Blog - Cyber One Solutions

ByCOS Webmaster

Gain a Deeper Understanding of Your Environment with our IT Assessments

With Cyber One’s comprehensive approach based on industry best practices, we help you win with IT. 

Chances are, your IT environment has developed gradually. Over time, problems can emerge, including performance gaps, redundancies, inefficiencies, and unintended information silos. Eventually, it can be difficult to determine what is and isn’t working. Without the proper perspective, it can be difficult to know where to invest your IT resources.

What exactly IS an IT Assessment? 

An IT Assessment is a comprehensive and thorough review of a company’s environment and technology systems. An effective IT assessment, like the one provided by Cyber One Solutions, will result in a written evaluation and recommendation. IT assessments help organizations like yours, no matter how large or small, get a better return on your IT investment, and, helps keep you winning with IT now and in the future.

We conduct a thorough, in-depth review of all of your critical technology areas, evaluate them against best practices, and provide you with a road map to better leverage your IT as a competitive advantage.

Knowing More Helps You Invest More Wisely

Our IT Assessments make it simple to identify your IT strengths and weaknesses so you can invest more wisely. Our ITA analyzes an expansive range of IT functional areas, including:

  • Data Storage: SAN, permissions, performance, accessibility, availability
  • Server Infrastructure: Warranty/support, performance, capability planning, virtualization, operating systems
  • Network Infrastructure: Power, environment controls, UPS, warranty/support
  • Networking Infrastructure/Carrier Services: ISP, network switching, wireless, cabling and connectivity, LAN/WAN, warranty/support
  • Cloud Services: Compliance, availability, accessibility, service delivery models
  • Business Services/Applications: Collaboration and messaging, financial management, CRM, Active Directory/directory services, business intelligence, file/print sharing
  • Disaster Recover/Business Continuity: RTO and RPO, DR planning/readiness, business and impact analysis, backups
  • Network Security: RTO Password policies, anti-virus, anti-spam, firewall, content filtering, physical security
  • Telephony: All aspects of your telephony solution
  • Risk: Risk identification, risk analysis

Upon completion of the assessment, you receive a detailed report and in-person presentation that outlines the current state of your technology and offers detailed recommendations for improvement.

What are the benefits of a winning IT assessment?

An IT Assessment from COS will help you re-define your business objectives and main focuses. Our IT Assessments will also help you align your IT initiatives with your strategic business plan. In your IT Assessment, we will help you address the following business challenges:

  • Rapid growth and expansion
  • Post-merger integration
  • Regulation and compliance requirements
  • Changes in the competitive landscape
  • Globalization
  • Cost-reduction

These common business challenges, along with many other common business challenges, such as new business processes and changes in management often drive the need for your business to conduct an IT Assessment. At Cyber One, you can rely on us to leverage the appropriate technology to help you improve your business and continue to win with IT.

How Do You Know If Your Organization’s IT is Performing Well?

Often times, IT professionals and businesses of all shapes and sizes become focused on daily business activities and fail to fully understand what it happening with an organization’s IT. However, an IT assessment can help your organization move IT from being reactive to proactive and turn IT into a competitive advantage rather than a detriment. At COS, we are positioned to navigate through the IT Assessment process and help you understand what you can do to improve your company’s IT performance and maintain that winning edge among your competitors. To learn more about our IT Assessments, please call us at (281) 672-8035.

Moving to the Cloud and Need An Assessment?

If you are in the process of moving all or part of your IT assets to the cloud, we can help. With our Cloud Readiness Assessment (CRA), we perform a thorough evaluation of your IT environment, including all applications, security and compliance requirements, disaster recovery and business continuity, and much more.

 

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

 

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

ByCOS Webmaster

How to Stop Facebook App From Tracking Your Location In the Background

facebook location history background

Every app installed on your smartphone with permission to access location service “can” continually collect your real-time location secretly, even in the background when you do not use them.

Do you know? — Installing the Facebook app on your Android and iOS smartphones automatically gives the social media company your rightful consent to collect the history of your precise location.

If you are not aware, there is a setting called “Location History” in your Facebook app that comes enabled by default, allowing the company to track your every movement even when you are not using the social media app.

So, every time you turn ON location service/GPS setting on your smartphone, let’s say for using Uber app or Google Maps, Facebook starts tracking your location.

Users can manually turn Facebook’s Location History option OFF from the app settings to completely prevent Facebook from collecting your location data, even when the app is in use.

However, unfortunately, disabling Location History would also break some Facebook features that rely on location data like checking into a nearby location, tagging locations in an uploaded photo or while using Nearby Friends, a feature that lets friends share their locations with each other.

facebook location history background

When talking about iOS, Apple offers its users more control over such situations at device level where users don’t want to completely stop an app from using location, allowing them to choose if an app can also access location data in the background or not.

However, people using Facebook on Android have an all-or-nothing option when it comes to location sharing, which means either they have to grant Facebook full access to their location data or completely prevent the social network from seeing your location at all, without any option for accessing your location data only when the app is open.

How to Stop Facebook From Tracking You When Not in Use

Facebook has finally changed this behavior by introducing a new privacy setting to its Android app, giving users more explicit, granular control over background collection of their location data.

Here’s how you can prevent Facebook from tracking your location when the app is not in use:

  • Open the Facebook app on your Android smartphone
  • Go to the Settings menu on the top right corner (looks like this ☰)
  • Tap on Settings & Privacy
  • Choose Privacy Shortcuts
  • Select Manage your location settings
  • Now, toggle “Background Location” to OFF

If you enable this setting, two things will happen—”you would share your location when you weren’t using the app, and you would allow Facebook to store a history of your precise locations.”

“We’re not making any changes to the choices you’ve previously made nor are we collecting any new information as a result of this update,” Facebook’s post reads.

“For people who previously chose to turn their Location History setting ‘on,’ the new background location setting is ‘on.’ For people who had turned Location History ‘off’ – or never turned it on in the first place – the new background location setting is ‘off.'”

With this update, Facebook gives users a dedicated way to choose whether or not to share their location when they are not using the social media app.

iOS users need not worry about such features, as Apple already offers iPhone users an option to block an app from using their location in the background when the app is not open.

If you are an iPhone user and have not already stop Facebook—or any other app—from tracking your location in the background, you can follow these simple steps:

  • Go to Settings
  • Select Privacy
  • Choose “Location Services”
  • If you want to completely stop all apps from tracking you, turn Location Services off. If you want to limit this setting depending on every app, tap each app and choose “Never” or “While Using.”

Make sure apps that don’t require your location, like most games, photo sharing apps and editors, are set to “Never.”

Meanwhile, Facebook is also sending out alerts to both Android and iOS users, asking them to review their location settings.

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

https://t.co/ypvUyREaQg

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

#houstonbusiness #managedservices #managedservicesprovider #managedsecurity  #managedsecurityservicesprovider #informationtechnology #tech #company #support #wemakeIThappen #gocyberone #cyber #cybersecurity #htx #houston

ByCOS Webmaster

New Phishing Attack That Even Most Vigilant Users Could Fall For!

How do you check if a website asking for your credentials is fake or legit to log in?

By checking if the URL is correct?

By checking if the website address is not a homograph?

By checking if the site is using HTTPS?

Or using software or browser extensions that detect phishing domains?

Well, if you, like most Internet users, are also relying on above basic security practices to spot if that “Facebook.com” or “Google.com” you have been served with is fake or not, you may still fall victim to a newly discovered creative phishing attack and end up in giving away your passwords to hackers.

Antoine Vincent Jebara, co-founder and CEO of password managing software Myki, told The Hacker News that his team recently spotted a new phishing attack campaign “that even the most vigilant users could fall for.”

Vincent found that cybercriminals are distributing links to blogs and services that prompt visitors to first “login using Facebook account” to read an exclusive article or purchase a discounted product.

That’s fine. Login with Facebook or any other social media service is a safe method and is being used by a large number of websites to make it easier for visitors to sign up for a third-party service quickly.

Generally, when you click “log in with Facebook” button available on any website, you either get redirected to facebook.com or are served with facebook.com in a new pop-up browser window, asking you to enter your Facebook credentials to authenticate using OAuth and permitting the service to access your profile’s necessary information.

However, Vincent discovered that the malicious blogs and online services are serving users with a very realistic-looking fake Facebook login prompt after they click the login button which has been designed to capture users’ entered credentials, just like any phishing site.

As shown in the video demonstration Vincent shared with The Hacker News, the fake pop-up login prompt, actually created with HTML and JavaScript, are perfectly reproduced to look and feel exactly like a legitimate browser window—a status bar, navigation bar, shadows and URL to the Facebook website with green lock pad indicating a valid HTTPS.

Moreover, users can also interact with the fake browser window, drag it here-and-there or exit it in the same way any legitimate window acts.

The only way to protect yourself from this type of phishing attack, according to Vincent, “is to actually try to drag the prompt away from the window it is currently displayed in. If dragging it out fails (part of the popup disappears beyond the edge of the window), it’s a definite sign that the popup is fake.”

Besides this, it is always recommended to enable two-factor authentication with every possible service, preventing hackers from accessing your online accounts if they somehow manage to get your credentials.

Phishing schemes are still one of the most severe threats to users as well as companies, and hackers continue to try new and creative ways to trick you into providing them with your sensitive and financial details that they could later use to steal your money or hack into your online accounts.

 

http://ow.ly/a69830nKe90

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.
ByCOS Webmaster

7 Reasons Why Your Organization Needs A Managed Services Partner

Managed Services refer to the practice of outsourcing your company’s IT support and management to improve your organization’s operations. Effectively, this means Managed Services Providers (MSPs), like Cyber One Solutions, would take the place of full-time IT staff that would otherwise be in-house. However, not all businesses have the same IT needs.

So, what can a managed services partnership do for you? Here at COS, we put together seven reasons why you just might want to outsource your IT Services.

1. Reduce Risk

Every business decision, including investments, carries risk. Changes in regulations, technologies, and the market occur at a breakneck speed. MSPs will manage the risk for you and use their industry expertise in areas like security and compliance to minimize your risks.

2. Enhanced Security

Security is a huge focus for any organization. As your organization grows, so do your risks and so does the aftermath of a security breach. MSPs are able to leverage their knowledge and expertise to keep your corporate data safe and sound.

3. Predictable spending

One of the greatest benefits of an MSP is the ability to customize solutions for each client. This prevents you from paying for services that are already taken care of or completely unnecessary for your organization.

4. Lower Costs

The main draw of a managed services model is how much money it can save your business. Not only can an MSP provide a full IT team for a fraction of having one in-house, but it can help prevent expensive network problems.

5. Scalable Solution

As your business grows, the need for different IT skillsets can become a hurdle. With an MSP partnership, it is easy to pick and choose what expertise you need from them so you can add to your service plan as the needs arise.

6. Vendor Management

MSPs deal with software and hardware vendors for you. They’ll handle the complicated and technical conversations, so you don’t have to.

7. Focus on Revenue Generating Tasks

Businesses have limited resources, thus limiting the time and attention of every employee. With an MSP, your organization is able to free up a lot of time and energy for their internal IT staff. This means your IT staff can focus on projects and tasks that they are better suited to handle, while your MSP partner handles the rest.

 

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

 

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

ByCOS Webmaster

The 20 Internet Giants That Rule the Web

The 20 Internet Giants That Rule the Web (1998-Today)

With each passing year, an increasingly large segment of the population no longer remembers images loading a single pixel row at a time, the earsplitting sound of a 56k modem, or the domination of web portals.

Many of the top websites in 1998 were basically news aggregators or search portals, which are easy concepts to understand. Today, brand touch-points are often spread out between devices (e.g. mobile apps vs. desktop site) and a myriad of services and sub-brands (e.g. Facebook’s constellation of apps). As a result, the world’s biggest websites are complex, interconnected web properties.

Today’s visualization, inspired by an earlier work published by WaPo, looks at which of the internet giants have evolved to stay on top, and which have faded into internet lore.

AMERICA MOVES ONLINE

For millions of curious people the late ’90s, the iconic AOL compact disc was the key that opened the door to the World Wide Web. At its peak, an estimated 35 million people accessed the internet using AOL.

By 1999, the AOL rode the Dot-com bubble to dizzying heights, with a valuation of $222 billion dollars.

AOL’s brand may not carry the caché it once did, but the brand never completely faded into obscurity. The company continually evolved, finally merging with Yahoo after Verizon acquired both of the legendary online brands. Verizon has high hopes for the company – called Oath – to evolve into a “third option” for advertisers and users who are fed up with Google and Facebook.

A CITY OF GIFS AND WEB LOGS

As internet usage began to reach critical mass, web hosts such as AngelFire and GeoCities made it easy for people to create a new home on the Web.

GeoCities, in particular, made a huge impact on the early internet, hosting millions of websites and giving people a way to actually participate in creating online content. If the web host was a physical place, it would’ve been the third largest city in America, just after Los Angeles.

This early online community was at risk of being erased permanently when GeoCities was finally shuttered by Yahoo in 2009, but the nonprofit Internet Archive took special efforts to create a thorough record of GeoCities-hosted pages.

FROM A TO Z

In December of 1998, long before Amazon became the well-oiled retail machine we know today, the company was in the midst of a massive holiday season crunch.

In the real world, employees were pulling long hours and even sleeping in cars to keep the goods flowing, while online, Amazon.com had become one of the biggest sites on the internet as people began to get comfortable with the idea of purchasing goods online. Demand surged as the company began to expand their offering beyond books.

Amazon.com has grown to be the most successful merchant on the Internet.

– New York Times (1998)

DIGITAL MAGAZINE RACK

Meredith – with the possible exception of Oath – may be the most unrecognizable name to many people looking at today’s top 20 list. While Meredith may not be a household name, the company controls many of the country’s most popular magazine brands (People, Sports Illustrated, Health, etc.) including their sizable digital footprints. The company also has a slew of local television networks around the United States.

After its acquisition of Time Inc. in 2017, Meredith became the largest magazine publisher in the world.

“HEY, GOOGLE”

When people have burning questions, they increasingly turn to the internet for answers, but the diversity of sources for those answers is shrinking.

Even as recently as 2013, we can see that About.com, Ask.com, and Answers.com were still among the biggest websites in America. Today though, Google appears to have cemented its status as a universal wellspring of answers.

As smart speakers and voice assistants continue penetrate the market and influence search behavior, Google is unlikely to face any near-term competition from any company not already in the top 20 list.

NEW KIDS ON THE BLOCK

Social media has long since outgrown its fad stage and is now a common digital thread connecting people across the world. While Facebook rapidly jumped into the top 20 by 2007, other social media infused brands took longer to grow into internet giants.

In 2018, Twitter, Snapchat, and Facebook’s umbrella of platforms were are all in the top 20, with LinkedIn and Pinterest not far behind.

NOTE: This ranking uses ComScore data which is focused on the U.S. and looks at unique visitors/viewers.

The 20 Internet Giants That Rule the Web

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

ByCOS Webmaster

Microsoft to end support for Windows 7

A new reminder for those who are still holding on to the Windows 7 operating system—you have one year left until Microsoft ends support for its 9-year-old operating system.

So it’s time for you to upgrade your OS and say goodbye to Windows 7, as its five years of extended support will end on January 14, 2020—that’s precisely one year from today.

After that date, the tech giant will no longer release free security updates, bug fixes and new functionalities for the operating system that’s still widely used by people, which could eventually leave a significant number of users more susceptible to malware attacks.

However, the end of free support doesn’t end Windows 7 support for big business and enterprise customers. As always, Microsoft does make exceptions for certain companies that are willing to pay a lot of money to continue their support.

According to a ‘Death of Windows 7’ report from content delivery firm Kollective, as many as 43% of enterprises are still running the nine-year-old operating system, of which 17% didn’t know when Microsoft’s end of support deadline hit.

Millions of Users Are Still Using Windows 7

Want to know how popular Windows 7 is among users? Even after aggressively pushing Windows 10 installations since its release in 2015, its market share finally managed to overtake the user-favorite Windows 7 just by the end of last year.

Windows 7 was released in 2009 and, according to December 2018 stats from Netmarketshare, is currently running on about 37 percent of the world’s PC fleet, which is far ahead of its radically redesigned successor Windows 8 and 8.1 combined.

Microsoft stopped the mainstream support for Windows 7 in January 2015, but Windows users have continued to receive security updates and patches for known security issues as part of the company’s extended support, which runs for at least five years.

In March 2017, Microsoft also started blocking new security patches and updates for Windows 7 and Windows 8.1 users running the latest processors from Intel, AMD, Qualcomm, and others.

“For Windows 7 to run on any modern silicon, device drivers and firmware need to emulate Windows 7’s expectations for interrupt processing, bus support, and power states- which is challenging for WiFi, graphics, security, and more,” the company said.

“The lifecycle begins when a product is released and ends when it’s no longer supported. Knowing key dates in this lifecycle helps you make informed decisions about when to update, upgrade or make other changes to your software.”

Besides ending support for Windows 7 next year, Microsoft will also end support for MS Office 2010, Windows Server 2008/2008 R2, SQL Server 2008/2008 R2, Exchange 2010 and Windows Embedded 7 in 2020.

As for Windows 8, the operating system’s extended support is set to end on January 10, 2023.

What Should Affected Windows 7 Users Do?

If you and/or your business are still running Windows 7, you still have one year left to shift to the latest operating system.

Government agencies and big enterprises can still pay for expensive extended support to continue receiving security updates and patches from the company if they need more than a year to migrate to the newer version.

However, regular users should upgrade their operating system immediately to Windows 10 or a Linux distribution, rather than running an unpatched and increasingly vulnerable version of Windows operating system.


Have something to say about this article? Comment below or share it with us on Facebook or Twitter.

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.

ByCOS Webmaster

Cyber One Solutions Helps Businesses Win!

Are you looking to outsource your IT services? No matter the industry or the size of the technology challenge, Cyber One is dedicated to providing the most effective IT support, strategy & management to businesses large & small.

Contact us today to learn how our managed services can be tailored to meet your business needs. (281) 672-8035 or visit us at https://cyberonesol.com

ByBrian Carrico

We are the Backup and Disaster Recovery experts!

Have you ever deleted a crucial file or lost crucial data? At Cyber One Solutions we have a wealth of experience in backup solutions and disaster recovery — we are the experts in this field. For more information, please get in touch today or visit our website right away. https://www.cyberonesol.com

ByBrian Carrico

NSA to release its GHIDRA reverse engineering tool for free

The United States’ National Security Agency (NSA) is planning to release its internally developed reverse engineering tool for free at the upcoming RSA security conference 2019 that will be held in March in San Francisco.

The existence of the framework, dubbed GHIDRA, was first publicly revealed by WikiLeaks in CIA Vault 7 leaks, but the tool once again came to light after Senior NSA Adviser Robert Joyce announced to publicly release the tool for free in his RSA Conference session description.

Reverse engineering tool is a disassembler, for example, IDA-Pro, that help researchers identify certain portions of a program to see how they work by reading information like its processor instructions, instruction lengths, and more.

GHIDRA is a Java-based reverse engineering framework that features a graphical user interface (GUI) and has been designed to run on a variety of platforms including Windows, macOS, and Linux operating systems, and also supports a variety of processor instruction sets.

The toolkit can also be used to analyze binary files used by programs, including malware, for all major operating systems, including Windows, macOS, Linux as well as mobile platforms such as Android and iOS.

A synopsis for Joyce’s presentation notes that “the Ghidra platform includes all the features expected in high-end commercial tools, with new and expanded functionality NSA uniquely developed, and will be released for free public use at RSA.”

According to the Vault 7 documents, GHIDRA was initially developed by the NSA in the early 2000s, and a Reddit user named hash_define who claimed to have had access to GHIDRA said that the tool had been shared with several other US government agencies in past few years.

While there is no such announcement that the NSA is planning to open source GHIDRA, some believe the agency will also publish GHIDRA source code on NSA’s code repository hosted by Github where it has already released 32 projects, so that the open source community can help maintain it for free.

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.


 
Have something to say about this article? Comment below or share it with us on Facebook or Twitter.
ByCOS Webmaster

Mayday! NASA Warns Employees of Personal Information Breach

Another day, another data breach. This time it’s the United States National Aeronautics and Space Administration (NASA)NASA today confirmed a data breach that may have compromised personal information of some of its current and former employees after at least one of the agency’s servers was hacked.In an internal memo sent to all employees on Tuesday, NASA said the unknown hackers managed to gain access to one of its servers storing the personally identifiable information (PII), including social security numbers, of current and former employees.

The agency said NASA discovered the breach on October 23 when its cyber security personnel began investigating a possible breach of two of its servers holding employee records.

After discovering the intrusion, NASA has since secured its servers and informed that the agency is working with its federal cyber security partners “to examine the servers to determine the scope of the potential data ex-filtration and identify potentially affected individuals.” However, NASA said this process “will take time.”

It should be noted that no space missions were jeopardized by the cyber incident, the agency said.

According to the agency, any NASA Civil Service employee who joined, left, or transferred within the agency from July 2006 to October 2018 may have had their personal data compromised. NASA currently employs roughly 17,300 people.

The agency said all the affected employees would be notified once identified, and offered identity theft protection services and related resources to all affected employees, past and present.

“NASA is continuing its efforts to secure all servers, and is reviewing its processes and procedures to ensure that the latest security practices are being followed throughout the agency.”

This is not the first time when the agency’s servers have been compromised. NASA suffered a massive security breach in 2016 when a hacking group released 276GB of sensitive data including flight logs and credentials of thousands of its employees.

At that time, the hackers even attempted to crash a $222 million drone into the Pacific Ocean by gaining control over the drone by rerouting the flight path.

Cyber One Solutions specializes in offering Managed IT ServicesManaged Security ServicesCloud Services, Project ServicesVoIP ServicesConsulting, and more.


Have something to say about this article? Comment below or share it with us on Facebook or Twitter.