEE 802.11 Family).
  • Use a rogue detection process capability. This capability should detect Wi-Fi access via a rogue client or WAP, regardless of the authentication or encryption techniques used by the offending device (e.g., network address translation, encrypted, soft WAPs).
  • Set the WIDS/WIPS sensors to
    • detect 802.11a/b/g/n/ac devices connected to the wired or wireless network and
    • detect and block multiple WAPs from a single sensor device over multiple wireless channels.
  • Enforce a “no Wi-Fi” policy per subnet and across multiple subnets.
  • Provide minimal secure communications between sensor and server, and identify a specific minimum allowable Kbps―the system shall provide automatic classification of clients and WAPs based upon enterprise policy and governance.
  • Provide automated (event-triggered) and scheduled reporting that is customizable.
  • Segment reporting and administration based on enterprise requirements.
  • Produce event logs and live packet captures over the air and display these directly on analyst workstations.
  • Import site drawings for site planning and location tracking requirements.
  • Manually create simple building layouts with auto-scale capability within the application.
  • Place sensors and WAPs electronically on building maps to maintain accurate records of sensor placement and future locations.
  • Have at least four different levels of permissions allowing WIPS administrators to delegate specific view and administrator privileges to other administrators.
  • Meet all applicable standards and, if Federal Government, comply with the Federal Acquisition Regulation.

Building a Digital Defense Against Facebook Scams

8/8/2018

 
The Federal Bureau of Investigation (FBI) has released an article on building a digital defense against a fraud that uses Facebook’s texting app—Facebook Messenger. Scammers send messages that appear to be from trusted sources or trick users into clicking on malicious links or sharing personal information. Before clicking on links, users should verify the validity of the message with the sender outside of the app.

Talk to us about a security assessment!

<<Previous

    Author

    Silloway Support Team

    Archives

    June 2020
    May 2020
    April 2020
    March 2020
    September 2018
    August 2018
    July 2018
    January 2018
    December 2016
    June 2016
    May 2016
    April 2016
    March 2016
    December 2015

    Categories

    All
    Gmail
    Gmail Won't Get To My Inbox
    Hp Battery Recall
    Hp Battery Replacement
    Meltdown
    Office 365
    Outlook
    Productivity
    Revert To Windows 7
    Security
    Smtp Blacklist
    Spectre
    Teams
    Windows 10
    Wireless

    RSS Feed

Call today - 802 282-4255

​Silloway Networks offers Enterprise level support to Small and Medium Businesses in Rutland, Addison, Windsor and Bennington Counties. Employing highly-skilled technicians and developing partnerships with best-of-breed technology providers allows Silloway Networks to provide personalized technology solutions to enhance the operation of your business.
Website by Silloway Networks