Little Dog Tech Logo
CALL US
515-422-1995
5946 Ashworth Rd.
West Des Moines, IA 50266
  • Home
  • Remote Support
  • Services
    • Residential Services
    • Business Services
  • Pricing
  • About
  • Reviews
  • Contact Us
  • Blog
  • Partners

Why Your Firewall Will Never be Enough

December 11, 2017 by Paul Schwegler

Firewalls are a well-known security essential, and we’re certainly big fans, but did you know a firewall alone is not enough to keep your business safe? It’s like building a fence around your city to keep the burglars out: You feel safe, private and secure… but the reality is, anyone with a ladder, enough motivation or ninja skills poses a real threat. That’s why despite every networked business having a firewall in place, security breaches are increasing at an alarming rate – further protections are still needed.

A few strategic, well-planned measures can provide all the protection your business needs to keep operating without costly downtime. While it’s cool to imagine a system so secure you’ll be opening doors with retinal scanners, using synchronized keys to activate the server and dodging pressure-triggered plates around the storage drives, the reality is infinitely more usable and affordable. In fact, we’ll help you choose the perfect measures that blend invisibly into your existing processes, boosting security without affecting productivity. Take a look at some of our managed service inclusions:

Proper firewall configuration

While not enough by itself, your firewall is still your first line of defense like the wall around your city. However, there’s a huge difference between the generic firewall that comes standard with your Windows installation, and one specifically chosen for your business and set up properly. Without properly locked doors and monitored gates, your firewall may as well not even be there. Our technicians will work with you to identify which traffic should be allowed, eg remote employee access, and which should be automatically blocked.

Workstation antivirus

Like a bouncer standing at the door to your building, it is the job of antivirus software to check every file being downloaded to your company’s computers and watch every program that runs. So, even if a bad guy gets past the perimeter defenses they will likely be spotted by the antivirus software. Without this layer of protection, it is easy for an attacker to have their way with your files.

Web Filtering

What’s better than detecting and stopping malicious files on your computer? Preventing your users from even downloading them from the internet in the first place! Web filtering acts as a middle-man while you are browsing the web and stops users from being able to even visit a site with known issues. We can also restrict websites based on categories like adult material or social networking if desired.

Patch Management 

Keeping with the analogy of a firewall is like a wall around your city and an antivirus is like a bouncer at the door, software patching is like having someone fixing newly found holes in your walls that could potentially let the bad guys in. Instead of counting on your employees to update to the newest version of Java or Adobe Reader, automated software can take care of this for you.

Access restrictions

It is best practice to give employees access to only the files they need to do their job. It’s not a matter of trust, but rather one of security. If they were the one to accidentally let the attackers through the firewall, perhaps by clicking an email link, you’re then able to minimize the damage. Without this added layer of protection, it’s relatively easy to access (and damage) any and all files on the network.

Encrypt confidential files

More secure than simply password locking a file, encryption uses a secret ‘key’ to scramble the files and their contents so that when anyone else tries to view them all they see is incomprehensible nonsense. This way, if an attacker does manage to access or steal vital files, they don’t get anything useful! Encryption is especially useful on mobile devices that can easily be misplaced or stolen when traveling.

Backup Backup Backup!

As a final layer of defense, when all other protections have been circumvented, it is important to be able to recover from a disaster. If an attacker does manage to access and hold your network for ransom, with the proper backup in place we can simply wipe the slate clean and restore to the way it was before the attack.

No one type of protection is 100% perfect. Something (or someone) will inevitably get through. That’s why computer security works best when it’s multi-layered. When one protection fails, the next layer kicks in to keep your business safe. And then the next, and the next…but that doesn’t mean you need CIA level security that gets in your way. Most of the above protections are easily affordable for small businesses, we use all of the above ourselves!

Filed Under: Security, Tips Tagged With: antivirus, backup, encryption, firewall, patch management, security

Share:

Got a New Device? Here’s the Essential Tech Prep You Can’t Afford to Skip

October 2, 2017 by Paul Schwegler

It’s tons of fun getting a new device. Whether it’s a new desktop, laptop or phone: the thrill of getting it home and opening the box is great. We know, we love tech too. It even has its own version of new car smell! Once you get it home though, there are a number of things that need to be done before it’s really usable – beyond snazzing it up with a new case or mousepad.

The sellers like to say it’s ready to use straight from the box – and it is at a base level – maybe not quite the way you need it to work. They’ll all turn on, look for wifi, and sure, you can type…but rather like when you buy a new fridge, simply turning it on isn’t enough – it’s still empty and you’re still hungry. A few minutes now to prep your new device will save you time, stress, and quite possibly money.

This is a long and detailed list, so keep it for future reference or forward it to your friends that may be in the market for a new machine!

Install all Security Updates and Fixes

From the factory to your hands, that device has been in the box for at least a month. In the world of security, that’s an eternity. During that time on the shelf, new viruses have come out and new software weaknesses have been discovered. Fortunately, new updates to combat these problems were also created, they just haven’t been downloaded to your device yet. The first thing you should do after turning the new device on is to use its update feature to get all updates installed. That way, you know your device is safe to go online.

Install a Security Suite

This may not be necessary for most mobile devices, but if you have a new Windows machine or even a Mac, we STRONGLY suggest investing in a high quality security package. Not all antivirus programs are created equal, and often times the one that may come ‘free’ on your machine is only there because it was cheap for the manufacturer or reseller to provide.        For consumer use, we recommend ESET Smart Security by NOD32 or Bitdefender. We even have a managed business grade antivirus based on Bitdefender that we can provide for a similar price than most residential grade products! Contact us if you are interested in being protected by the professionals at Little Dog Tech rather than a freebee.

Setting up Hardware

If your new device is a computer, you’ll need to hook it up to extra tech like a printer or webcam. These tasks that should be plug-and-play can sometimes send you loopy, especially when you’ve got a plug mismatch or incompatible drivers.  One hint is to not use the disks that came with the machine. Instead, go online to the manufacture’s website to download the newest version of drivers and software to ensure compatibility. Some common websites are:

https://support.hp.com/us-en

http://www.dell.com/support/home/us/en/19

https://www.usa.canon.com/internet/portal/us/home/support/

https://www.brother-usa.com/support/

Be careful Googling a manufacturer’s support website, many scammers will put up ads and pretend to be support for a certain company but charge you astronomical amounts of money for something that may actually be free!

Setting up the Network

There are two types of networks in the residential world, wired and wireless. Wired connections are always best, so if your new computer is going to be located near your router or an active ethernet plug, use that. But, more and more people these days are using wireless connections. This is great, but it can be slower and less stable and the biggest problem we see is people don’t know what their wireless pass-key is! If you don’t have record of what your key was, you will either need to retrieve it from another connected machine, connect to the router with a wire to access it and extract the key, or reset your router to defaults and set it up again from scratch. These are more complicated tasks than what I can explain in a newsletter, so if you run into this issue we can help!

Backup, Backup, Backup

This is a great time to think about having a robust backup procedure in place. You would hate to get everything moved over to your new machine and find out that you have a dud and have lost everything! Or, why not set this all up now so when the device does inevitably fail, you know you can recover from that disaster. There are MANY different types of backups out there from online to local to a hybrid approach. Contact us to let us design the perfect backup plan for your devices.

Data Transfer From Old to New

Some people want to transfer everything from one device to another, others like to have a fresh start and keep the old device as a backup. You can either transfer your data in its entirety, or just copy the things you use. For mobile devices, the major manufacturers have built in tools for this, like iCloud backup on iPhones.

For computers, the process can be a little more manual. You can keep it simple by copying data to a flash drive on the old computer, then copying it to the new computer. Or, we can use some specialized software to move over files as well as some settings, configurations, and even your wallpaper! We can even turn your old hard drive into an external drive that you can plug into your new computer and grab files as required.

Setting up Email and Software

Email is one thing people commonly forget and then struggle with. If you use a web browser based e-mail solution like Gmail, Yahoo, or Hotmail, there may not be anything to set up. Just visit the website and sign in (I hope you remember your password!) to get your mail. But, if you use an e-mail client such as outlook, Windows mail, or Thunderbird, they will need special configuration to connect properly. Also, the databases from the old machine may need to be migrated so you still have your old mail. The details vary depending on the existing configuration and program, but it is something we are very familiar with.

Any programs you will need to have on the new computer will need to be reinstalled. It is not feasible to move an installed program from one computer to another. There are programs that claim to do this, but the results are not guaranteed and often buggy. BEFORE you purchase your new machine, you should inventory what software you will need, and spend some time digging up the install disks and licenses. Some programs like Corel, Adobe, and AutoCAD can often cost more than the machine, so it is worth it to keep track of these licenses!

Lockdown Privacy and Permissions

Most newer devices have the ability to create separate accounts for different users. Whether it be a computer or a mobile device, there may be an advantage to setting up a different account for each person who is planning on using the device. The individual users can keep their files, settings, and programs separate from other users to reduce clutter and the chance that other users can ‘mess things up’.

With Windows machines, there is a distinct advantage to setting up the normal day-to-day users as ‘standard’ users without installation rights, and then have one ‘administrative’ user that is carefully used only when higher level functions are needed. This can be VERY helpful with avoiding virus infections because ~95% of virus CANNOT install through a standard user account!

Whether you have children and are looking to provide a safe online experience, files you’d prefer to keep private, or simply want to set up ‘profiles’ for each user to have their own login, we can quickly get your new device configured to meet your needs.

Filed Under: Maintenance, Tips Tagged With: antivirus, data transfer, mail transfer, new computer, new phone, setup

Share:

Contact Form

Before submitting your question, you must review and agree to the Little Dog Tech Terms of Service.

Search for Something!

Click to see our BBB Report

FOLLOW US

VISIT US

Privacy Policy

Copyright © 2023 · Little Dog Tech · 5946 Ashworth Rd. , West Des Moines, IA 50266