“Can you send out one of your newsletters explaining this situation and how it happens to a huge company like Colonial, and what your security is doing to prevent this type of situation?”
We are asked sometimes “If these big companies and the Tax Services of Canada are hacked how can JEI Tech stop it happening?”
First and foremost, it is not currently public knowledge how the hackers accessed the systems at Colonial Pipelines (that may never be released). What we can say is they were most likely targeted with phishing e-mails and this is the most common method of accessing networks.
We recommend best practices which many of our clients are following. These are also Canadian and Albertan legislated requirements.
JEI Tech commonly used best practices:
JEI Tech has deployed the below less commonly used security practices on our own network. All of which we are now going to be recommending to clients.
Can you survive days without computers, e-mail and internet and stand to lose any or all your data? What will the effect on your business be?
The biggest and most common reason for a breach is not the lack of security, but rather it is the people behind our desks. Not because of carelessness but due to the overload of e-mail, lack of training and the access to open internet. These are all factors you can address.
In the MSP community we have found the average cost of being secure is a minimum of $100 per computer/user. This does not include support.
“Whenever we talk about AI integrated into technology, the most common application that our clients are aware of is how facial recognition cameras can integrate with AI. With an appropriate data set, AI can proactively suggest a course of action based on a target’s background, prior behaviors, and other factors. This has obvious benefits for enhancing the security of any physical location,” stated Coleman, Director of JEI Tech . “However, AI is becoming more central to every facet of cybersecurity, as well. While the applications are still growing in widespread popularity, many business owners will soon be faced with this question: should I put my business on a ‘Smart Network’ or just on ‘a network?”
As more businesses utilize key SaaS (software-as-a-service) apps like Slack, Office 365, GSuite and Salesforce to power their operations, the more attractive those services have become to cybercriminals. JEI Tech is now leveraging AI to heighten defenses so that businesses can continue to work with their favorite SaaS applications, but can also rest assured that their access to those mission-critical programs remains 100% secure. AI is like adding another layer to an organization’s security stack that constantly evolves into a better version of itself.
AI is also entering the cybersecurity space as a tool for research and marketing purposes. Some AI-enabled applications can cross-analyze multiple publicly available databases to help businesses find their ideal clients’ names, email addresses, phone numbers and other relevant information in real-time. “AI is absolutely exploding, right now,” added Coleman. “The fact that technology can learn, become smarter and more efficient, means ultimately that the businesses who harness AI now, are poised to gain significant competitive advantages in their industry. In other words, the gap between early adopters and laggards is widening.”
The main driver for AI-based technology is simple: since cybercriminals have access to more advanced technologies, they have continued to devise new methods of infiltrating networks. Since those are built on the back of AI, the solution for SMBs who want to operate securely, must meet those strategies with equally sophisticated cyber defense tools. With the proper AI infrastructure, SMBs can not only outpace the innovation curve of cybercriminals, but they can also enhance their security across every area of the organization.
Take Our Cyber Security Quiz
How does your cyber security posture stack up? Take our short quiz to see!