Contact Us Today!

Managed Cyber Security

Protecting your most important assets
requires a Beringer approach

Schedule your FREE consultation

How confident are you in your company’s cyber security?

Many small- and medium-sized businesses don’t feel they are at risk of cyber attacks, but the reality is that they’re often the biggest targets. Worse still, 60% of those targeted go out of business within six months after a security breach.

Dealing with today’s IT threats calls for a modern approach. While traditional methods of securing sensitive information are vital, more intelligent safeguards are needed to combat more sophisticated attacks.

Beringer Technology Group’s Managed Cyber Security services utilize state-of-the-art tools and techniques to fortify your defenses and keep all manner of threats at bay.

img-beringer-managed-cyber-security

Our services ensure complete end-to-end protection

Here’s how it’s done

  • We identify vulnerabilities via comprehensive risk assessments
  • We keep you updated on high impact IT threats
  • We design a strategy that addresses your vulnerabilities
  • We provide routine security audits to help you achieve compliance
  • We routinely monitor and maintain security solutions to ensure your systems are fully secure
  • We develop a strategic approach to data access and management

Beringer Blog

Stay up-to-date on the latest security developments

Protect your phone from juice jacking

Protect your phone from juice jacking

Smartphones help us complete various work and personal tasks, and, depending on our usage, we may need to recharge them several times a day. But when your charger is unavailable and you need power for your phone, charging at public kiosks can seem like a good substitute. Here’s one good reason why you shouldn’t plug a public USB charger into your phone: doing so can make you a victim of a cyberattack called juice jacking.

What is juice jacking?

While newer phones can be charged wirelessly, older models still need power cords to power up their batteries. This charging method has one dangerous flaw: the cable used for charging can also be used for transferring data. Cybercriminals can exploit this flaw to commit juice jacking, or the act of using the USB data/power cable to illegitimately access phone data and/or inject malicious code into a device.

Juice jacking often happens at public charging kiosks. When you charge your phone, it is paired with a computer concealed within the charging stand. The computer can then access all of the information on your device, including personal data such as your address book, notes, photos, music, SMS database, and keyboard cache. It can even initiate a full backup of your phone, which can be accessed by the hacker wirelessly anytime.

Apart from stealing your data, cybercriminals can also inject malware into your phone through a public USB hub. All it takes is a minute of being plugged into a public charger for your phone to be infected by malware. Once infected, your phone can be prompted to display ads, download apps, or view web pages without your authorization.

How to avoid juice jacking

The most effective precaution against juice jacking is simply not charging your phone using a third-party system. Here are some tips to help you avoid using a public kiosk charger:

  • Keep your battery full. Make it a habit to charge your phone at home or at the office when you are not actively using it. When unexpected circumstances happen and you get stuck outside, your phone will have enough juice and you won’t need to charge it.
  • Carry a personal charger. External batteries like power banks have become very small and portable in recent years. Always have one in your bag so you can charge your phone securely on the go.
  • If your device has a removable battery, carry a backup battery with you anywhere. If the idea of carrying a spare battery doesn’t appeal to you, you can opt to carry a battery case instead: it’s a phone case that doubles as a battery.
  • Lock your phone. Without the proper PIN code or fingerprint and face ID scan, your phone cannot be paired with the hidden computer in the kiosk charger.
  • If you must use a third-party power source, use power-only USB cables. These cables are missing the two wires necessary for data transmission, ensuring that they can only be used for charging.

Contact Beringer Today!

Technology threats are all around us. Even something as trivial as powering your phone in a public kiosk station can compromise your device’s security. If you want to learn more about how to protect your gadgets from today’s security threats, then reach out to Beringer Technology Group today, and ask about our Cyber Security Risk Assessment Solution.

Beringer Technology Group, a leading Microsoft Gold Certified Partner specializing in Microsoft Dynamics 365 and CRM for Distribution. We also provide expert Managed IT ServicesBackup and Disaster RecoveryCloud Based Computing and Unified Communication Solutions.


Cyber Security Technology Without Training Is Useless

If you want to drive a car or play a musical instrument or bake a cake - you need more than just the equipment and ingredients to do so. The how-to knowledge is key, of course. That and some practice. (Especially in my kitchen!)

Why would you bother to roll out tools like antivirus, anti-malware, endpoint security, email filtering, DNS protection, data loss prevention, geofencing, firewall traffic shaping, etc. etc. etc.... without also training the end user group to spot an attempted incoming email intrusion when it happens??

"We have plenty of protection already in place..."

Most of the tools and solutions above are background defensive measures to prevent an infection or breach. It is relatively easy to roll out tools that work in the background and don't involve the user having to actively participate in the conscious, daily process of cyber defense. That might require effort or some thought to really get to a level of effectiveness that would stop the attack...!!

The title of this blog makes it sound like all the items above are just fluff and not doing their job to protect you. On the contrary, all those are valuable assets in the war against cyber crime. BUT - more is needed. The glaring risk and issue we face is users clicking a link in an email without thinking first, opening the door to an intrusion - and defeating those tools. 

Get in the game!

There's the rub - user involvement. Just a few years ago, the attack vectors bad actors used were pretty obvious and more easily spotted and thwarted, mostly by those installed security tools. Nowadays, the threat landscape is much more subtle and it takes a good bit more knowledge and presence of mind to counteract these threats.

We implement the tools quite easily and many people are aware of the need for those but I still get pushback on cyber security awareness and training sometimes. The challenge is that YOU have to be part of the solution. Awareness and training are not just a good idea now, they are a requisite part of the fight. 

Contact us for more on awareness and training solutions. Background tools are essential but the holistic solution (involving you) is by far the best way to protect yourself and your network from breach. 

Contact Us! 

Beringer Technology Group is always here to provide expert knowledge in topics like these. We hope you found this discussion of  Cyber Security Technology without Training helpful. If you have any other questions, contact us today to learn more!

Beringer Technology Group, a leading Microsoft Gold Certified Partner specializing in Microsoft Dynamics 365 and CRM for Distribution. We also provide expert Managed IT ServicesBackup and Disaster RecoveryCloud Based Computing and Unified Communication Solutions.


Cybersecurity is Critical for your Business

Cybersecurity is Critical for your Business

If your company has recently suffered from a data breach or a ransomware attack, then you know how costly it can be. You lose not just hundreds of dollars but also the reputation you’ve built through the years. That’s why you need cutting-edge cybersecurity solutions to protect your business from ever-growing cybersecurity threats. The good news? Even small- and mid-sized businesses can partner with managed IT services providers (MSPs) who can provide robust solutions and security expertise to protect businesses from huge losses.

The Numbers

According to the Ponemon Institute’s 2019 State of Cybersecurity in Small and Medium-Sized Businesses (SMBs) survey, cyberattacks have increased dramatically. Here in the United States, 76% of companies were attacked in 2019, a significant leap from 55% in 2016. Sixty-nine percent of US businesses reported data breaches in 2019, up from 50% in 2016.

The financial consequences have also increased considerably. The average cost spent by companies because of damage to or theft of IT assets and infrastructure increased from $1.03 million in 2017 to $1.2 million in 2019. Costs due to disruption to normal operations increased from an average of $1.21 million in 2017 to an average of $1.9 million in 2019.

The Attacks

Globally, the most common forms of attack on SMBs are those that rely on deception: phishing (57%), stolen or compromised devices (33%), and credential theft (30%). Worse, cybercriminals are targeting SMBs more, with reported attacks having increased from 60% in 2017 to 69% in 2019.

Why Managed Services?

Partnering with MSPs is the most effective way to prevent attacks and protect your business from malicious threats. MSPs offer a full range of proactive IT support that focuses on advanced security, such as around-the-clock monitoring, data encryption and backup, real-time threat prevention and elimination, network and firewall protection, security awareness training, and more.

And because managed services are designed to identify and fix weak spots in your IT infrastructure, you’ll optimize the digital backbone of your business processes. You’ll have faster network performance, a solid business continuity and disaster recovery strategy, and minimal downtime. One of the best things about managed services is that you get a dedicated team of IT professionals ready to assist you for any technology problems you may encounter. This is much more effective and budget-friendly than having in-house personnel handling all your IT issues.

Contact Beringer Today!

Cybersecurity is critical for your business!  Being proactive when it comes to cybersecurity is the only way to protect what you’ve worked hard to build. If you’d like to know more about how managed services can benefit your business, then reach out to Beringer Technology Group today, and ask about our Cyber Security Risk Assessment Solution.

Beringer Technology Group, a leading Microsoft Gold Certified Partner specializing in Microsoft Dynamics 365 and CRM for Distribution. We also provide expert Managed IT ServicesBackup and Disaster RecoveryCloud Based Computing and Unified Communication Solutions.


Cloud Data Backup With Datto Backupify

Protect Your Cloud Data with Datto Backupify

Disgruntled employees are not nice people, and when they leave they often make an  "exit statement" and wreak havoc on your network, or their company data and email. In some cases, they might delete their mailbox, OneDrive or SharePoint files, erase Teams history or delete contacts. Your business does not want to face this situation and potentially lose important company data.  These are just a few reasons we recommend a backup solution for your cloud Exchange, SharePoint and more - Datto Backupify. 

Peace Of Mind For Cloud Data

According to Datto, with Backupify, "We bring peace of mind to IT managers all over the world by making sure their irreplaceable cloud data is protected and safe from harm." That peace of mind is not just for Beringer Technology Group or your IT manager, it is a right of all business leaders, and employees. Whether the deletion of data is malicious or accidental, it may not be noticed for weeks or months. Recoverability of data deleted after this much time has passed is only possible with a cloud backup. 

Do Microsoft and Google Backup My Data?

You might ask yourself, "Microsoft and Google will keep my data safe, so what’s the advantage of having a backup solution?" The "Shared Responsibility Model" was created by Microsoft to outline who is responsible for data in different scenarios of data loss. Software-as-a-service (SaaS) vendors are only responsible for data protection and data loss some of the time, which means you are responsible for data security and data loss for the rest of the time.

Businesses Moving To SaaS

Migration to the cloud comes with it's own set of challenges and responsibilities, and SaaS is a different world in some ways but has similar requirements for security, redundancy and recoverability to traditional networks. It is estimated that by 2022, based on current trends, that 78% of businesses will run almost entirely on SaaS. Protections against accidental deletion, forgotten saves, device loss or theft and unhappy personnel departures will be necessary, and third-party Office 365 backup is the best way to protect against accidental or malicious file deletion, other user errors, ransomware, and data corruption. This ensures that you can restore quickly and meet data retention requirements for your Office 365 data.

Data Type Covered By Backupify

Backupify (Datto SaaS Protection) currently backs up the following data types:

  • OneDrive
  • SharePoint
  • Contacts
  • Calendar
  • Tasks
  • Mail services
  • Teams

Backup Frequency

The backup schedule for Office 365 is fully automated and runs three times daily for each service, morning, noon and night.

  • The day's first backup run occurs between 12:00 AM and 8:00 AM (GMT).
  • The second run occurs between 8:00 AM and 4:00 PM (GMT).
  • The third occurs between 4:00 PM and 11:59 PM (GMT)

Reporting Via Insights

Datto's Backup Insights provides the capability to rapidly identify and display what has been modified, created, or deleted between any two backups, enabling full management of data restores and fast recovery times. The cost for the security provided by Backupify is just a few dollars per user per month. 

Contact Beringer Today!

Cloud backups are a key component of IT management. Contact us to set up a free trial and see how easy Backupify is to use. Email to [email protected] or call 856-325-2800 (option 1) to speak with a representative and learn more about Beringer's approach to cloud backups. 

Beringer Technology Group, a leading Microsoft Gold Certified Partner specializing in Microsoft Dynamics 365 and CRM for Distribution. We also provide expert Managed IT ServicesBackup and Disaster RecoveryCloud Based Computing and Unified Communication Solutions.