The TDSIT Blog

Preventing Malware Attacks 101

Posted by Tim Stanley on Wed, Dec 09, 2015 @ 10:40 AM


The threat of malware attacks is not expected to slow down; on the contrary, vicious malware attacks are expected to amplify over the coming years.  The sophistication of this type of malicious software has made it very difficult to detect and block.

To keep yourself and your business safe, here are some basic tips:

  • Update or install security software – Make sure your security software detects and blocks malware and it is kept up to date in order to prevent new versions from penetrating your network.
  • Links and attachments – Whenever you or any of your personnel receive a link or attachment in an email be sure to verify before opening.  Confirm the link is from a trustworthy source that you know. The attachment should be scanned for viruses and malware even if it has come from a reliable source.
  • Educate your employees – Hold periodic training sessions with your staff to make sure they understand the dangers of malware and how they can help keep the company safe from attacks.
  • Bringing outside devices – USB drives, laptops, tablets or other devices could easily transmit malware onto your network once connected.  Reduce the chances of transmitting these viruses by having strict security policies in place for connecting these devices.

For more information on how to prevent malware attacks, work with a knowledgeable Managed IT professional who can objectively review your current security capabilities and provide insight on ways to improve.

Here are some additional blogs you may enjoy on ways to keep your company's data secure:

The Ultimate Guide to Password Security

10 Easy Ways to Protect Your Data

Six Areas to Consider When Drafting Your IT Security Policy


Tags: document security, security, Small Medium business, IT services, IT Security Policy, preventing malware attacks

The Hottest Trends in Technology for 2016 and Beyond

Posted by Tim Stanley on Thu, Nov 12, 2015 @ 11:12 AM

tech trends (1)

For the year 2016 and beyond you can expect to see some exciting innovations that will help us to stay connected and make better use of these connections. Here are some of latest technologies identified by Gartner, a leading technololgy research company, that will be in the forefront this coming year:

  • Security – Regardless of the size of business, there is a real threat of identity theft, malware, virus or hacker attacks. New security techniques will be more adaptive in order to block potential attacks with sophisticated algorithms that are difficult to break.
  • Device Mesh – The proliferation of connected devices is not expected to slow down. Today we see desktops, laptops, tablets and smartphones connected. We also see wristbands and special sensors that can help to detect specific events such as heart rate or movement. Picture getting an alert when someone comes to the door of your house, or receiving a notification if your heart rate reaches a certain level.
  • Storage – With all of the data gathered by interconnected devices there will be a tremendous need to store and analyze the data. New field programmable gate arrays, or FPGAs, will allow super-speed gathering and storage of data using energy efficient architectures.

These trends are just the beginning of a vast connectivity revolution that will help people and businesses across the world have better access to information and improve their productivity.

Tags: document security, security, technology trends

How Secure is the Print Environment in Your Office?

Posted by Tim Stanley on Wed, Apr 30, 2014 @ 11:24 AM

TDS securityThere was a time when office security consisted of watching the front door, locking up the valuables and monitoring employee behavior, but with advances in technology there comes a whole new series of threats.

Chances are you have a virus protection program running on your office network, but have you given any thought to copier and printer security? If not, you may be vulnerable to breaches in security that can result in personal identity theft, loss of confidential client information and corporate data that may open you up to litigation, and threaten your reputation as a business.

There are a number of devices within your office environment that may be an issue, particularly multi-function printers (MFP's), which store and share the information and images that pass through them on a daily basis. Areas of concern include:

  • Fax ports
  • Hard drives
  • Internet connections
  • Network connections
  • Scanners

How the information from these devices may be procured can vary, including:

User error. A worker may absentmindedly leave behind the hard copy of a document at the printer, and the information contained within used maliciously by another party.

Information illegally obtained from the MFP's hard drive. Hackers may access the MFP's hard drive and steal the information contained within.

What happens to your MFP at the end of your lease term? It's imperative that you ensure the hard drive is wiped clean at the end of your lease, as you don't know where, or in whose hands the machine will wind up in after it leaves your office environment.

How to Protect Yourself? 

These vulnerabilities in copier and multifunction printer security can be addressed and avoided through strict employee vigilance, and the use of one of two types of security systems:

  • Full Security. This type of system encompasses every element of your printing device, and may be included with the unit upon purchasing or leasing.
  • Single Sub System Component. Typically sold separately as an add-on to existing security features, this type of security will address individual components, such as: encryption for the hard drive, data wiping, or data overwriting.

When it comes to system security for MFPs and digital copiers the benchmark is Common Criteria Certification. This type of full system security certification can be obtained by the Original equipment Manufacturer; however it can be an expensive proposition, particularly if a company’s full equipment product line is certified. This of course would mean that all devices are carefully tested to meet the most exacting standards of security.

If you haven't already done so, addressing copier security within your office environment is a must, contributing to the safety of your personal and corporate data, and helping to protect your reputation in the business community.

Find out how much your business spends on print, click here for your free print assessment: 

Print Assessment

Tags: MFPs, xerox connectkey, software solutions, document security, security, TDSIT

How Xerox and McAfee are Protecting Your Internal Documents

Posted by Tim Stanley on Thu, Jun 13, 2013 @ 08:30 AM

How Xerox and McAfee are Protecting Your Internal Documents

For most businesses that are beginning to utilize Bring Your Own Device policies for their staff as well as integrate mobile or wireless printing machines into their office, security is a very big focal point that needs to be addressed. This is because security breaches and having your private data is very real threat that can happen if you don't properly use security features on all of these advanced devices and hardware. Thankfully, the Xerox line of ConnectKey business multifunction printers (MFPs) comes fully stocked with security features to make all of your data completely safe.

What kind of security measures can you expect with ConnectKey? Are they easy to implement and integrate into your own office? And will it really protect all of your information? All of these questions and more can be answered by simply reading on about the powerful security that comes pre-installed on all ConnectKey machines.

McAfee Protection
Did you know all ConnectKey multifunction printers come with McAfee software already installed and ready to go? That means you don't have to worry about trying to include firewalls and other protection as soon as you get your machine installed and powered on. However, McAfee has worked with Xerox to make specially made software that comes with a ConnectKey MFP, allowing for you to have complete control of what your machine can install, what kinds of jobs it can do, and so much more.

This means that McAfee will allow you to whitelist certain pre-approved apps and files, protect you from any outside threats, and help you lessen the need to manually update your MFP to better protect you from malware and other risks. Isn't that much better than having to worry about your files constantly? Speaking of, McAfee takes the guesswork out of monitoring all of your MFPs through their ePolicy and Xerox's own MPS toolset. Both of these allow you to automatically monitor the printer's performance and current vitals.

Cisco Integrated Protection
When you invest in a ConnectKey multifunction printer, you're also getting the guarantee of Cisco through their TrustSec Identity Services Engine (ISE), allowing you to monitor and track all endpoints coming through to your MFP. Any suspicious connections or activity can be immediately taken care of, allowing you to have a safer office environment that doesn't have to worry about a surprise malware attack or breach of information being stolen by a third party.

Other Security Measures
There's even more protection from malicious attacks than just the ones mentioned above. In fact, there are dozens of features that are entirely focused on keeping your MFP safe as well as your entire office. Here are some other security measures and credentials included with a ConnectKey printer:

  • Be able to override any hard disk functions that are both SSL encrypted as well as compliant with any Department of Defense policies and procedures.
  • There is both the ability to do access code and access card printing.
  • All ConnectKey machines have Common Criteria Certification, making all software verified by the federal government standards of security.
  • Be able to track user activity and safely scan all email (even Gmail and Yahoo for small businesses).
  • All ConnectKey MFPs are also compliant with HIPPA, Sarbanes Oxley and the HiTech Act.

Combined with the efforts of McAfee, Cisco, and Xerox's own security measures, ConnectKey brings another layer of heightened security that cannot be beat. The ConnectKey multifunction printer line-up focuses just as much on security as they do on efficiency and high quality work, every time. And all of this can be used by both small businesses and enterprise-level companies.

Click here for your free e-book on how to make your office more environmentally friendly: 

green printing

Tags: xerox connectkey, document security, Mcafee, data encryption, SSL encryption