July 2022

July 2022

Finding the right employees is one of the most challenging tasks for businesses. They need to find people who share the same values and work ethic as the company itself. We’re happy to announce that we’ve added someone to our team who meets the requirements that we were looking for. We think you’ll be impressed by their skills. Please help us welcome:

  • Kacey Kastroll, Inside Sales Administrator

We are very happy to see our team continue to grow each year, and we want to recognize the employees who have celebrated anniversaries this year while being with us. We appreciate all of our employees and all of the hard work and time spent with us.

  • Bill Weisser and Greg Pack: 9 Years 
  • Mike Fisher: 7 Years 
  • Mihir Jadhav: 3 Years
  • Andrew Arlick: 1 Year
  • Jessica Hornock: 1 Year
  • Rick Magill: 1 Year

Focusing on our goal this quarter, we continued to provide expert information to help your business grow and prosper. The monthly webinar topics ranged from technology, cybersecurity, business training, HR best practices, and more. We want to be able to provide businesses with as much knowledge as possible to be able to succeed. If you haven’t checked out our webinars, please head to our YouTube channel to watch them all. And don’t forget to subscribe to our channel! We are taking a summer break to enjoy the fantastic weather and travel. When the webinars come back, be on the lookout for them.

“Balancing the Scales of Cybersecurity & Insurance” Watch Now

“Why IT Compliance Strengthens & Protects Your BusinessWatch Now

“Cyber Myth-Busting” Watch Now

Don’t forget to Subscribe to our channel!

We had the excellent opportunity to participate in the 2nd Annual Helen’s Hero’s Golf Outing. It is a great cause, and we are proud to support it! 

If you are unfamiliar with what Helen’s Heros is, they are a non-profit that provides services and support to individuals who face any social determinants of health. For more information and to provide support, visit https://www.helensheroes.com/

PARTNERSHIPDepending on your company’s size and industry, your IT challenges will differ – which is why we offer our services on a Fully-Managed to Co-Managed scale. While some businesses may need us to become their entire IT department, others may require us to provide additional support to their existing staff. Contact us today to find out how we can unlock the full potential of your business!

CONTACT US

CAREERS Are you interested in joining our team and unlocking your full potential? Check out our current openings today if you are a career-minded individual with the right attitude, team focus, and desire to learn. 

APPLY TODAY

THE IMPORTANCE OF SYSTEM ADMINISTRATOR

THE IMPORTANCE OF SYSTEM ADMINISTRATOR

Friday, July 29th is National System Administrators Day and we would like to spotlight our System Administrators and their importance.

If you have ever spoken with our Help Desk Team, then you have first-hand experience with a System Administrator. They are to help determine solutions to technical issues you may be experiencing. But what does their day-to-day job really look like?

The roles of a System Administrator are board and extremely beneficial to have an organization run successfully. Their duties include, but are not limited to:

  • Managing Windows, Linux, or Mac systems
  • Upgrading, installing and configuring application software and computer hardware
  • Troubleshooting and providing technical support to employees
  • Creating and managing system permissions and user accounts
  • Performing regular security tests and security monitoring
  • Maintaining networks and network file systems

The main goal of a Sysadmins is to ensure that the uptime, performance, resources, and security of the computers they manage meet the user needs, and industry standards. 

ERROR: An Error Has Occured, Please Contact Your System Administrator

Be sure to show appreciation the next time you speak with a System Administrator! Not everyone can do their job successfully, and we here at PGH Networks greatly appreciate our service team and the hard work they put forth daily! Thank you!


NEED TECHNOLOGY SUPPORT?

At this point, you can tell that we greatly appreciate our support team and value their expertise. If your organization requires continued technical support, please contact us immediately!

CONTACT US

Efficiently Remove Malware From Your Website

Efficiently Remove Malware From Your Website

Malware is all too common.

About 5.6 billion instances of malware attacks occurred worldwide in 2020, according to Statista.

Hackers and others with bad intentions build this malicious code to disrupt websites and create a variety of security issues.

Hacked websites can cause all sorts of problems for your business. Just a few include:

  • Preventing you and your staff from easily accessing and updating your website.
  • Discouraging customers from interacting or making a purchase.
  • Infecting those customers with malware.
  • Theft of sensitive information, such as login credentials.
  • Company data being held for ransom.

It’s in your best interest to know how to remove a malware infection from your website. Keep reading to learn more about website malware removal.

How Do I Know if I Have Malware on my Website?

Malware can infect files, operating systems, and websites in a wide variety of ways.

Often, malware spreads through downloads of files with malware hidden inside, phishing emails, and clicking malicious links, the Federal Trade Commission explained.

There are some common symptoms of potential malware infection on a website to keep in mind:

  • Frequent slow performance and freezing or crashing.
  • Unfamiliar pop-up ads, links, and download prompts.
  • URL redirects that take users off of the intended page.
  • Notifications from search engines, like Google, that your site has been blacklisted due to malware.

Malware may be instantly visible or deeply hidden within your website’s code. A website without obvious warning signs is certainly a good thing, but it’s not complete confirmation that the site is safe.

Can You Get Hacked Just by Visiting a Website?

Yes. Visiting a website hosting malware can be enough to infect your computer. And, more importantly, potentially spread that infection to your website and all of its users.

Your computer could begin to immediately download a file containing malware, for example. The specifics depend on your security software, web browser, and other tools you use. 

An easy way to avoid this type of malware exposure is to simply be thoughtful about the websites you visit and the links you click. Installing antivirus software can also help prevent future instances of malware.

A computer user accesses the command terminal to check for potential malware.

How do I Get Rid of Malware on my Website?

Malicious software infecting your website is a serious problem. And it’s not surprising that you want to keep things safe for your company, staff, and customers.

How can you eliminate malware from your website?

Be Proactive

The best way to get rid of malware is to ensure a high degree of website security in the first place.

Website monitoring tools and malware scanners can keep you aware of potential threats. Security software can prevent the actions that lead to malware reaching your website. Regular data backups keep sensitive information secure and allow you to restore your website to a recent version, minus any malware.

Working with a network security provider like PGH Networks can strengthen your anti-malware strategy, too. A trustworthy provider can implement a strategic and layered approach to network security that maximizes protection.

Manual Website Malware Removal

If you have the technical know-how, you can review your core website files by inputting the appropriate commands in your terminal. This allows you to see if those files, which are rarely if ever changed, have recently been modified.

This task may not be within your area of expertise, however. And, of course, you want to resolve a malware attack as soon as possible. Keeping downtime to a minimum is crucial. So is ensuring a safe and consistent experience for all stakeholders.

That’s another reason to find a trustworthy and effective network security partner.

Find Dependable Support from a Service Provider

PGH Networks offers a full suite of expert IT services and support, from cloud computing and managed services to business continuity and network security.

We have the knowledge and experience to build a comprehensive security strategy for your company. That includes website malware removal, protecting sensitive data, and much more.

Keep your business safe with an active security strategy implemented and overseen by reliable and accomplished professionals.
Get in touch with us today to enhance your organizations security stance!

Best Practices for Data Security in Cloud Computing

Best Practices for Data Security in Cloud Computing

Cloud computing is more popular than ever with no signs of slowing down. According to the Flexera 2022 State of the Cloud Report, 60% of businesses moved their workflow to the cloud in 2020. While we can credit this transition to the pandemic, pushing business operations to a more flexible and accessible platform has made it easier to keep up with rising remote expectations.

Cloud computing doesn’t only offer convenience. It provides unlimited storage capacity, reduces technical costs, encourages collaboration and scalability and automatically updates systems and restores data. The cloud environment has proven to be highly beneficial, but many are still on the fence about putting sensitive information in the public cloud due to security threats and potential data breaches.

Data loss and security issues in cloud computing are common deterrents from making the transition, but there are security components in place to safeguard sensitive data and reduce instances of account hijacking.

How secure is cloud based computing? With proper planning and execution, you can face common cloud computing security issues and challenges. Here are five best practices for cloud computing data security:

1. Keep Hardware Safeguarded

For starters, we recommend installing a next-generation antivirus solution, which can:

  • Protect your computers from malicious code
  • Ensure automatic updates can fix bugs
  • Keep data backed up regularly
  • Encrypt your device’s hard drive for security

2. Ensure Data Backup

Most cloud computing providers offer a solution that comes with automatic data backup, but it’s still important to make sure backups are in motion. Audit your system on a regular basis to ensure that all backups are scheduled and occurring on a regular basis. You may even consider backing up your data locally; keeping a few copies of your data in different locations can reduce your chances of losing it forever in the event of an incident. We recommend following the industry standard, the 3-2-1 Rule: Keep 3 copies of your data on 2 different media with 1 copy being off-site.

3. Encourage Strong Access Control with Password Policies and Multi-Factor Authentication

All data should be protected by a strong password to reduce chances of data breach and account hijacking. Regular password hygiene is essential to the safety of your systems.

We recommend updating your password every three months and choosing a strong and unique sequence that includes a variation of numbers, lowercase and uppercase letters, and special characters. Most vendors will help you create a strong password by offering suggestions for updates if you’re having trouble coming up with your own.

Businessman using laptop with interface of padlock and cloud computing technology

Handing out your password to all employees might sound like a good idea for workload handling purposes, but giving too many people access to your data center can be risky. Ensure protected data by limiting access control to a few employees. Putting password policies in place can make your workflow more organized and set expectations for best security practices.

It’s also important to adopt multi-factor authentication practices to reduce your risk of experiencing compromised passwords. A second step authenticator makes it much more difficult for breachers to access your sensitive information.

4. Create a Policy for Cloud Usage

Beyond limiting access to passwords, it’s important to have specific policies in place for employees who will be working with the sensitive data. Create a workplace framework that outlines how to access the cloud platform, how often they should frequent the cloud, and tips and tricks for preserving the integrity of the data. A robust policy for cloud computing can help you gain peace of mind and help your employees feel more confident as they navigate the cloud environment.

5. Work with a Trusted Provider

If you’re ready to gain access to your files from wherever you are, whenever you want, make sure you find a cloud services provider that you can trust. PGH Networks can take your business to the cloud and help you feel comfortable and confident about making the transition.

Whether you’re in need of an upgrade or you’re ready to say goodbye to physical hardware costs and repairs, we can help you move your data to the cloud and feel good about it.

Are you ready to explore your options? Connect with PGH Networks today to learn more about cloud computing opportunities.

Cybersecurity Myths And Misconceptions That Put You At Risk

Cybersecurity Myths And Misconceptions That Put You At Risk

If you aren’t taking active cybersecurity precautions, then it’s time to start! Unfortunately, cybersecurity myths and misconceptions are everywhere, and they may be making you feel more secure than you are.

We think it’s best to cut through the noise. Let’s take a look at some of the most common cybersecurity myths.

10 cybersecurity Myths and Misconceptions

My passwords are complex enough

If you are convinced that your passwords are safe enough, you may be putting yourself at risk. Unless you are using multi-factor security tools, your passwords are not safe enough!

USA Today explains, “Nowadays, there are speedy programs people use to run billions of password combinations – and it only takes a second to run these potential passwords. Not only that, but hackers have sophisticated methods for identifying passwords we use in password creation.”

Multi-factor security is a waste of time

Another cybersecurity misconception, related to the last one, is that multi-factor security solutions are unnecessary.  In fact, a recent lawsuit tried to make that argument in court.

Tech Republic concludes that “multi-factor authentication does provide more security for enterprise applications, as the additional factors are ideally harder to spoof than traditional passwords. Businesses shouldn’t give in to employee pressures to get rid of this additional security measure.”

The lawsuit was dismissed. Just like this myth should be.

Hackers don’t even know about my business

This common cybersecurity misconception is based on the (incorrect) idea that hackers are mysterious villains hiding in the shadows.

The truth is that cybersecurity attacks often come from within an organization.

Tech Report says, “Insider risks are on the rise. In addition, organizations are becoming increasingly concerned. Employees, vendors, contractors, and business partners, are all possible risk factors.

In addition, an external intruder posing as an employee is another example of an insider threat. Insider threats are responsible for 60% of data breaches, according to a recent report.”

Nobody attacks small businesses

Related to the previous misconception is one of the most pervasive business cybersecurity myths. Many people seem to believe that small businesses are immune to cyber threats or cyber attack. In fact, the opposite is true.

As we explain on our website, “Small Businesses are seen as low hanging fruit in today’s hacker landscape. And 60% of cybersecurity attacks target small businesses.”

My anti-virus software keeps me safe

It is absolutely true that using an anti-virus system is better than not using one. Tech Report explains, however, “Hackers have a variety of methods for getting around anti-virus software and infiltrating networks. They also use targeted phishing assaults and ransomware. Hackers will have plenty of room to conduct an attack even if anti-malware software is installed.”

USAToday gives a few pointers:

“Keep your operating system software and security software updated. Do the same for your other devices, including your phone and tablet.

Don’t forget about your router. Once hackers break into that, every device using it to connect to the internet is vulnerable.”

I have no information worth protecting

Many who share this popular cybersecurity myth and misconception feel this way because they have been the victim of data breaches.  Others are convinced that they haven’t put enough valuable information into their computers. While we understand these sentiments, they aren’t correct.

Your computers and devices contain much more information than you may realize. And there is data of value that you might not think of.

Your passwords are valuable, and many people share passwords between sites. Your email list, or social media contact list is valuable. Your medical records are valuable. Your personal information is valuable.

Data Breaches don’t happen in my industry

Just because you don’t hear about a cyber breach on the news doesn’t mean it doesn’t happen. The reality is that any business of any size in any industry is vulnerable to a cyber-attack or data breach.

Hackers can’t target personal devices

This cybersecurity myth has caused problems for businesses and governments alike. Hackers not only can target personal devices but when they do they are a real threat to entire operations.

Forbes says, “What businesses may not realize is that mobile security may be their weakest link. A cybercriminal only needs to break into one unprotected mobile device (mobile phone, laptop, or tablet) in a company to gain access to the entire network.”

When a hacker gains access to personal information on personal digital devices, sensitive information like phone numbers, names, financial statements and more are at risk.

My industry standards don’t require safety precautions, so we must be safe

This security myth may even fall into the category of “cybersecurity liability myths.” If you run a business of any kind, then any data breach can spell the end of your operation. Many companies carry cyber liability insurance to help protect them should that happen. No industry is safe.

Cybersecurity requires staffing we can’t afford

The truth behind this common cybersecurity myth is that you don’t need to hire a full IT department to run your cybersecurity system. You can hire a consultant or cybersecurity specialist to help keep you safe. PGH Networks can work alongside your existing IT team or become your full managed service provider for support so you always have assistance when you need it.

Stay Cautious About Cybersecurity. Let PGH Networks cover all the bases and nothing will get through to your business.