Archive for the ‘Security’ Category

What Every Small Business Needs to Know About Ransomware

Thursday, April 11th, 2019


When it comes to ransomware, what your small business doesn’t know could hurt you. Small and mid-sized businesses are prime targets for ransomware, as many do not have robust security systems in place and make for easy targets. A whopping 43% of cyberattacks are aimed at small businesses, and that number is rising every year. What does every small business need to know and understand about the threat of ransomware?

Ransomware Affects Every Business

The number of attacks every year is increasing, and the FBI recently stated that over 4,000 ransomware attacks occur every day on individuals and businesses. By the end of 2019, security experts predict that ransomware attacks will occur at one business in the United States every 14 seconds.

Because many small and mid-sized business assume that an attack would never happen to them, their systems are very easy to take advantage of. Smaller companies are also often smaller risks. Because there are so many businesses that fall victim to ransomware, a single small business is far down the list of victims for the FBI and will receive much less attention than a high-profile breach.

Why Is Ransomware Dangerous?

As the name indicates, ransomware is a type of dangerous software that holds your files, system or network hostage until you pay a ransom. Ransomware will convert your files into things that cannot be read without the right key. In most cases, the “key” only comes after negotiating with hackers and paying up. Depending on the skill of the hacker, files might be permanently corrupted or need to be changed back manually one by one.

This type of cyberattack is also dangerous because files that are encrypted are very hard to recover without paying the ransom.  Even if you partner with professionals like the experts at Teltek, the process to recover what is lost is much more expensive an extensive than investing in security measures and training up-front.

How Can You Protect Your Business?

  • Install, update and utilize anti-virus software
  • Rely on a cybersecurity expert like Teltek to keep your business safe
  • Don’t click on banners and advertisements in the sidebar on websites, even if you’re familiar with the host site
  • Always update your browsers as soon as there is an update available
  • Virus scan all files when you download them and before opening
  • Train your employees in how to identify phishing emails

Ransomware Prevention by Teltek

Teltek is a leader in digital security systems designed to protect your business from ransomware and other malware attacks. If you are ready to learn more about Teltek and our security solutions, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

The Most Common VoIP Security Issues

Wednesday, January 2nd, 2019


When VoIP phone systems were first introduced years ago, there were few security concerns about using the new technology. However, like any new technology, with popularity comes security issues and more people looking to exploit the tech for personal gain. If you currently use VoIP or are exploring implementing this technology at your business, here’s what you should know about the most common VoIP security issues.


Phishing is very common in the VoIP world. Most often, a scammer will pretend to be an email provider, service provider or bank. They will send an email or text message to an employee and attempt to convince them to call a specific number or click on a dangerous link. Instead of replying to these messages or engaging with them, your employees should let your IT department go and delete them.


This common VoIP security issue is more sophisticated than phishing. The hacker will listen to your call and attempt to gain information that could be used against you or your business. Eavesdropping hackers will try to gain access to phone numbers, names, passwords, personal information and any other sensitive information. This information will then be used to make free calls using your VoIP line or hack other parts of your business.

Audio Spam

Just like the spam that you receive in your mailbox or email inbox, audio spam is a common VoIP security issue and annoyance. While audio spam can be harmless, it can also be a way to breach into your VoIP phone system or attempt to phish. Never respond to suspicious calls or audio spam or try to redial the phone number.

Man in the Middle Attacks

This VoIP security issue is most common when you are attempting to place a call over an unsecured WiFi connection. Cybercriminals will try to intercept your call and then reroute it through a server, so that they can inject malware and spyware into the stream and gain access to private information.

Partner with Teltek to Prevent Common VoIP Security Issues

Teltek is a leader in IT and cybersecurity solutions for businesses of every size. Our unique approach to meeting any business’s IT needs for a single fixed price is part of what makes Teltek different. If you are ready to learn more about Teltek and our Total Care Assurance solutions, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

2019 Computer Security Forecast for Small Business Owners

Wednesday, November 21st, 2018

Computer Security

Every new year brings a whole host of new computer security vulnerabilities and threats, which is why the right technology partner is essential. Teltek works hard to stay on top of the latest viruses, threats and hacking trends so that you don’t have to. Here are the 2019 risks that every small business owner should know about.

Email Scams

While email might not seem like a popular way to gain access to sensitive information, it remains one of the most common ways for hackers to infiltrate a business. Many attackers specifically target small and mid-sized companies and pose as employees, partners, vendors or stakeholders. By sending malicious attachments that don’t appear to be dangerous or outright asking employees to confirm private information, your business could be hacked. Make sure your employees understand how to identify suspicious emails and that they never give out personal information and sensitive business information via email.

Dangers of Cloud Computing

Cloud computing has taken off over the past few years, and now more businesses than ever before are connected to the cloud. While it offers a wide range of benefits to businesses on a budget, there are also plenty of dangers to unprotected businesses. If you utilize cloud computing, you should partner with a knowledgeable cloud and computer security company like Teltek. Make sure you also maintain back-ups of files in the cloud and cloud back-ups of physical files at your location.

Ransomware Targeting New Devices

Another computer security threat in 2019 goes beyond what you traditionally think of as a computer. Cyber-criminals are branching beyond traditional desktops and laptops to invade numerous “smart” devices. Hackers can get into smart TVs, tablets, cell phones and any other computer-run devices connected to the internet. It’s more important than ever before for every business to guard the infrastructure every device connects to as a result. Make sure that your Internet is secure, and always use a separate guest network for anyone only in your office temporarily.

Partner with Teltek for Computer Security

Teltek is a leader in IT and cybersecurity solutions for businesses of every size. Thanks to our Total Care Assurance Guarantee, we have a loyal and thriving customer base. Our proprietary approach to meeting any business’s IT needs for a single fixed price is part of what makes Teltek different. If you are ready to learn more about Teltek and our Total Care Assurance solutions, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

What Every Small Business Needs to Know About IT Security

Wednesday, October 24th, 2018

IT Security

What do the biggest companies like Target and Home Depot have in common with the small businesses lining every Main Street? Every business is a prime target for cyber attacks and security breaches. One recent Forbes study found that 20% of small and mid-sized businesses have experienced a breach or hack before, and the annual cost of those hacks is estimated to hit $2 trillion by 2019. When it comes to IT security, what your business doesn’t know will hurt you.

Don’t Keep What You Don’t Need

If you don’t have sensitive information, hackers won’t be able to access it. The higher the amount of personal data that you have about every customer, the higher that your liability is. You should only collect information that you really need and store it for only as long as your business needs it. Don’t be careless with collecting and storing customer data.

Lock Up What You Need to Keep

Every business does need to have a certain amount of sensitive information on hand, and that information should be protected as much as possible. You should require all users with access to use unique passwords that are not used anywhere else. Employee access should be restricted to employees who need to use the data, not everyone at your company. You should also have additional back-end security to protect the computers and servers that the data is living on. A skilled IT security partner like Teltek can help you to secure your physical location and digital footprint to protect the future of your business.

Take Employee Education Seriously

Many of the worst cyber breaches happen as a result of human error. Something that an employee saw no harm in could be the downfall of your company. It’s vital that you regularly educate all employees about proper security procedures. Can employees recognize a phishing email? Does each employee know what to do if they realize a breach occurred? Knowledgeable employees are your front line of defense against hackers.

Talk to Our Team Today

Teltek is a leader in IT services thanks to our Total Care Assurance Guarantee. Our proprietary approach to meeting any business’s IT needs for a single fixed price is part of what makes Teltek different. If you are ready to learn more about Teltek, contact us today for a free 15-minute conference call at 1-866-9-TELTEK or 410-552-6580.

Protecting Your Business from Cyber Security Issues During the Holidays

Wednesday, October 17th, 2018

cyber security

While the holidays are referred to as “the most wonderful time of the year,” they are also known for being prime time for cyber security issues. Since consumers are focused on the bustle of the season and business owners are busy working hard meeting customer demand, cyber security often falls by the wayside.

The Rise of Holiday Hacking

A 2017 study found that financial malware correlated with cyber security breaches increased almost 25% during the holiday season. Over the course of the 2016 holiday season, cyber thieves used about 30 types of banking Trojans that contributed to a whopping $6.9 billion in online payment frauds. With cyber security risks growing every year, every business owner should take steps to protect their business and customers during the holidays.

The Most Common Holiday Attacks

The most common threats during the holiday season include:

  • Phishing campaigns, where you will receive emails disguised as authentic communications from vendors or customers looking to capture passwords and personal information or install dangerous software on your system
  • Skimmers placed on your POS terminals that will read the card number and pin code when customers pay with a credit or debit card
  • DDoS, or distributed denial of service, attacks, where a hacker will try to make your website unavailable to customers by disrupting the services of the host connected to the internet. While this type of attack might not compromise any personal or sensitive information, downtime on your website could cost you thousands in sales over the holiday season

Preparing for Cyber Security Attacks Around the Holidays

  • Schedule a check-up with Teltek to make sure that your current IT systems are secure and properly backing everything up. Now is the time to install patches, update security systems and schedule regular back-ups, because you won’t have time to do so soon!
  • Continuously monitor your business with security systems to make sure that nothing is off. With Teltek’s support, you can have your back end monitored around the clock for attempted breaches or DDoS attacks.
  • Never leave anything to chance. Don’t try to protect your business and customers from data breaches and cyber security attacks alone.

Partner with Teltek for Cyber Security Protection

Teltek is a leader in IT and cybersecurity solutions for businesses of every size. Thanks to our Total Care Assurance Guarantee, we have a loyal and thriving customer base. Our proprietary approach to meeting any business’s IT needs for a single fixed price is part of what makes Teltek different. If you are ready to learn more about Teltek and our Total Care Assurance solutions, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

How to Improve Your Small Business Cybersecurity

Wednesday, August 8th, 2018


A whopping 87% of small business owners do not think that their small business is at risk of having a cybersecurity breach. However, half of small businesses will experience a cyber-attack. Small businesses are appealing to hackers, who know that security measures will be looser and more data can be gleaned. Protecting your business and customer data is more critical than ever, so now is the time to invest in adequate cybersecurity measures.

Train Your Employees

Your employees are your front line defense against cybersecurity issues. When creating a network safety plan for your business with help from the experts at Teltek, you should also include policies and best practices that your employees will follow. Procedures for securing customer, employee and vendor information safe should all be clear and easy to understand. You should also outline what should be done in the event of a breach. Employees should also know the importance of strong passwords and be utilizing two-factor authentication. A little extra time can mean the difference between a breach and staying secure.

Update Computers Regularly

If you have managed IT services, Teltek can take care of performing regular updates. However, you should still regularly check to see if there are software or security updates available for all desktops, mobile devices, tablets and laptops at your business. Browsers should also be kept up to date. Any software on your computer will need to be updated, but cloud software should be regularly updated anyways.

Secure Your WiFi

WiFi is one of the most significant vulnerabilities that most small businesses have. If you do not secure your WiFi, people outside of your business or even next door could access your company and customer data. When your WiFi is set up, make sure that it is secure and that employees do not know the password. If you do want to offer your customers free WiFi, you should set up a completely separate network with different permissions.

Cybersecurity Solutions from Teltek

Teltek is a leader in IT and cybersecurity solutions for businesses of every size. Thanks to our Total Care Assurance Guarantee, we have a loyal and thriving customer base. Our proprietary approach to meeting any business’s IT needs for a single fixed price is part of what makes Teltek different. If you are ready to learn more about Teltek and our Total Care Assurance solutions, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

Are Your Remote Employees a Security Risk?

Wednesday, March 21st, 2018


Today’s workers are used to more flexibility than ever before, as many companies allow workers to be remote employees. There are many benefits to allowing workers to work from the comfort of home, including lower overhead costs and increased productivity. However, there are several downsides as well. One of the biggest risks of using remote employees is security. Here are some of the best ways to ensure that your remote workers don’t become a security risk.

Make a Plan

A data breach or sensitive data exposure can do permanent damage to your company’s reputation and bottom line. Even though that is the reality of the situation, many small and medium-sized businesses do not have any cybersecurity protocols. Work with your managed services provider, like Teltek, to develop a plan for security in the office and the home office. Employees should know the proper procedures for password creation, storing data, deleting data and alerting the proper people when they think that something went wrong. If you do not proactively tell employees what to do, they may make a mistake and keep it to themselves, leading to a huge vulnerability.

Keep Devices Separate

If you do have remote employees, you should encourage or require them to use company-issued computers, phones and tech devices for all work-related activities. It is much simpler to keep things secure when you own the equipment, and much more difficult to regulate activities on employee-owned tech. If your employees do use personal devices, make sure that they understand the importance of never transmitting sensitive information or discussing secret information over the phone. Data can be stolen and compromised easy on unsecured devices.

Require VPN Usage

Virtual Private Networks (VPNs) are designed to create a separate, secure internet connection. VPNs work by encrypting data and then hiding the IP address of the end user. Your remote employees could then work with sensitive or secret information and securely transmit it over the connection between the computer and your business. VPNs are a relatively inexpensive way to keep a business network secure without needing to invest in all new computers, tablets and mobile phones.

Protect Your Business from Remote Employee Security Risks

If you are curious about the best ways to keep your employee devices secure or how to set up VPNs for your employees, contact Teltek today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

The Most Common VoIP Security Threats

Wednesday, March 14th, 2018


Business owners are finally starting to understand the importance of investing in computer, network and VoIP security, but many are still hesitant to invest in measures to protect all three until something bad happens. A 2017 study found that the average cyber-attack on small businesses with fewer than 99 employees cost a whopping $36,000. With costs that high, you can’t afford to not invest in protecting your network and your VoIP system.

The Most Common VoIP Security Threats

  • SPIT (Spam Over Internet Telephony) is similar to spam emails that can be sent through compromised email accounts. Unlike spam emails, which are easy to identify and delete, SPIT calls are often time-wasters since they are hard to identify until the phone has been answered. Installing a robocall blocker can help, but SPIT calls often still slip through as a result of number spoofing. SPIT is growing rapidly, and now VoIP spam constitutes over 10% of all online spam.
  • Unencrypted traffic is a significant VoIP security threat since it allows for eavesdropping on your conversation. While traditional telephone lines are also unencrypted, VoIP phones are particularly at risk because they are directly connected to the internet. Many businesses with VoIP systems set up virtual private networks (VPNs) using an IT services provider to protect all VoIP traffic.
  • Hacking is always a risk for any device connected to the internet, and VoIP devices are no different. While the ability to use your phone number and voicemail from anywhere in the world using your mobile device or computer is convenient, it does not come without heightened risk. Your business should regularly change VoIP security passwords and PIN numbers and limit who has access to that information.
  • Hardware that is outdated is another common VoIP security threat. If you are still using older models of VoIP hardware like IP phones or analog telephone adapters, you could be putting yourself at risk. Newer telephones come with additional security features to protect you and your customers.

Protect Yourself from VoIP Security Threats with Teltek

Teltek partners with numerous commercial businesses to protect VoIP hardware and software from hackers, spammers and anyone with malicious intent. Our IT consulting services begin with an assessment of the existing hardware that you have and include recommendations for new VoIP devices that are more secure and able to meet your needs. Whether you’re looking for a way to integrate VoIP lines with your current telephones or seeking to upgrade your outdated system, Teltek can help you! If you are curious about how why VoIP security is so important for your business, contact Teltek today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

4 Signs Your Business Needs a New Security Camera System

Monday, February 26th, 2018


Keeping your employees, inventory and customers safe often means installing an effective security camera system to monitor your property around the clock. If you currently have a security camera system but haven’t updated it since VHS tapes were the best way to store videos, it might be time to invest in some upgrades. Today we are discussing four signs that your business needs new security cameras.

Your Cameras Are Outdated

Video quality has come a long way over the course of the past five years. Today’s security cameras are designed to store recordings in the cloud, record high-definition video and resist tampering. Teltek offers modern security cameras with rapid frame rates, excellent recording quality and high-resolution stills that can be used for a variety of purposes in the event of an emergency.

You Changed Locations

If you have expanded your business or changed locations, you should not take your old security camera system along with you. Sensitive equipment can be damaged during a move, and security systems are never one-size-fits-all. Cameras that covered your last property perfectly will now have blind spots and vulnerabilities that were not previously there. You should always ask a trained security technician to assess any new locations for camera needs before assuming the old system will do the trick.

Your Business Has Changed

Camera systems should grow with your business as it changes. If you have changed your products or services, hired numerous new employees or altered the layout of your office, you should consider adding more cameras or experimenting with a new configuration. Every property alteration that you make shifts the likelihood of theft occurring, and it’s your job to mitigate the new risks effectively.

Your Crime Rates Have Changed

Some cities that were known for low crime rates and high levels of safety have become places that are notorious for property crime and theft. If the crime rate in your area has changed radically and criminals are searching for easy targets, an outdated security system is a liability.

The Latest Security Camera Systems from Teltek

Teltek offers numerous security camera solutions to our commercial customers, including the Arecont Vision line, Tripp Lite products and the exacqVision ELP network video recorder. If you are ready to update your security cameras to ensure that your business is protected, contact Teltek today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

3 Myths About Cloud Computing

Wednesday, February 7th, 2018


Cloud computing has been a popular technology solution for businesses of every size for many years, but some businesses remain stubborn holdouts as a result of misinformation. Is your business missing out on the potential of cloud computing because of one of these three myths?

Myth: Cloud Computing is Not Secure 

In reality, cloud security is probably tighter than your existing security system. As threats evolve, cloud technology and software platforms are continuously updated to protect data from falling into the wrong hands. Cloud vendors use data encryption and rigorous security protocols to protect businesses. Most small businesses do not independently use such updated, high security standards.  

Myth: Moving to the Cloud Will Take Too Long

Depending on the size of your business, migrating your documents and data to the cloud could take as little as one week! Teltek has a great deal of expertise in moving businesses into the cloud, so we can manage every aspect of migration for a seamless transition. Once your data and applications have been moved over, we can train key employees in how to operate the new systems properly.

Myth: Cloud Computing Costs Too Much

Teltek works with business owners who fall victim to this myth on a daily basis! Cloud computing is not only inexpensive, but it’s also often less expensive than traditional computing. You do not need to invest a great deal into purchasing and installing new equipment or software. You also won’t need to worry about maintenance, security systems, power or cooling for your cloud system. Instead, you will experience a simple and valuable storage solution that offers all of the features you need without a steep cost.

Explore Cloud Computing with Teltek

If you are curious about how cloud computing could improve the way you do business, contact Teltek today for a free consultation at 1-866-9-TELTEK or 410-552-6580.