Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

NexGen Endpoint Protection - Cylance Protect

Part of our responsibility as your Managed Services Provider is to make sure that your data is protected from threats that are getting more numerous and aggressive.  We address changes and enhancements in technology as they are appropriate to you.  We test them as to their effectiveness.  Any technology that we bring to you, we already use, in house, at Haber Group.

Today we want to discuss: “How does bad software get into your company?”  Unfortunately, the answer, while simple is difficult or impossible to prevent.  It’s people!  You and your staff.  They click on things that they shouldn’t.

The paths into your company are emails with links or links from bad websites.  It’s rare that you are attacked via your managed firewall and even rarer that anything gets through.  Even though you and your staff are not administrators of your local PC, you can still run programs and certain programs will cause havoc.

 To prevent this, we want you to utilize three different methods to prevent access to these bad links:

  • Mimecast Threat Protection to filter bad links in emails
  • Firewall Gateway Threat Protection to filter out malicious links from the web
  • A NextGen Antivirus product

 Current AV software will catch and prevent many types of Malware, but they are not up to the task of dealing with Zero-Day Threats.  They currently depend upon downloading virus signatures to look for bad-behavior.  This can also make them a heavy load on your computer.

Haber Group has been researching and testing NextGen antivirus.  We have selected the only product that we have found that protects against zero-day threats and Ransomware.  It’s called Cylance and it’s amazing.  You can read about it Here.  It’s a bundle of a few Cylance products.

It is not an inexpensive piece of software but we feel that it’s so important we are making it available to our Managed Clients at close to our cost.  We are not charging for installation or configuration.  It’s so important that we are making this a required addition for our managed clients.

We are scheduling two Webinars:  2:00pm - Wednesday, September 14, 2017 and 4:00pm - Thursday, September 21, 2017.  Hopefully you will be able to make one. try to be on one of them.  After these we will begin scheduling the deployment.  If you are interested in getting started sooner, let me know.

Please Click Signup Link.

The deployment involves two phases:  Installation on all Laptops. Workstations and servers. Running in monitoring mode for a week.  Then going live on the product

We take your protection seriously and we know that you do to.  Please feel free to share your thoughts with me or to contact me for further clarification.



Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Hackers Privacy Technology Email Malware Business Hosted Solutions Microsoft Computer Business Computing Internet Windows 10 Backup IT Services Software Ransomware User Tips Productivity Network Security Windows Hardware Smartphone Google Small Business Data Management Android Data Browser Phishing App Facebook Upgrade Smartphones Saving Money Mobile Devices Gmail Business Continuity Internet of Things Microsoft Office Big Data Tip of the week Word Managed IT Services Remote Monitoring Cloud Computing Office 365 Efficiency Workplace Tips Office Tips IT Support WiFi Disaster Recovery Managed Service Provider Spam Miscellaneous Social Media Apple Settings IT Support Content Filtering Customer Service Productivity Robot Risk Management Server Innovation Cybersecurity Data Recovery Outsourced IT Employer-Employee Relationship Data storage Artificial Intelligence Safety Money Search The Internet of Things Windows 10 Administration VoIP Tablet Password Mouse IBM Encryption Wireless Network Apps Customer Relationship Management End of Support Hacking Firewall Virtual Private Network Hosted Solution YouTube Passwords Managed IT Services communications Save Money Presentation Hacker Avoiding Downtime IT Management Printing Telephone Systems Two-factor Authentication Office Maintenance Wireless Technology Recovery SaaS Computing Google Drive Unified Threat Management Monitors Antivirus LiFi Chrome Analytics Mobile Device Outlook Sports Downloads Touchscreen Social Shortcut Disaster Education Writing Fun Undo Training Superfish Humor Automobile Spyware Deep Learning Application Multi-Factor Security Gadgets Hacks Patch Management Budget Uninterrupted Power Supply Retail Virtualization Scam sip Bring Your Own Device Buisness Google Calendar Users Vulnerability Solid State Drive IT solutions Social Engineering Networking telephony How To Best Practice IT service Legislation Heating/Cooling VPN Politics Hard Disk Drive Cortana User Data Security Storage Collaboration Firefox Business Growth BDR Downtime Wi-Fi Comparison Servers Current Events Legal How To Competition Techology Dark Data File Sharing Alt Codes Cybercrime Going Green Samsung Google Maps Network Congestion 5G Specifications Server Management Mail Merge Websites Knowledge Unified Threat Management Typing Virtual Reality Computers Black Friday Marketing Statistics Address Operating System Unified Communications Experience Running Cable IP Address User Error Quick Tips Cryptocurrency Virtual Desktop Display Cyber Monday Bluetooth Data Backup Corporate Profile Website Laptop Mobile Office Printer VoIP Bitcoin Information Technology Government Hard Drives Digital Payment Google Docs WannaCry Halloween Mobile Device Management Access Control Time Management Windows 8 Google Wallet BYOD Cabling Automation Refrigeration Business Technology Data loss Public Speaking Scary Stories Lithium-ion battery SharePoint Network Management Managed IT Drones Infrastructure Bandwidth Communication Augmented Reality Computer Care Lenovo Digital Vendor Management Point of Sale Black Market Law Enforcement Physical Security Paperless Office Twitter Gadget Staffing Administrator CrashOverride Personal Information Web Server Remote Computing Holiday GPS Business Management Computer Repair Cameras Mobile Computing Processors Tracking Health Alert CCTV Document Management Tech Support Electronic Medical Records Identity Theft Travel Notifications G Suite Supercomputer Botnet Upgrades Motion Sickness Crowdsourcing Taxes IT Budget Machine Learning 3D Printing Update IT Consultant Emergency Relocation Unsupported Software Domains Meetings Chromebook Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error