<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Solutions Archives - Aditi Group Managed IT &amp; Consulting</title>
	<atom:link href="https://aditigroup.com/category/it-solutions/feed/" rel="self" type="application/rss+xml" />
	<link>https://aditigroup.com/category/it-solutions/</link>
	<description>IT Privacy • Protection • Productivity</description>
	<lastBuildDate>Tue, 10 Dec 2024 22:50:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://aditigroup.com/data-privacy/wp-content/uploads/cropped-aditi-group-icon-512-t-32x32.png</url>
	<title>IT Solutions Archives - Aditi Group Managed IT &amp; Consulting</title>
	<link>https://aditigroup.com/category/it-solutions/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Stop Insider Theft &#038; USB Drive-By with Zero Trust</title>
		<link>https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Mon, 18 Nov 2024 21:02:18 +0000</pubDate>
				<category><![CDATA[Aditi Zero Trust]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[data storage control]]></category>
		<category><![CDATA[flashdrive]]></category>
		<category><![CDATA[thumb drive]]></category>
		<category><![CDATA[USB drive]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1483</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Remember Physical Data Security</h2>
<p>Just like fortified castle defenses, most electronic data security focuses on the internet.  Phishing emails, malicious websites, unsavory social media links, public Wifi connections, and weak passwords.  All are potentially exploited by data thieves.  But what about the old school theft?  What about in person physical theft of data?</p>
<p>&nbsp;</p>
<h3>Stealth Storage in a Pocket</h3>
<p>Insider theft and passers-by can too quickly pop in a USB drive and terabytes of data quickly and unnoticed.  Storage size and data transfer speed are no longer limitations for would be thieves.  Today&#8217;s reality is that even USB flash drives aka thumb drives can be found for less than $20 for 2TB of storage! </p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>USB flash drives</li>
<li>Portable 2.5&#8243; Solid State drives</li>
<li>Portable 2.5&#8243; hard disk drives</li>
<li>USB adapters for M2 SSD sticks</li>
<li>USB A, B, C</li>
<li>USB 3.0</li>
<li>mobile phones</li>
</ul>
</li>
</ul></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;"><span style="color: #333333;"><em>Gone In 60 Seconds?</em></span></h2></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap "><img fetchpriority="high" decoding="async" width="800" height="800" src="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg" alt="USB drive theft - gone in 60 seconds?" title="USB drive theft - gone in 60 seconds?" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1485" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>What About Our Ever Present Phones?</h3>
<p>And perhaps most stealth of all&#8230;the our ever present mobile phones!   Who would notice a cell phone connected to a computer?   Likely just a battery recharge right?   Maybe it&#8217;s more.   An iPhone can have to 1TB of storage and many Android phones have large storage AND the ability to add microSD cards for even more.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="717" src="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg" alt="transfer data between cell phones and computers" title="transfer data between cell phones and computers" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800-480x430.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1492" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;">USB Adapter for M.2 Internal SSD</h3>
<p style="text-align: center;"><strong>As high as 4TB of space, blazing fast, and small as a stick of gum!</strong></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_2">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="600" src="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg" alt="USB M.2 SSD adapter" title="m2 SSD usb adapter" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter-480x360.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1491" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What&#8217;s the Risk?  What&#8217;s At Stake?</h2>
<p>Everything valuable to you and your business.</p>
<p>HIPAA breach of protected health information (PHI).   Company proprietary secrets.   Customer private financial information, including social security numbers and other items covered by GLBA and consumer privacy laws.   Book of business &#8211; the clientele that you&#8217;ve worked so hard to build up over the years.  Embarasing photos or insinuating documents.</p>
<p>Breach of privacy laws can mean massive financial penalties by authorities, lawsuits, and potentially even jail time. And your reputation can flip from trusted authority to careless, untrustworthy people to avoid.  </p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Stealth and Easy Use Enables Theft</h3>
<p>USB storage devices &#8211; portable drives and mobile phones, enable in-person, local theft of data if they are allowed.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h4>Theft happens in one of three ways:</h4>
<ol>
<li style="list-style-type: none;">
<ol>
<li>The door is left OPEN &#8211; the invitation to take unprotected things</li>
<li>An OUTSIDER breaks in &#8211; hacking and social engineering</li>
<li>Someone INSIDE is the thief &#8211; you&#8217;re given access as a team member</li>
</ol>
</li>
</ol>
<h2>Zero Trust Solution: Block USB</h2>
<p>The heavy handed IT admin&#8217;s solution is to simply block all USB ports.   No more connecting thumb drives, phones, or portable SSDs and HDDs.   Blocking USB drive storage can close an overlooked door that few choose to secure.  This follows the assumption that files copied or saved to extneral USB connected drives are suspect and not to be trusted.  This closes a real and serious security hole.  But it also can create a roadblock to work flow by denying USB connected devices that you WANT.  So, really a more nuanced and complex strategy is what most people want.  And it is what keeps IT admins from implementing it: complexity.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><img loading="lazy" decoding="async" src="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-300x102.png" width="300" height="102" alt="Aditi Zero Trust Protection" class="wp-image-1475 alignleft size-medium" />Let Aditi Zero Trust Do the Work</h2>
<p>A much more practical path forward to secure your data, while allowing dyanmic workplaces and convenience is with Aditi Zero Trust.   Data storage controls can regulate storage options by specific computer, workgroup, user, or even software program.  Our set of tools allows us to deal with all of the complexity of enabling software functionality and workflow that you need while locking down and blocking everything else.   Aditi Zero Trust is supported 24/7 and we are able to react to any new requests for software changes within a few minutes. So, you get the best overall security while keeping business flowing smoothly. </p></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_0_wrapper et_pb_button_alignment_center et_pb_module  dbdb-icon-on-right dbdb-icon-on-hover">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://aditigroup.com/contact-us/">Contact Us Now to Learn More</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is Blockchain a Security Savior for Healthcare and Us All?</title>
		<link>https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Thu, 03 Nov 2022 19:49:44 +0000</pubDate>
				<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[hardware wallets]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[hipaa compliance]]></category>
		<category><![CDATA[performance problems]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=960</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/">Is Blockchain a Security Savior for Healthcare and Us All?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>The Goals of Blockchain: Trust and Security</h2>
<h2>What is Blockchain? Blockchain explained for non-coders</h2>
<p>Blockchain is a way of recording that sequentially links every revision of a a record, in a distributed / shared log (or ledger for finance folks).  Every transaction is recorded in an every growing record chain.</p>
<h4>Featues of Blockchain Records</h4>
<ul>
<li>decentralized digital record ledger</li>
<li>data records (blocks) are tied together in time sequence</li>
<li>any change to a record adds a new block</li>
<li>nothing can be deleted or changed without a record as evidence</li>
<li>&#8220;tamper proof&#8221;</li>
<li>can be used for any kind of data</li>
<li>distributed network &#8211; doesn&#8217;t reside on just one computer or desk</li>
</ul>
<h2></h2>
<h2>Security and Trust</h2>
<p><strong>Blockchain brings the promise of trusted data,</strong> and impossible&#8230;or very low probability of fakes. It can allow a person to own their own data and share it with the world as they choose. Panacea.</p>
<p>&nbsp;</p>
<h2>Code Is Opportunity</h2>
<p>But this is code and electronics. There is always some relative weakness.  Code is the realm of hacks.</p>
<p>Crypto hacks have shown that environments where blockchain are used are not unlike other things in the cyber world.  Regardless of how trusted or secure a blockchain inidivudal record is, the the application or system it&#8217;s used in is vulnerable to the same old cybersecurity problems that befall everyone else.</p>
<p>Two main ways: stolen keys (the passwords), and exploiting bugs in code. Here are some expensive examples:</p>
<blockquote class="wp-embedded-content" data-secret="mHUgZF8POq"><p><a href="https://blockworks.co/the-nine-largest-crypto-hacks-in-2022/">The Nine Largest Crypto Hacks in 2022</a></p></blockquote>
<p><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;The Nine Largest Crypto Hacks in 2022&#8221; &#8212; Blockworks" src="https://blockworks.co/the-nine-largest-crypto-hacks-in-2022/embed/#?secret=pTgeASvjIu#?secret=mHUgZF8POq" data-secret="mHUgZF8POq" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<blockquote class="wp-embedded-content" data-secret="39q8TequQs"><p><a href="https://techmonitor.ai/technology/cybersecurity/biggest-cryptocurrency-hacks-of-all-time">The biggest cryptocurrency hacks of all time</a></p></blockquote>
<p><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;The biggest cryptocurrency hacks of all time&#8221; &#8212; Tech Monitor" src="https://techmonitor.ai/technology/cybersecurity/biggest-cryptocurrency-hacks-of-all-time/embed#?secret=uNaKY72lLM#?secret=39q8TequQs" data-secret="39q8TequQs" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2>Where is Blockchain Used?  Is it Here Yet? </h2>
<p>Blockchain is being introduced in the background with the <strong>big insurers, banks, pharma, governments</strong>, etc. For most of us, we won&#8217;t see it or it won&#8217;t affect us for a while (some years).  Blockchain is really only encoutered by most people who invest in or read about crypto currencies.  What blockchain offers crypto is the distributed, trusted accounting that is needed when there is no central bank.  It&#8217;s the perfect and obvious applicaiton for this new way of tracking transactions. </p>
<h3>Healthcare Blockchain &amp; How It&#8217;s Used</h3>
<p>Blockchain methodology and application are still in the infancy stages for the healthcare industry as a whole. There is an ever increasing number of companies applying blockchain in different ways.</p>
<p><strong>Some create trusted data share groups.</strong>  These allow us patients &#8211; us individuals to own and control our personal medical history records.  We can choose who we allow to view and add to our records.  And they can&#8217;t be tampered with.  That&#8217;s real power in the hands of the people.  </p>
<p>Some healthcare blockchain companies and projects focus on the <strong>validation of drug history, DNA info, etc</strong>. This is similar to <em><strong>traceability</strong></em> that supply chains are generally concerned with.  Knowing the history or the full life path of who touched an item from raw material and out and into the marketplace, is important for controlling quality, safety, and accountability for problems.</p>
<p>Other blockchain tech companies just create <strong>data network protocols</strong> (the code stuff) <strong>or hardware</strong> (like crypto currency wallets).  These support products and services advance the practicality and usefulness of blockchain in healthcare.</p>
<p>&nbsp;</p>
<h2>Why Aren&#8217;t We All Using Blockchain?</h2>
<p><strong>What&#8217;s the Holdup? We need trusted, secure solutions today!<br /></strong></p>
<h3><strong>The Performance Problem</strong></h3>
<p>Blockchains also suffer from a capacity problem. That’s the reason one crypto currency has not really won out yet. Each transaction must be written somewhere. Therefore, the greatest strides have been done through supply chain. Once the object has been delivered, it can be archived or erased. Food is the one application that holds the greatest promise. A head of lettuce grown in a field can be tracked until sold. If a contamination is discovered, tracking to the field, within a farm, can be pulled out of the blockchain in an instant.</p>
<p><em><strong>Cons for using blockchain are processing speed and resources needed</strong></em>. It can consume a lot of computing power to solve the complex cryptographic equations for validating a record to be added to a chain. For crypto currencies, this is one way you get paid &#8211; by &#8220;mining&#8221; or by computing a new record. It takes time, so fewer transactions per second and computing power and electrical power. Both cost money&#8230;real money. : )</p>
<p>&nbsp;</p>
<p>Healthcare faces the same limits as currency. People live a long time. Each prescription, procedure, etc. must be kept for the life of the individual. The cloud is not limitless. Everything has a capacity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/">Is Blockchain a Security Savior for Healthcare and Us All?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</title>
		<link>https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Fri, 20 May 2022 21:28:53 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Aditi Group]]></category>
		<category><![CDATA[Advanced Benefit Consulting]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[interview]]></category>
		<category><![CDATA[published articles]]></category>
		<category><![CDATA[The STATEment]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=887</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><strong>Aditi co-founders Ted Mayeshiba and Ted Flittner</strong> are interviewed in this lengthy article written by Dorothy Cociu, President of Advanced Benefit Consulting.  We invite you to learn more about current computer and  phone electronic data security threats and how to avoid some of them.</p>
<h3>Highlight Topics Include</h3>
<ul>
<li>Are banking apps safe?</li>
<li>Microsoft Breach by Lapsus$ Hacker Group, March 2022</li>
<li>The risks of using QR codes</li>
<li>Crypto currency</li>
<li>The need for risk assessments – an ongoing security tool</li>
</ul>
<h3>Read the article at Advanced Benefit Consulting</h3>
<p><a href="https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/</a></p>
<p><a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank" rel="noopener"></a></p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;">Read the article in the <a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank" rel="noopener">California Broker magazine, June 2022 issue</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_3">
				
				
				
				
				<a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="781" src="https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2.jpg" alt="Cal Broker magazine quotes Aditi Group on cybersecurity" title="caifornia-broker-june-2022-cyber-security-2" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2.jpg 600w, https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2-480x625.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-904" /></span></a>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;">Read the article in the <a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank" rel="noopener">STATEment May / June 2022 issue</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_4">
				
				
				
				
				<a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="400" height="517" src="https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg" alt="" title="" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg 400w, https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400-232x300.jpg 232w" sizes="(max-width: 400px) 100vw, 400px" class="wp-image-891" /></span></a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Separate the Kingdom with a VLAN</title>
		<link>https://aditigroup.com/separate-the-kingdom-with-a-vlan/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Tue, 21 Apr 2020 23:07:14 +0000</pubDate>
				<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=420</guid>

					<description><![CDATA[<p>You&#8217;re working at home. Only YOU should be able to access the company data. It also crops up in offices with different divisions or departments. Not just anyone and everyone should be able to view, copy, edit or worse, DELETE, the files that don&#8217;t pertain to them. You&#8217;ve Gotta Keep &#8216;Em Separated We all do [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/separate-the-kingdom-with-a-vlan/">Separate the Kingdom with a VLAN</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>You&#8217;re working at home.  Only YOU should be able to access the company data.   It also crops up in offices with different divisions or departments.  Not just anyone and everyone should be able to view, copy, edit or worse, DELETE, the files that don&#8217;t pertain to them.</p>



<p></p>



<h2 class="wp-block-heading">You&#8217;ve Gotta Keep &#8216;Em Separated</h2>



<p>We all do it.  We are told we should do it.  Keep &#8217;em separated.  Don&#8217;t put all of your eggs in one basket.  Keep the hot side hot and cold side cold.  We do it in school.  We divide groups so that they don&#8217;t mix with each other, when it&#8217;s really important to keep things pure.</p>



<p>A fundamental tenet of security is to keep minimize access to just those who need it.  Health and Human Services tells health providers through HIPAA requirements to give people, including staff, access to the &#8220;minimum necessary&#8221;.  </p>



<p></p>



<h2 class="wp-block-heading">Why It Matters &#8211; Real Life Implications</h2>



<p>Dividing computers or workers from each other into groups is a way to minimize the risk that the wrong people view data they shouldn&#8217;t.  It also keeps people from altering data they shouldn&#8217;t.  And it one of the strongest ways of keeping hackers from getting access to the whole kingdom once they get through one tiny crack in the wall. </p>



<p>Reflecting back on some of the largest data breaches on record, we see a common pattern.  Hackers get access to one computer.  Then they move out and over to other computers and shared devices &#8211; file folders, data bases, etc.   Target&#8217;s breach of 70 million credit card users that took place on Black Friday is a poignant example of hackers getting to one computer and moving up, over, and into other data systems.  Ultimately from one computer at a subcontract air conditioning service company into the Target financial systems.  </p>



<p></p>



<h2 class="wp-block-heading">Separate Physical Networks</h2>



<h3 class="wp-block-heading">Physical Local Area Network (LAN)</h3>



<p>Easy enough to imagine a large office building with different networks that employees log into.   Sure.  Big offices often have numerous file servers.  And the most basic method for keeping things split art is to hard wire the network cables that connect each computer to a specific server.   Physical separation makes sense and is easy to understand.  But it&#8217;s not always the most practical.</p>



<p></p>



<h2 class="wp-block-heading">Virtual Networks</h2>



<h3 class="wp-block-heading">Virtual Local Area Network (VLAN)</h3>



<h4 class="wp-block-heading"><em>What Does V<strong>irtual Network</strong> Mean?   </em></h4>



<p>Virtual networks share the same physical network connections &#8211; same wires, same routers and switches.   But they are kept separate through software.   Sophisticated server software, now routine for big businesses, allow networks to be created virtually.  Once done, users on one VLAN have no ability to connect with users on another VLAN.  They&#8217;re kept apart even though they use the same hardware.</p>



<p></p>



<h3 class="wp-block-heading">Isn&#8217;t That the Same As My Home Guest Network?</h3>



<p>No.  Yes.  Maybe.  Sort of.  It depends on details of the router and how the networks are set up on the router.  Most &#8220;Guest&#8221; networks are not functioning as separate VLANs.  In most cases, guest network users have the same resource access as primary network users.  And everyone is on the same domain and ultimately, hackers can move from Guest to the Ring doorbell, Alexa or your computer with the family financial portfolio on it.  </p>



<p class="has-text-align-center"><em><strong>A guest network puts into place an ACL (access control list) that prohibits users from that SSID from accessing any network that is private. </strong></em><br><em><strong>10.x.x.x/8, 192.168.x.x/16, or 172.16.x.x/12</strong></em></p>



<h4 class="wp-block-heading">2.4GHz, 5GHz, and Guest WiFi Networks</h4>



<p>Your 2.4 GHz and 5 GHz primary and &#8220;guest&#8221; network settings on that router from AT&amp;T, Cox, Spectrum or Comcast all tie to the same &#8220;Home&#8221; network.   Depending on the router make and model, your Guest WifFi network could be set by default (factory settings) to only allow internet traffic, and not to allow it to share other Home network resources.  So, for the casual user, it means they can&#8217;t see your IP camera or your printer.  But advanced users and hackers can scan other addresses on the network and get access.   </p>



<p></p>



<h2 class="wp-block-heading">Separation with VLAN and Managed Switches</h2>



<p>A <strong>Managed Switch</strong> is the piece of hardware that allows us to create virtual or logical separate groups.  A managed switch is not the same as a Router.  A <strong>Router</strong> is a <strong><em>Layer 3 network device</em></strong> and it connects the outside world  &#8211; the internet &#8211; with the devices inside.  </p>



<p></p>



<h2 class="wp-block-heading">Get Your VLAN at Home</h2>



<p>VLANs can be developed with more advanced network components than the typical home parts.  Combine a Managed Switch with a wireless access point (AP) and you&#8217;ve got the hardware for creating a true VLAN.  You don&#8217;t need an expensive 48-port commercial grade managed switch, but  you do want a managed switch.  And APs like Ubiquity offers are more what you&#8217;re looking for instead of your typical WiFi-Router.  It does take more time to setup and learn, but the results are real network security and real separation of resources.</p>



<p></p>



<h2 class="wp-block-heading">Separate Kids, Parents Personal, and Business</h2>



<p>The real security pay-off is in creating separate areas where kids can user the internet with their bad judgement and ask-questions-later enthusiasm for web surfing.   You can create KIDS, PARENTS, and WORK networks and truly keep them separated.</p>



<p></p>



<h2 class="wp-block-heading">Professional Guidance</h2>



<p>Aditi Group can provide the hardware and installation and setup of home and small business networks including VLANs, VPNs, Firewalls, and more.  Call us if you need help keeping your business secure for your Work At Home office.</p>



<p></p>
<p>The post <a href="https://aditigroup.com/separate-the-kingdom-with-a-vlan/">Separate the Kingdom with a VLAN</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
