Category: Security

Upgrades and Security

We have a major addition to our computing infrastructure that provides increased speed and security.

We’ve added a cloud-hosting system to our service line!

This new system allows us to provide a FREE SSL certificate for the life of your JML cloud-hosted website, including a much faster web experience for your customers.

Also, our new system provides free backups in the event of disaster and scale-up abilities during increased traffic to your website.

You can signup at our SHOP page to get on-board with JML and reap all the benefits of increased speed and security, or go directly to https://www.jml.tech/product/website-cloud-hosting-1-year/ or https://www.jml.tech/product/website-cloud-hosting-1-month/.

When an Employee Goes Rogue

It’s the stuff of nightmares for an owner and manager of a tech-related business: an employee goes rogue, steals, and hobbles code. Tesla’s Elon Musk alleges that an employee as his facility did such things and is trying to mitigate damages.

Rogue employees often give a hard lesson in trust.

The publication Tech Republic points to a few ways to ensure this doesn’t happen at your business. One is to setup permissions on servers and computers that make sense for the employee’s tasks, and to go no further with escalated permissions unless there’s a promotion. Another approach is to conduct audits every so often to look for signs of sabotage and stolen data.

There will always be a “rogue” employee in a large organization. It’s human nature. To keep the risks low ensure IT permissions match the employee’s job, conduct audits, and the risk of data loss and sabotage are kept to a minimum.

Reduce Your Chances of Getting Hacked

The allegedly hijacked feed of C-Span and other odd media glitches have brought cybersecurity to the front burner again–although for some of us it never actually left. Although C-Span folks deny it, no one is kidding themselves about whodunit. The hijack may have been due to nefarious forces (read: Russia). And while we do not know specific details of the attack it doesn’t take long to imagine how it happened. Typical suspects include unpatched servers, routers, PC’s, or even bad password management. That’s because security can be breached through exploits in older computer software and firmware.

Solutions

Reduce your chances of getting hacked by applying patches, running an updated anti-virus package with real-time protection–it should be on all Windows machines–and a hardware firewall that blocks ports. Those are some of the essential methods for cybersecurity.  Modern offices have lots of network-connected computing resources that drive functionality and enable productivity. Don’t risk disruption and data loss. It is important to have a well thought-out patch and update strategy for its devices and computers.

The latest patches and updates should be completed weekly for the following:

  • Windows and Mac computers and servers (yes, including Linux)
  • Firmware in routers, switches, cameras
  • Content Management System (CMS) Websites & its plug-ins/themes
  • Android and IOS phones

Once this is done you have patched weak spots in your organization and made it much more difficult for hackers to penetrate your network.