Archive for the ‘Software’ Category

2019 Computer Security Forecast for Small Business Owners

Wednesday, November 21st, 2018

Computer Security

Every new year brings a whole host of new computer security vulnerabilities and threats, which is why the right technology partner is essential. Teltek works hard to stay on top of the latest viruses, threats and hacking trends so that you don’t have to. Here are the 2019 risks that every small business owner should know about.

Email Scams

While email might not seem like a popular way to gain access to sensitive information, it remains one of the most common ways for hackers to infiltrate a business. Many attackers specifically target small and mid-sized companies and pose as employees, partners, vendors or stakeholders. By sending malicious attachments that don’t appear to be dangerous or outright asking employees to confirm private information, your business could be hacked. Make sure your employees understand how to identify suspicious emails and that they never give out personal information and sensitive business information via email.

Dangers of Cloud Computing

Cloud computing has taken off over the past few years, and now more businesses than ever before are connected to the cloud. While it offers a wide range of benefits to businesses on a budget, there are also plenty of dangers to unprotected businesses. If you utilize cloud computing, you should partner with a knowledgeable cloud and computer security company like Teltek. Make sure you also maintain back-ups of files in the cloud and cloud back-ups of physical files at your location.

Ransomware Targeting New Devices

Another computer security threat in 2019 goes beyond what you traditionally think of as a computer. Cyber-criminals are branching beyond traditional desktops and laptops to invade numerous “smart” devices. Hackers can get into smart TVs, tablets, cell phones and any other computer-run devices connected to the internet. It’s more important than ever before for every business to guard the infrastructure every device connects to as a result. Make sure that your Internet is secure, and always use a separate guest network for anyone only in your office temporarily.

Partner with Teltek for Computer Security

Teltek is a leader in IT and cybersecurity solutions for businesses of every size. Thanks to our Total Care Assurance Guarantee, we have a loyal and thriving customer base. Our proprietary approach to meeting any business’s IT needs for a single fixed price is part of what makes Teltek different. If you are ready to learn more about Teltek and our Total Care Assurance solutions, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

What Every Small Business Needs to Know About IT Security

Wednesday, October 24th, 2018

IT Security

What do the biggest companies like Target and Home Depot have in common with the small businesses lining every Main Street? Every business is a prime target for cyber attacks and security breaches. One recent Forbes study found that 20% of small and mid-sized businesses have experienced a breach or hack before, and the annual cost of those hacks is estimated to hit $2 trillion by 2019. When it comes to IT security, what your business doesn’t know will hurt you.

Don’t Keep What You Don’t Need

If you don’t have sensitive information, hackers won’t be able to access it. The higher the amount of personal data that you have about every customer, the higher that your liability is. You should only collect information that you really need and store it for only as long as your business needs it. Don’t be careless with collecting and storing customer data.

Lock Up What You Need to Keep

Every business does need to have a certain amount of sensitive information on hand, and that information should be protected as much as possible. You should require all users with access to use unique passwords that are not used anywhere else. Employee access should be restricted to employees who need to use the data, not everyone at your company. You should also have additional back-end security to protect the computers and servers that the data is living on. A skilled IT security partner like Teltek can help you to secure your physical location and digital footprint to protect the future of your business.

Take Employee Education Seriously

Many of the worst cyber breaches happen as a result of human error. Something that an employee saw no harm in could be the downfall of your company. It’s vital that you regularly educate all employees about proper security procedures. Can employees recognize a phishing email? Does each employee know what to do if they realize a breach occurred? Knowledgeable employees are your front line of defense against hackers.

Talk to Our Team Today

Teltek is a leader in IT services thanks to our Total Care Assurance Guarantee. Our proprietary approach to meeting any business’s IT needs for a single fixed price is part of what makes Teltek different. If you are ready to learn more about Teltek, contact us today for a free 15-minute conference call at 1-866-9-TELTEK or 410-552-6580.

How to Improve Your Small Business Cybersecurity

Wednesday, August 8th, 2018

shutterstock_565329322

A whopping 87% of small business owners do not think that their small business is at risk of having a cybersecurity breach. However, half of small businesses will experience a cyber-attack. Small businesses are appealing to hackers, who know that security measures will be looser and more data can be gleaned. Protecting your business and customer data is more critical than ever, so now is the time to invest in adequate cybersecurity measures.

Train Your Employees

Your employees are your front line defense against cybersecurity issues. When creating a network safety plan for your business with help from the experts at Teltek, you should also include policies and best practices that your employees will follow. Procedures for securing customer, employee and vendor information safe should all be clear and easy to understand. You should also outline what should be done in the event of a breach. Employees should also know the importance of strong passwords and be utilizing two-factor authentication. A little extra time can mean the difference between a breach and staying secure.

Update Computers Regularly

If you have managed IT services, Teltek can take care of performing regular updates. However, you should still regularly check to see if there are software or security updates available for all desktops, mobile devices, tablets and laptops at your business. Browsers should also be kept up to date. Any software on your computer will need to be updated, but cloud software should be regularly updated anyways.

Secure Your WiFi

WiFi is one of the most significant vulnerabilities that most small businesses have. If you do not secure your WiFi, people outside of your business or even next door could access your company and customer data. When your WiFi is set up, make sure that it is secure and that employees do not know the password. If you do want to offer your customers free WiFi, you should set up a completely separate network with different permissions.

Cybersecurity Solutions from Teltek

Teltek is a leader in IT and cybersecurity solutions for businesses of every size. Thanks to our Total Care Assurance Guarantee, we have a loyal and thriving customer base. Our proprietary approach to meeting any business’s IT needs for a single fixed price is part of what makes Teltek different. If you are ready to learn more about Teltek and our Total Care Assurance solutions, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

Are Your Remote Employees a Security Risk?

Wednesday, March 21st, 2018

shutterstock_166600271

Today’s workers are used to more flexibility than ever before, as many companies allow workers to be remote employees. There are many benefits to allowing workers to work from the comfort of home, including lower overhead costs and increased productivity. However, there are several downsides as well. One of the biggest risks of using remote employees is security. Here are some of the best ways to ensure that your remote workers don’t become a security risk.

Make a Plan

A data breach or sensitive data exposure can do permanent damage to your company’s reputation and bottom line. Even though that is the reality of the situation, many small and medium-sized businesses do not have any cybersecurity protocols. Work with your managed services provider, like Teltek, to develop a plan for security in the office and the home office. Employees should know the proper procedures for password creation, storing data, deleting data and alerting the proper people when they think that something went wrong. If you do not proactively tell employees what to do, they may make a mistake and keep it to themselves, leading to a huge vulnerability.

Keep Devices Separate

If you do have remote employees, you should encourage or require them to use company-issued computers, phones and tech devices for all work-related activities. It is much simpler to keep things secure when you own the equipment, and much more difficult to regulate activities on employee-owned tech. If your employees do use personal devices, make sure that they understand the importance of never transmitting sensitive information or discussing secret information over the phone. Data can be stolen and compromised easy on unsecured devices.

Require VPN Usage

Virtual Private Networks (VPNs) are designed to create a separate, secure internet connection. VPNs work by encrypting data and then hiding the IP address of the end user. Your remote employees could then work with sensitive or secret information and securely transmit it over the connection between the computer and your business. VPNs are a relatively inexpensive way to keep a business network secure without needing to invest in all new computers, tablets and mobile phones.

Protect Your Business from Remote Employee Security Risks

If you are curious about the best ways to keep your employee devices secure or how to set up VPNs for your employees, contact Teltek today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

The Most Common VoIP Security Threats

Wednesday, March 14th, 2018

shutterstock_558981754

Business owners are finally starting to understand the importance of investing in computer, network and VoIP security, but many are still hesitant to invest in measures to protect all three until something bad happens. A 2017 study found that the average cyber-attack on small businesses with fewer than 99 employees cost a whopping $36,000. With costs that high, you can’t afford to not invest in protecting your network and your VoIP system.

The Most Common VoIP Security Threats

  • SPIT (Spam Over Internet Telephony) is similar to spam emails that can be sent through compromised email accounts. Unlike spam emails, which are easy to identify and delete, SPIT calls are often time-wasters since they are hard to identify until the phone has been answered. Installing a robocall blocker can help, but SPIT calls often still slip through as a result of number spoofing. SPIT is growing rapidly, and now VoIP spam constitutes over 10% of all online spam.
  • Unencrypted traffic is a significant VoIP security threat since it allows for eavesdropping on your conversation. While traditional telephone lines are also unencrypted, VoIP phones are particularly at risk because they are directly connected to the internet. Many businesses with VoIP systems set up virtual private networks (VPNs) using an IT services provider to protect all VoIP traffic.
  • Hacking is always a risk for any device connected to the internet, and VoIP devices are no different. While the ability to use your phone number and voicemail from anywhere in the world using your mobile device or computer is convenient, it does not come without heightened risk. Your business should regularly change VoIP security passwords and PIN numbers and limit who has access to that information.
  • Hardware that is outdated is another common VoIP security threat. If you are still using older models of VoIP hardware like IP phones or analog telephone adapters, you could be putting yourself at risk. Newer telephones come with additional security features to protect you and your customers.

Protect Yourself from VoIP Security Threats with Teltek

Teltek partners with numerous commercial businesses to protect VoIP hardware and software from hackers, spammers and anyone with malicious intent. Our IT consulting services begin with an assessment of the existing hardware that you have and include recommendations for new VoIP devices that are more secure and able to meet your needs. Whether you’re looking for a way to integrate VoIP lines with your current telephones or seeking to upgrade your outdated system, Teltek can help you! If you are curious about how why VoIP security is so important for your business, contact Teltek today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

Why Are Antivirus and Malware Protection So Important for Your 2018 Security?

Wednesday, January 10th, 2018

malware

2017 was a notable year in the network security world thanks to numerous high-profile viruses and malware variants that compromised major healthcare systems and thousands of companies. 2018 is shaping up to be no different, with multiple ransomware and malware variants on the horizon.

Notable 2017 Ransomware

Over the course of 2017, the following types of ransomware and malware wreaked havoc on numerous networks throughout the country:

  • WannaCry
  • NotPetya
  • Cerber
  • Locky 

Are Any of These Viruses Coming Back?

Many industry leaders expect ransomware strains like WannaCry and NotPetya to be re-released in a slightly modified form to do more damage to networks throughout the country. Both of these types of ransomware were created using a stolen National Security Agency exploit called EternalBlue, which used a known vulnerability on computers running old versions of Windows to spread.

Predictions for 2018

Network security industry experts are predicting that ransomware and Ransomware as a Service (RaaS) will continue to spread. RaaS kits are available to any level of hacker, regardless of their technical knowledge and skill, which makes them a particularly dangerous possibility.

While computers and networks have been traditional targets for viruses, Android mobile devices are becoming increasingly at risk. WannaCry was found in multiple apps on Google Play. Google works its hardest to remove these apps, but the hackers are working just as hard to put out more apps and stay a step ahead. Security for your office’s mobile devices, like tablets and phones, is going to become more important in 2018. 

Teltek Offers Top-of-the-Line Antivirus, Spam and Spyware Protection

Unfortunately, many of the businesses targeted by ransomware and malware attacks do not have a security strategy or know what to do when the worst happens. By partnering with an experienced network security partner like Teltek, you can rest assured that your security will be proactive and not reactive. We work hard every day to protect your network from the latest viruses and other security threats.

Partner with Teltek for Antivirus and Malware Protection

If you are ready to learn more about Teltek’s network security services and see how they can protect your company, contact Teltek today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

Enhance Your Avaya Phone System

Wednesday, July 12th, 2017

solutions_ximacare

Have you updated your phone system since you opened your business? Do you have the bare minimum of features needed to get your job done, or are you struggling under the weight of too many useless elements you don’t use? The Xima software suite is designed to change the way that you use your business phones and equip you with the data that you need when you need it.

Chronicall

Chronicall is the core of the Xima software suite. It offers a broad range of features including custom call reporting, call recording and real-time updates. The standard reports are designed to give you the basic information you need to effectively meet the needs of your business and your customers. The 40 types of standard reports include:

  • Hunt Group reports
  • Agent/extension reports
  • Caller ID reports
  • Inbound/Outbound Call reports
  • Call cost reports
  • Time interval reports
  • Trunk/Line-reports

Beyond the basics, all of the Chronicall reports include unlimited supervisor logins, report scheduling, user access controls and detailed charts. 

Custom Chronicall Reports

If you need specific information about your business and customers, the custom reports module allows you unlimited custom reports. The report type could include any of the following:

  • Agent
  • Account code
  • Call direction
  • Call report
  • Caller ID
  • Event type
  • Feature type
  • Group
  • Local number
  • System report
  • Time interval
  • Trunk

Once you choose the designation for your report, you can select from filters and values to get exactly what you need. Confused by all of the options available to you? Teltek and Xima Care are both available to help with tutorials and troubleshooting.

Xima’s VRTX Call Recording System

If you rely on accurate call recording, Xima’s VRTX (Voice Recording Technology) is the perfect solution. The VRTX system can be used by connecting the in-line hardware and your phone system and plugging it into your Chronicall server. This call recording technology will record everything and add it to the Chronicall recording library. Once they are added to the library, they will be easily accessible 24/7.

Change the Way You Use Your Avaya Phone system with Xima’s Software Suite

If you’re ready to see how you can save money with Teltek and our managed IT services, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

TechSoup Can Transform Your Non-profit

Wednesday, May 10th, 2017

working

Just like non-profits rely on the community to fund their programs, the community relies on non-profits to take care of its most vulnerable community members. TechSoup is an innovative website providing steep technology discounts and product donations for various non-profits throughout the globe. What can TechSoup do for your non-profit?

TechSoup’s Amazing Impact

Since its inception, TechSoup has provided hardware and software to over 300,000 non-profits throughout the world including libraries and schools. As a non-profit, TechSoup receives hardware and software donations and discounts that are passed along to worthy recipients. TechSoup works with countless high-profile companies to distribute donations, including:

  • Adobe
  • Cisco
  • Dell
  • DonorPerfect
  • GoDaddy
  • GrantStation
  • Intuit
  • Microsoft
  • Quickbooks
  • Skype 

Software

Running a non-profit takes a huge amount of work behind the scenes. Without the proper software to organize and maximize productivity, executive directors can turn into administrative assistants. TechSoup boasts an impressive catalog of heavily discounted software including the Microsoft Office Suite, anti-virus software, Adobe Creative Cloud and QuickBooks.

Hardware

Are you more concerned about getting a computer to put software on than the software itself? TechSoup has a robust catalog of refurbished and new computers, laptops, monitors, networking hardware, headsets and mobile hotspots. TechSoup also has staff available on call to help non-profits determine their hardware and software needs.

TechSoup & Teltek

In addition to TechSoup’s expansive catalog of offerings, Teltek provides IT services, maintenance and tech support for non-profits. If your organization is struggling to stay connected with clients and donors, we can help determine your needs, procure the right equipment, set up your office, train your staff on how to use new devices and check back in to make sure everything is working properly. If you’re ready to see how you can save money through TechSoup and through Teltek, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.