Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

NexGen Endpoint Protection - Cylance Protect

Part of our responsibility as your Managed Services Provider is to make sure that your data is protected from threats that are getting more numerous and aggressive.  We address changes and enhancements in technology as they are appropriate to you.  We test them as to their effectiveness.  Any technology that we bring to you, we already use, in house, at Haber Group.

Today we want to discuss: “How does bad software get into your company?”  Unfortunately, the answer, while simple is difficult or impossible to prevent.  It’s people!  You and your staff.  They click on things that they shouldn’t.

The paths into your company are emails with links or links from bad websites.  It’s rare that you are attacked via your managed firewall and even rarer that anything gets through.  Even though you and your staff are not administrators of your local PC, you can still run programs and certain programs will cause havoc.

 To prevent this, we want you to utilize three different methods to prevent access to these bad links:

  • Mimecast Threat Protection to filter bad links in emails
  • Firewall Gateway Threat Protection to filter out malicious links from the web
  • A NextGen Antivirus product

 Current AV software will catch and prevent many types of Malware, but they are not up to the task of dealing with Zero-Day Threats.  They currently depend upon downloading virus signatures to look for bad-behavior.  This can also make them a heavy load on your computer.

Haber Group has been researching and testing NextGen antivirus.  We have selected the only product that we have found that protects against zero-day threats and Ransomware.  It’s called Cylance and it’s amazing.  You can read about it Here.  It’s a bundle of a few Cylance products.

It is not an inexpensive piece of software but we feel that it’s so important we are making it available to our Managed Clients at close to our cost.  We are not charging for installation or configuration.  It’s so important that we are making this a required addition for our managed clients.

We are scheduling two Webinars:  2:00pm - Wednesday, September 14, 2017 and 4:00pm - Thursday, September 21, 2017.  Hopefully you will be able to make one. try to be on one of them.  After these we will begin scheduling the deployment.  If you are interested in getting started sooner, let me know.

Please Click Signup Link.

The deployment involves two phases:  Installation on all Laptops. Workstations and servers. Running in monitoring mode for a week.  Then going live on the product

We take your protection seriously and we know that you do to.  Please feel free to share your thoughts with me or to contact me for further clarification.



Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Hackers Privacy Malware Email Business Internet Hosted Solutions Business Computing Microsoft Computer Software Windows 10 Ransomware IT Services Backup Android Google Network Security Smartphone Small Business User Tips Productivity Hardware Mobile Devices Windows Browser Data Management Gmail Data Business Continuity Phishing Internet of Things App Encryption Facebook Office 365 Upgrade Saving Money Smartphones Efficiency Microsoft Office Big Data Cloud Computing IT Support Artificial Intelligence Word Data Recovery Managed Service Provider Outsourced IT Tip of the week Workplace Tips Managed IT Services Remote Monitoring Innovation Office Tips Chrome Data storage Spam Miscellaneous Antivirus Cybersecurity Money Social Media Government Disaster Recovery Firewall Customer Service Apple Two-factor Authentication Windows 10 Settings Server Content Filtering Robot Risk Management Business Management Employer-Employee Relationship IT Support WiFi Productivity The Internet of Things Telephone Systems Save Money Virtual Reality Maintenance Analytics SaaS Bandwidth Data Backup Outlook IBM Wireless Search Unified Threat Management Monitors Apps Customer Relationship Management Wi-Fi Administration Hacking Business Technology HIPAA Automation VoIP Infrastructure Password Mouse Passwords Communication Presentation Hacker Avoiding Downtime Mobile Device Mobile Security Network Office Wireless Technology Recovery Hosted Solution Scam Tablet YouTube Vulnerability communications Holiday Printing Data Security Computing Virtual Private Network Google Drive Augmented Reality End of Support Safety Managed IT Services IT Management LiFi Halloween Black Friday Statistics Websites Windows 8 Google Wallet Microsoft Excel Application Address Cooperation Gadgets Quick Tips Computers Virtualization User Error Scary Stories Cyber Monday Bluetooth Drones Blockchain Staff Users Corporate Profile VoIP Display Printer Sports Smart Technology Social Education Permissions Wearable Technology WannaCry Time Management Humor Deep Learning Access Control Distributed Denial of Service User Digital Payment Cabling Hacks Budget Data loss SharePoint Network Management sip BYOD Bring Your Own Device Competition Buisness Managed IT Service Managed IT Fraud Digital 5G IT solutions Lenovo Applications Downloads Computer Care Touchscreen telephony Best Practice Break Fix Shortcut Disaster Vendor Management Spyware Cortana Superfish IT Technicians Marketing Multi-Factor Security Training Storage Business Growth Writing Current Events IP Address Downtime Dark Web Patch Management Hotspot Automobile Uninterrupted Power Supply Paperless Office Legal Website Cybercrime Google Calendar Dark Data Alt Codes Retail Going Green Mobile Office Net Neutrality Language Solid State Drive How To Hard Drives Knowledge Networking Legislation Heating/Cooling IT service Typing Social Engineering Mobile Device Management FCC VPN Computing Infrastructure Hard Disk Drive Firefox Operating System Unified Communications Refrigeration Experience Public Speaking Running Cable Comparison Servers Politics BDR Cryptocurrency Lithium-ion battery Virtual Desktop Title II Alerts Collaboration Techology Laptop Specifications Document Management Server Management Tech Support Google Maps Bitcoin How To Information Technology Online Mail Merge Licensing File Sharing Google Docs Samsung Fun Network Congestion Undo Unified Threat Management Identity Theft Travel G Suite Notifications Supercomputer Botnet Upgrades Motion Sickness Taxes Crowdsourcing IT Budget Machine Learning 3D Printing Update Emergency IT Consultant Relocation Unsupported Software Chromebook Meetings Cleaning Private Cloud Mobile Data Emoji Webcam Work/Life Balance Error Mobile Computing Point of Sale Black Market Law Enforcement Physical Security CrashOverride Twitter Mirgation Staffing Gadget Personal Information Administrator Web Server Remote Computing Domains GPS Computer Repair Cameras Processors Tracking Health CCTV Alert Electronic Medical Records