Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

NexGen Endpoint Protection - Cylance Protect

Part of our responsibility as your Managed Services Provider is to make sure that your data is protected from threats that are getting more numerous and aggressive.  We address changes and enhancements in technology as they are appropriate to you.  We test them as to their effectiveness.  Any technology that we bring to you, we already use, in house, at Haber Group.

Today we want to discuss: “How does bad software get into your company?”  Unfortunately, the answer, while simple is difficult or impossible to prevent.  It’s people!  You and your staff.  They click on things that they shouldn’t.

The paths into your company are emails with links or links from bad websites.  It’s rare that you are attacked via your managed firewall and even rarer that anything gets through.  Even though you and your staff are not administrators of your local PC, you can still run programs and certain programs will cause havoc.

 To prevent this, we want you to utilize three different methods to prevent access to these bad links:

  • Mimecast Threat Protection to filter bad links in emails
  • Firewall Gateway Threat Protection to filter out malicious links from the web
  • A NextGen Antivirus product

 Current AV software will catch and prevent many types of Malware, but they are not up to the task of dealing with Zero-Day Threats.  They currently depend upon downloading virus signatures to look for bad-behavior.  This can also make them a heavy load on your computer.

Haber Group has been researching and testing NextGen antivirus.  We have selected the only product that we have found that protects against zero-day threats and Ransomware.  It’s called Cylance and it’s amazing.  You can read about it Here.  It’s a bundle of a few Cylance products.

It is not an inexpensive piece of software but we feel that it’s so important we are making it available to our Managed Clients at close to our cost.  We are not charging for installation or configuration.  It’s so important that we are making this a required addition for our managed clients.

We are scheduling two Webinars:  2:00pm - Wednesday, September 14, 2017 and 4:00pm - Thursday, September 21, 2017.  Hopefully you will be able to make one. try to be on one of them.  After these we will begin scheduling the deployment.  If you are interested in getting started sooner, let me know.

Please Click Signup Link.

The deployment involves two phases:  Installation on all Laptops. Workstations and servers. Running in monitoring mode for a week.  Then going live on the product

We take your protection seriously and we know that you do to.  Please feel free to share your thoughts with me or to contact me for further clarification.

 

Charlie…

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Cloud Best Practices Privacy Email Hackers Technology Malware Business Hosted Solutions Internet Windows 10 Computer Microsoft Backup Business Computing Software Google Productivity IT Services Hardware Windows Ransomware Smartphone Data Business Continuity User Tips Data Management Facebook App Upgrade Saving Money Mobile Devices Network Security Gmail Phishing Word Internet of Things Cloud Computing Smartphones Workplace Tips Android Small Business Efficiency Microsoft Office Big Data Office Tips IT Support Managed IT Services Customer Service Disaster Recovery Managed Service Provider Remote Monitoring Office 365 Server Apple Settings Content Filtering Data Recovery Robot WiFi Innovation Browser Spam Miscellaneous Data storage Social Media Apps Artificial Intelligence Customer Relationship Management Outlook Hacking Search Firewall Money End of Support Passwords IT Support Presentation Administration Hacker VoIP Avoiding Downtime Productivity Password Save Money Managed IT Services Office Wireless Technology IT Management Telephone Systems Recovery Encryption SaaS Network Unified Threat Management Hosted Solution Monitors Cybersecurity YouTube Employer-Employee Relationship communications Outsourced IT Printing Risk Management Safety Mobile Device The Internet of Things Google Drive LiFi Windows 10 Chrome Analytics Tip of the week IBM Wireless Drones Bandwidth How To Heating/Cooling IT service User Politics Social VPN Wi-Fi Sports Hard Disk Drive Competition Collaboration Education Firefox Deep Learning Servers BDR Humor Hacks Virtual Private Network How To 5G File Sharing Budget Samsung Bring Your Own Device Server Management Network Congestion Google Maps sip Marketing Websites Mail Merge Two-factor Authentication Buisness Mouse Virtual Reality IT solutions Best Practice Statistics Computers IP Address telephony Address Maintenance Website Cortana Quick Tips Business Growth Bluetooth Display Mobile Office Storage Current Events Data Backup Downtime Corporate Profile Hard Drives Legal VoIP Alt Codes Antivirus Mobile Device Management Cybercrime Dark Data Digital Payment Going Green WannaCry Refrigeration Public Speaking Knowledge Time Management Typing Automation Lithium-ion battery Cabling Business Technology Augmented Reality Data loss Experience Operating System Unified Communications Network Management Cryptocurrency Managed IT Communication Running Cable Infrastructure Computer Care Computing Lenovo Vendor Management Fun Virtual Desktop Digital Undo Touchscreen Bitcoin Shortcut Writing Laptop Disaster Application Gadgets Training Automobile Information Technology Superfish Spyware Virtualization Google Docs Windows 8 Patch Management Retail Halloween Uninterrupted Power Supply Users Google Wallet Tablet Vulnerability Social Engineering Scary Stories Solid State Drive Business Management Computer Repair Cameras Processors Tracking Health Alert CCTV Document Management Tech Support Electronic Medical Records Identity Theft Travel Notifications G Suite Supercomputer Botnet Mobile Computing Upgrades Motion Sickness Crowdsourcing Taxes IT Budget Machine Learning 3D Printing Domains Update Government IT Consultant Relocation Emergency Unsupported Software Meetings Chromebook BYOD Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Point of Sale Black Market Law Enforcement Physical Security Paperless Office Twitter Gadget Staffing Administrator Personal Information CrashOverride Web Server Remote Computing Holiday GPS