<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Learning Archives - Aditi Group Managed IT &amp; Consulting</title>
	<atom:link href="https://aditigroup.com/category/security-learning/feed/" rel="self" type="application/rss+xml" />
	<link>https://aditigroup.com/category/security-learning/</link>
	<description>IT Privacy • Protection • Productivity</description>
	<lastBuildDate>Sat, 01 Feb 2025 03:23:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://aditigroup.com/data-privacy/wp-content/uploads/cropped-aditi-group-icon-512-t-32x32.png</url>
	<title>Security Learning Archives - Aditi Group Managed IT &amp; Consulting</title>
	<link>https://aditigroup.com/category/security-learning/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Stop Insider Theft &#038; USB Drive-By with Zero Trust</title>
		<link>https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Mon, 18 Nov 2024 21:02:18 +0000</pubDate>
				<category><![CDATA[Aditi Zero Trust]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[data storage control]]></category>
		<category><![CDATA[flashdrive]]></category>
		<category><![CDATA[thumb drive]]></category>
		<category><![CDATA[USB drive]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1483</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Remember Physical Data Security</h2>
<p>Just like fortified castle defenses, most electronic data security focuses on the internet.  Phishing emails, malicious websites, unsavory social media links, public Wifi connections, and weak passwords.  All are potentially exploited by data thieves.  But what about the old school theft?  What about in person physical theft of data?</p>
<p>&nbsp;</p>
<h3>Stealth Storage in a Pocket</h3>
<p>Insider theft and passers-by can too quickly pop in a USB drive and terabytes of data quickly and unnoticed.  Storage size and data transfer speed are no longer limitations for would be thieves.  Today&#8217;s reality is that even USB flash drives aka thumb drives can be found for less than $20 for 2TB of storage! </p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>USB flash drives</li>
<li>Portable 2.5&#8243; Solid State drives</li>
<li>Portable 2.5&#8243; hard disk drives</li>
<li>USB adapters for M2 SSD sticks</li>
<li>USB A, B, C</li>
<li>USB 3.0</li>
<li>mobile phones</li>
</ul>
</li>
</ul></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;"><span style="color: #333333;"><em>Gone In 60 Seconds?</em></span></h2></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap "><img fetchpriority="high" decoding="async" width="800" height="800" src="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg" alt="USB drive theft - gone in 60 seconds?" title="USB drive theft - gone in 60 seconds?" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1485" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>What About Our Ever Present Phones?</h3>
<p>And perhaps most stealth of all&#8230;the our ever present mobile phones!   Who would notice a cell phone connected to a computer?   Likely just a battery recharge right?   Maybe it&#8217;s more.   An iPhone can have to 1TB of storage and many Android phones have large storage AND the ability to add microSD cards for even more.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="717" src="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg" alt="transfer data between cell phones and computers" title="transfer data between cell phones and computers" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800-480x430.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1492" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;">USB Adapter for M.2 Internal SSD</h3>
<p style="text-align: center;"><strong>As high as 4TB of space, blazing fast, and small as a stick of gum!</strong></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_2">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="600" src="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg" alt="USB M.2 SSD adapter" title="m2 SSD usb adapter" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter-480x360.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1491" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What&#8217;s the Risk?  What&#8217;s At Stake?</h2>
<p>Everything valuable to you and your business.</p>
<p>HIPAA breach of protected health information (PHI).   Company proprietary secrets.   Customer private financial information, including social security numbers and other items covered by GLBA and consumer privacy laws.   Book of business &#8211; the clientele that you&#8217;ve worked so hard to build up over the years.  Embarasing photos or insinuating documents.</p>
<p>Breach of privacy laws can mean massive financial penalties by authorities, lawsuits, and potentially even jail time. And your reputation can flip from trusted authority to careless, untrustworthy people to avoid.  </p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Stealth and Easy Use Enables Theft</h3>
<p>USB storage devices &#8211; portable drives and mobile phones, enable in-person, local theft of data if they are allowed.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h4>Theft happens in one of three ways:</h4>
<ol>
<li style="list-style-type: none;">
<ol>
<li>The door is left OPEN &#8211; the invitation to take unprotected things</li>
<li>An OUTSIDER breaks in &#8211; hacking and social engineering</li>
<li>Someone INSIDE is the thief &#8211; you&#8217;re given access as a team member</li>
</ol>
</li>
</ol>
<h2>Zero Trust Solution: Block USB</h2>
<p>The heavy handed IT admin&#8217;s solution is to simply block all USB ports.   No more connecting thumb drives, phones, or portable SSDs and HDDs.   Blocking USB drive storage can close an overlooked door that few choose to secure.  This follows the assumption that files copied or saved to extneral USB connected drives are suspect and not to be trusted.  This closes a real and serious security hole.  But it also can create a roadblock to work flow by denying USB connected devices that you WANT.  So, really a more nuanced and complex strategy is what most people want.  And it is what keeps IT admins from implementing it: complexity.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><img loading="lazy" decoding="async" src="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-300x102.png" width="300" height="102" alt="Aditi Zero Trust Protection" class="wp-image-1475 alignleft size-medium" />Let Aditi Zero Trust Do the Work</h2>
<p>A much more practical path forward to secure your data, while allowing dyanmic workplaces and convenience is with Aditi Zero Trust.   Data storage controls can regulate storage options by specific computer, workgroup, user, or even software program.  Our set of tools allows us to deal with all of the complexity of enabling software functionality and workflow that you need while locking down and blocking everything else.   Aditi Zero Trust is supported 24/7 and we are able to react to any new requests for software changes within a few minutes. So, you get the best overall security while keeping business flowing smoothly. </p></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_0_wrapper et_pb_button_alignment_center et_pb_module  dbdb-icon-on-right dbdb-icon-on-hover">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://aditigroup.com/contact-us/">Contact Us Now to Learn More</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How QuickBooks &#038; Lacerte can weaken security and help hackers</title>
		<link>https://aditigroup.com/how-quickbooks-lacerte-can-weaken-security-and-help-hackers/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Thu, 10 Oct 2024 23:19:06 +0000</pubDate>
				<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[accounting]]></category>
		<category><![CDATA[Administrator]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Lacerte]]></category>
		<category><![CDATA[lock down]]></category>
		<category><![CDATA[permissions control]]></category>
		<category><![CDATA[QuickBooks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tax software]]></category>
		<category><![CDATA[Windows user privileges]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1358</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/how-quickbooks-lacerte-can-weaken-security-and-help-hackers/">How QuickBooks &amp; Lacerte can weaken security and help hackers</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3></h3>
<h2>What to do when your software needs Windows Admin rights: safely using QuickBooks &amp; Lacerte</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_3">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="816" height="625" src="https://aditigroup.com/data-privacy/wp-content/uploads/Windows-10-Administrator-Account.jpg" alt="Windows Administrator accounts and permissions" title="Administrator accounts and permissions" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/Windows-10-Administrator-Account.jpg 816w, https://aditigroup.com/data-privacy/wp-content/uploads/Windows-10-Administrator-Account-480x368.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 816px, 100vw" class="wp-image-1393" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_3_5 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Overview</h3>
<p>Lacerte and QuickBooks require Administrative Windows user level permission to keep software updated.  This is different than the various QuickBooks user level accounts within QuickBooks.  <strong>Why does this matter? </strong> As we explain in other Aditi Group articles, <em><strong>a</strong><strong> key goal of hackers is to get admin rights</strong></em>.</p>
<p>Once a user has Windows admin permissions, he or she can open more doors, access more data and functions, run exploits, change user credentials, and ultimately, get to the goods &#8211; sensitive financial info.</p>
<p><strong>Aditi Group uses unique software that allows <em>programs</em> </strong><strong>to have Admin rights, without requiring <em>users</em> to be Admins</strong>.  So programs function correctly, while allowing Windows users work without Admin level rights &#8211; in a much more secure mode.  Work gets done while blocking potential hackers from greater access.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>&nbsp;</p>
<p><strong>QuickBooks</strong> is synonymous with personal and business accounting.  Nearly every bank and online investment account allows you to export transaction history and account data in QuickBooks file format.  Even better, you can connect financial institutions directly to your QuickBooks software to sync data automatically.  It&#8217;s the most widely used accounting and bookkeeping software for small businesses.</p>
<p>Another in the Intuit portfolio is tax preparation software <strong>Lacerte</strong>.  Acquired by Intuit in 1998 for $400 million, it&#8217;s not one of the more known Intuit names, but there is a large base of CPA&#8217;s and tax preparers.  Both progams are part of the ever growing portfolio of <strong>Intuit</strong>, current owner TurboTax, Credit Karma and Mailchimp.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_4">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="581" src="https://aditigroup.com/data-privacy/wp-content/uploads/lacerte-quickbooks-intuit.png" alt="" title="" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/lacerte-quickbooks-intuit.png 800w, https://aditigroup.com/data-privacy/wp-content/uploads/lacerte-quickbooks-intuit-480x349.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1367" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Administrator Rights</h2>
<p>QuickBooks and Lacerte require Windows Admin user account credentials to run updates, which, during tax season, can be frequent.  Aditi Group has seen updates daily, and even more than once a day at times.  And tax prep offices may be running a slew of different tax years simultaneously, each one requiring different Lacerte program version.</p>
<p>These means QB and Lacerte users need to be made Windows Admin level to keep the office running with their core software.   <strong>The violates a basic principle of security: <em>only use the level of access you need right now.</em></strong></p>
<p>Don&#8217;t work in Admin mode all the time.  Use non-admin accounts for daily work.  Use Admin accounts to make changes, review issues, and access resources for special action.   See what Google recommends to administrators:</p></div>
			</div><div class="et_pb_module et_pb_blurb et_pb_blurb_0  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap et_pb_only_image_mode_wrap"><img loading="lazy" decoding="async" width="1200" height="1048" src="https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins.png" alt="Google Workspace Admin security recommendtions" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins.png 1200w, https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins-980x856.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins-480x419.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" class="et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-1377" /></span></div>
					<div class="et_pb_blurb_container">
						<h4 class="et_pb_module_header"><span>What Does Google Say to Admins?</span></h4>
						<div class="et_pb_blurb_description"><p><em><strong>Don&#8217;t stay logged into Admin or use Admin accounts for everyday work.  </strong></em>Google, like most sources, cautions against remaining logged in as an admin, or in the context of Google Workspace (aka Apps), as Super Admin.</p>
<p>&nbsp;</p></div>
					</div>
				</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_12  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Prime Hacker Targets</h2>
<p>Financial professionals who deal in analyzing, tracking, managing, and reporting on money are prime target for hackers.  Especially Tax Accountants and Tax Preparers.  Your valuable info, including your social security number, is the golden key that credit thieves are looking for.  Not only can fraudsters potentially create new credit accounts in your name, but they can also potentially file for tax refunds in your name, and to be collected by them.  In fact, tax return fraud is such a huge problem in recent years that the <a href="https://www.taxpayeradvocate.irs.gov/news/nta-blog/nta-blog-wheres-my-refund-has-your-tax-return-been-flagged-for-possible-identity-theft/2023/08/">IRS flags millions of returns as potentially fraudulent and requires tax user verification</a>.  An untold number of fraudulent returns make it through the system.</p>
<p>As we write this, October 15th is fast approaching and smack in the middle of national Cybersecurity Awareness month.  It&#8217;s fitting.  Hackers know that it&#8217;s &#8220;silly season&#8221; as some tax preparers call it.   They know that heavily loaded staff working long, late hours can more easily click on a phishing email link instead of a legit message from a client and accidentally let in a potential hacker.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_13  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Feeling the Pressure</h2>
<p>&nbsp;</p>
<h3>Tax Seasons Around the Year</h3>
<p>As the tax filing dates grow closer for individuals in April and October and for business with their tax filing deadlines, the pressure cooker in many tax prep offices heats up and up.  Clients (hey, that&#8217;s people like you and me) tend to wait until the deadline and then some, to get data, and I mean all the records to the tax prep offices.  And then we demand that OUR filings are submitted on time.   And hey, where&#8217;s my refund? </p>
<p>&nbsp;</p>
<h3>Monthly Close &amp; Reporting Deadlines</h3>
<p>When CPA&#8217;s and bookkeepers aren&#8217;t hustling with tax prep or filing steps, they&#8217;re keenly aware of the regular reporting that many business leaders require to pace company progress and manage the tactical and strategic plans through the year.  Like tax filing dates, these end of month, quarter and yearly points mean more work and more pressure clients to get data processed and reports done.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_5">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="401" src="https://aditigroup.com/data-privacy/wp-content/uploads/tax-deadline-pexels-leeloothefirst-8962467-800.jpg" alt="tax deadline April and October 15 for personal income tax" title="tax deadline April and October 15 for personal income tax" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/tax-deadline-pexels-leeloothefirst-8962467-800.jpg 600w, https://aditigroup.com/data-privacy/wp-content/uploads/tax-deadline-pexels-leeloothefirst-8962467-800-480x321.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-1378" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_16  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_6">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="425" height="282" src="https://aditigroup.com/data-privacy/wp-content/uploads/computer-security-protection-privacy.jpg" alt="computer security lock down privacy protection" title="computer security lock down privacy protection" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/computer-security-protection-privacy.jpg 425w, https://aditigroup.com/data-privacy/wp-content/uploads/computer-security-protection-privacy-300x199.jpg 300w" sizes="(max-width: 425px) 100vw, 425px" class="wp-image-1390" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_3_5 et_pb_column_17  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>&lt;&lt;   IT Managers&#8217; Dream</h2>
<p>The fantasy for many a CISO or IT manager is to fully lock down every computer.  No one gets admin rights but them.  No one else can make changes, install risky software, use weak passwords, move data with insecure ways, or otherwise erode the secure defenses our IT leaders put in place.</p>
<h2 style="text-align: right;">&gt;&gt;  IT Reality</h2>
<p style="text-align: left;">Keeping offices in forward motion and appeasing staff traditionally means <em><strong>trade-offs</strong></em>.  We vote for quick and easy over secure and thorough and secure.  The real picture is too often weak or compromised security to allow programs and people to get the job done.  Thieves pray on the security trade-offs and compromises we make for convenience.  Something to exploit!</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_18  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Elevation Control Solution</h2>
<p>Aditi Group employs a software system that allows us to exercise granularly assigned rights and privileges to both programs and people.  Those rights can be set with a variety of factors which gives IT managed service providers like us at Aditi Group, the ability to approve Lacerte and QuickBooks for Windows administrative permission, while keeping users are non-admins.  So, users, including hackers, can&#8217;t directly get to the admin privileges.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_19  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_7 et-waypoint">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="999" height="338" src="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000.png" alt="Aditi Zero Trust Protection
" title="Aditi-Zero-Trust-Platform-inline-blue-1000" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000.png 999w, https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-980x332.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-480x162.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 999px, 100vw" class="wp-image-1475" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_20  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_8">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="533" src="https://aditigroup.com/data-privacy/wp-content/uploads/eat-cake-pexels-wildlittlethingsphoto-3215592.jpg" alt="have your cybersecurity cake and eat it too!" title="have your cybersecurity cake and eat it too" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/eat-cake-pexels-wildlittlethingsphoto-3215592.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/eat-cake-pexels-wildlittlethingsphoto-3215592-480x320.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1381" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_21  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Enjoy the Security &amp; Productivity Rewards</h2>
<p>We can have our cake AND eat it too.  We can now effectively and securely enable powerful software tools while reducing cybersecurity risks.  This is the not the end-all, be-all for security, but it significantly reduces risk of hacking of valuable financial data.  And that can be the difference between having a thriving accounting, bookkeeping, or tax preparation business and lawsuits and penalties for allowing hackers to get to client data.</p></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_1_wrapper  et_pb_module  dbdb-icon-on-right dbdb-icon-on-hover-off">
				<a class="et_pb_button et_pb_button_1 et_pb_bg_layout_light" href="https://aditigroup.com/contact-us/" data-icon="">Contact Us to Secure Your Office</a>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_22  et_pb_css_mix_blend_mode_passthrough et_pb_column_empty">
				
				
				
				
				
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_23  et_pb_css_mix_blend_mode_passthrough et-last-child et_pb_column_empty">
				
				
				
				
				
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/how-quickbooks-lacerte-can-weaken-security-and-help-hackers/">How QuickBooks &amp; Lacerte can weaken security and help hackers</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s the Score? National Vulnerability Database</title>
		<link>https://aditigroup.com/whats-the-score-national-vulnerability-database/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 10 Apr 2024 20:27:26 +0000</pubDate>
				<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NVD]]></category>
		<category><![CDATA[rating]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[severity]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1137</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/whats-the-score-national-vulnerability-database/">What&#8217;s the Score? National Vulnerability Database</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_15">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_24  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_17  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Weakness Scoring System</h2>
<p>Our Federal government division witin the Department of Commerce, under the National Institute of Standards and Technology, NIST, has a <strong>National Vulnerability Databaase</strong> designed to help the public, and especially the technical administrators of IT systems to guage potential weaknesses or vulnerabilities in software and hardware systems.  </p>
<p>&nbsp;</p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_9">
				
				
				
				
				<a href="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png" class="et_pb_lightbox_image" title="NATIONAL VULNERABILITY DATABASE"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="2400" height="1350" src="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png" alt="NATIONAL VULNERABILITY DATABASE" title="NIST-national-vulnerability-database page-2400" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png 2400w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-1280x720.png 1280w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-980x551.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-480x270.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 2400px, 100vw" class="wp-image-1139" /></span></a>
			</div><div class="et_pb_module et_pb_text et_pb_text_18  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>NIST has been working with private industry and other public sector organizations to rate and maintain a catalog of IT threats.   Originally started in 1999 under another name, and as an effort between NIST, SANS institute, and othrs, under the name ICAT or Internet Category Attack Toolkit.  It evolved and even faced death by lack of budgets until rebranded as NVD in 2005 and supported more fully.  </p></div>
			</div><div class="et_pb_module et_pb_blurb et_pb_blurb_1  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap et_pb_only_image_mode_wrap"><img loading="lazy" decoding="async" width="1199" height="873" src="https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938.png" alt="example NVD score 7.8" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938.png 1199w, https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938-980x714.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938-480x349.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1199px, 100vw" class="et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-1145" /></span></div>
					<div class="et_pb_blurb_container">
						<h4 class="et_pb_module_header"><span>Example: 7.8 Severity Linux Vulnerability</span></h4>
						<div class="et_pb_blurb_description"><p>This page is an excellent example of the use, and also of how technical it is.  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">https://nvd.nist.gov/vuln/detail/CVE-2021-46936</a></p></div>
					</div>
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/whats-the-score-national-vulnerability-database/">What&#8217;s the Score? National Vulnerability Database</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is Blockchain a Security Savior for Healthcare and Us All?</title>
		<link>https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Thu, 03 Nov 2022 19:49:44 +0000</pubDate>
				<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[hardware wallets]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[hipaa compliance]]></category>
		<category><![CDATA[performance problems]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=960</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/">Is Blockchain a Security Savior for Healthcare and Us All?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_16">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_25  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_19  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>The Goals of Blockchain: Trust and Security</h2>
<h2>What is Blockchain? Blockchain explained for non-coders</h2>
<p>Blockchain is a way of recording that sequentially links every revision of a a record, in a distributed / shared log (or ledger for finance folks).  Every transaction is recorded in an every growing record chain.</p>
<h4>Featues of Blockchain Records</h4>
<ul>
<li>decentralized digital record ledger</li>
<li>data records (blocks) are tied together in time sequence</li>
<li>any change to a record adds a new block</li>
<li>nothing can be deleted or changed without a record as evidence</li>
<li>&#8220;tamper proof&#8221;</li>
<li>can be used for any kind of data</li>
<li>distributed network &#8211; doesn&#8217;t reside on just one computer or desk</li>
</ul>
<h2></h2>
<h2>Security and Trust</h2>
<p><strong>Blockchain brings the promise of trusted data,</strong> and impossible&#8230;or very low probability of fakes. It can allow a person to own their own data and share it with the world as they choose. Panacea.</p>
<p>&nbsp;</p>
<h2>Code Is Opportunity</h2>
<p>But this is code and electronics. There is always some relative weakness.  Code is the realm of hacks.</p>
<p>Crypto hacks have shown that environments where blockchain are used are not unlike other things in the cyber world.  Regardless of how trusted or secure a blockchain inidivudal record is, the the application or system it&#8217;s used in is vulnerable to the same old cybersecurity problems that befall everyone else.</p>
<p>Two main ways: stolen keys (the passwords), and exploiting bugs in code. Here are some expensive examples:</p>
<blockquote class="wp-embedded-content" data-secret="mHUgZF8POq"><p><a href="https://blockworks.co/the-nine-largest-crypto-hacks-in-2022/">The Nine Largest Crypto Hacks in 2022</a></p></blockquote>
<p><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;The Nine Largest Crypto Hacks in 2022&#8221; &#8212; Blockworks" src="https://blockworks.co/the-nine-largest-crypto-hacks-in-2022/embed/#?secret=pTgeASvjIu#?secret=mHUgZF8POq" data-secret="mHUgZF8POq" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<blockquote class="wp-embedded-content" data-secret="39q8TequQs"><p><a href="https://techmonitor.ai/technology/cybersecurity/biggest-cryptocurrency-hacks-of-all-time">The biggest cryptocurrency hacks of all time</a></p></blockquote>
<p><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;The biggest cryptocurrency hacks of all time&#8221; &#8212; Tech Monitor" src="https://techmonitor.ai/technology/cybersecurity/biggest-cryptocurrency-hacks-of-all-time/embed#?secret=uNaKY72lLM#?secret=39q8TequQs" data-secret="39q8TequQs" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2>Where is Blockchain Used?  Is it Here Yet? </h2>
<p>Blockchain is being introduced in the background with the <strong>big insurers, banks, pharma, governments</strong>, etc. For most of us, we won&#8217;t see it or it won&#8217;t affect us for a while (some years).  Blockchain is really only encoutered by most people who invest in or read about crypto currencies.  What blockchain offers crypto is the distributed, trusted accounting that is needed when there is no central bank.  It&#8217;s the perfect and obvious applicaiton for this new way of tracking transactions. </p>
<h3>Healthcare Blockchain &amp; How It&#8217;s Used</h3>
<p>Blockchain methodology and application are still in the infancy stages for the healthcare industry as a whole. There is an ever increasing number of companies applying blockchain in different ways.</p>
<p><strong>Some create trusted data share groups.</strong>  These allow us patients &#8211; us individuals to own and control our personal medical history records.  We can choose who we allow to view and add to our records.  And they can&#8217;t be tampered with.  That&#8217;s real power in the hands of the people.  </p>
<p>Some healthcare blockchain companies and projects focus on the <strong>validation of drug history, DNA info, etc</strong>. This is similar to <em><strong>traceability</strong></em> that supply chains are generally concerned with.  Knowing the history or the full life path of who touched an item from raw material and out and into the marketplace, is important for controlling quality, safety, and accountability for problems.</p>
<p>Other blockchain tech companies just create <strong>data network protocols</strong> (the code stuff) <strong>or hardware</strong> (like crypto currency wallets).  These support products and services advance the practicality and usefulness of blockchain in healthcare.</p>
<p>&nbsp;</p>
<h2>Why Aren&#8217;t We All Using Blockchain?</h2>
<p><strong>What&#8217;s the Holdup? We need trusted, secure solutions today!<br /></strong></p>
<h3><strong>The Performance Problem</strong></h3>
<p>Blockchains also suffer from a capacity problem. That’s the reason one crypto currency has not really won out yet. Each transaction must be written somewhere. Therefore, the greatest strides have been done through supply chain. Once the object has been delivered, it can be archived or erased. Food is the one application that holds the greatest promise. A head of lettuce grown in a field can be tracked until sold. If a contamination is discovered, tracking to the field, within a farm, can be pulled out of the blockchain in an instant.</p>
<p><em><strong>Cons for using blockchain are processing speed and resources needed</strong></em>. It can consume a lot of computing power to solve the complex cryptographic equations for validating a record to be added to a chain. For crypto currencies, this is one way you get paid &#8211; by &#8220;mining&#8221; or by computing a new record. It takes time, so fewer transactions per second and computing power and electrical power. Both cost money&#8230;real money. : )</p>
<p>&nbsp;</p>
<p>Healthcare faces the same limits as currency. People live a long time. Each prescription, procedure, etc. must be kept for the life of the individual. The cloud is not limitless. Everything has a capacity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/">Is Blockchain a Security Savior for Healthcare and Us All?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Security Risks and Importance of Cybersecurity</title>
		<link>https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Tue, 11 Oct 2022 15:35:11 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data hack]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[LAUSD]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=933</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/">Data Security Risks and Importance of Cybersecurity</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_17">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_26  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_10">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="1000" src="https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg" alt="Aditi Group cybersecurity interview podcast " title="Podcast-S4E6-Cybersecurity-part-1" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg 1000w, https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-980x980.jpg 980w, https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-937" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_20  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Listen in as we kick off Cybersecurity Month with another great interview by Dorothy Cociu on the Benefits Executive Roundtable.  In this show we discuss hot security topics and security breaches in 2022 and 2021.  Find out what&#8217;s been happening and what you can avoid being a statistic!</p>
<p>Listen and follow the podcast series Benefits Executive Roundtable: </p>
<p><a href="https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/?">https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/?</a></p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_0">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/benefitsexecroundtable/embed/episodes/S4E6---Data-Security-Risks-and-Importance-of-Cybersecurity--Part-1-e1p2a1k" height="102px" width="400px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/">Data Security Risks and Importance of Cybersecurity</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</title>
		<link>https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Fri, 20 May 2022 21:28:53 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Aditi Group]]></category>
		<category><![CDATA[Advanced Benefit Consulting]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[interview]]></category>
		<category><![CDATA[published articles]]></category>
		<category><![CDATA[The STATEment]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=887</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_18">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_27  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_21  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><strong>Aditi co-founders Ted Mayeshiba and Ted Flittner</strong> are interviewed in this lengthy article written by Dorothy Cociu, President of Advanced Benefit Consulting.  We invite you to learn more about current computer and  phone electronic data security threats and how to avoid some of them.</p>
<h3>Highlight Topics Include</h3>
<ul>
<li>Are banking apps safe?</li>
<li>Microsoft Breach by Lapsus$ Hacker Group, March 2022</li>
<li>The risks of using QR codes</li>
<li>Crypto currency</li>
<li>The need for risk assessments – an ongoing security tool</li>
</ul>
<h3>Read the article at Advanced Benefit Consulting</h3>
<p><a href="https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/</a></p>
<p><a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank" rel="noopener"></a></p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_28  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_22  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;">Read the article in the <a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank" rel="noopener">California Broker magazine, June 2022 issue</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_11">
				
				
				
				
				<a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="781" src="https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2.jpg" alt="Cal Broker magazine quotes Aditi Group on cybersecurity" title="caifornia-broker-june-2022-cyber-security-2" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2.jpg 600w, https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2-480x625.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-904" /></span></a>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_29  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_23  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;">Read the article in the <a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank" rel="noopener">STATEment May / June 2022 issue</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_12">
				
				
				
				
				<a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="400" height="517" src="https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg" alt="" title="" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg 400w, https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400-232x300.jpg 232w" sizes="(max-width: 400px) 100vw, 400px" class="wp-image-891" /></span></a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>8th Annual World Password Day &#8211; Have We Learned Yet?</title>
		<link>https://aditigroup.com/8th-annual-world-password-day-have-we-learned-yet/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Thu, 05 May 2022 19:08:02 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[2-factor]]></category>
		<category><![CDATA[default]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[World Password Day]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=840</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/8th-annual-world-password-day-have-we-learned-yet/">8th Annual World Password Day &#8211; Have We Learned Yet?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_19">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_30  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_13">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1200" height="800" src="https://aditigroup.com/data-privacy/wp-content/uploads/password-security-1200.jpg" alt="" title="" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/password-security-1200.jpg 1200w, https://aditigroup.com/data-privacy/wp-content/uploads/password-security-1200-980x653.jpg 980w, https://aditigroup.com/data-privacy/wp-content/uploads/password-security-1200-480x320.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" class="wp-image-843" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_24  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>8th Time, No Charm</h2>
<p>Today marks the 8th annual World Password Day as first started by Intel in 2013.  So, the question is: have we learned anything since the first Password Day?  Have we become any more secure?</p>
<p>&nbsp;</p>
<h2>Survey Says</h2>
<p>2021 and 2022 surveys from password keeper software companies like LastPass and NordPass and telecom providers like Verizon all say NO.   Recent surveys still, sadly point to top, most commonly used ones as:</p>
<ul>
<li>123456</li>
<li>password</li>
<li>qwerty</li>
<li>password1</li>
<li>variations on these age old defaults</li>
</ul>
<p>&nbsp;</p>
<h2>Make Your Move</h2>
<p>With lots of articles reminding us this week, we urge you to take this moment to become more secure.</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_20">
				<div class="et_pb_column et_pb_column_1_4 et_pb_column_31  et_pb_css_mix_blend_mode_passthrough et_pb_column_empty">
				
				
				
				
				
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_32  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_25  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Aditi&#8217;s password security recommednations include:</h3>
<h4>A)  Use 8-10 characters or more</h4>
<h4>B)  Include mixed letters, numbers, upper/lower case, special characters</h4>
<h4>C)  No names, dates, or easily guessed personal info about you</h4>
<h4>D)  Unique &#8211; don&#8217;t re-use paswords for multiple accounts</h4>
<h4>E)  Don&#8217;t leave them lying around</h4>
<h4>F)  Use multifactor or 2-factor authentication too</h4></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_33  et_pb_css_mix_blend_mode_passthrough et-last-child et_pb_column_empty">
				
				
				
				
				
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_21">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_34  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_26  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Keep Passwords Locked Up</h2>
<p>Use some kind of password record keeper so you use LONG, STRONG, and UNIQUE passwords.  If you are trying to relying on remembering all your passwords, you&#8217;ll be too tempted to use the same one everywhere or keep them too simple or based on info about you that others could find on social media.  There are lots of solutions including web based and offline, locally stored software tools.</p>
<p>Contact us for more ideas and help in getting your business into safer territory and out of the past.</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/8th-annual-world-password-day-have-we-learned-yet/">8th Annual World Password Day &#8211; Have We Learned Yet?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Basics of Social Engineering</title>
		<link>https://aditigroup.com/the-basics-of-social-engineering/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Thu, 04 Jun 2020 00:13:47 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[Health Insurance Portability and Accountability Act]]></category>
		<category><![CDATA[HIPAA breach]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=441</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/the-basics-of-social-engineering/">The Basics of Social Engineering</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_22">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_35  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_27  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><!-- divi:paragraph --></p>
<h2 style="text-align: justify;">Where Are You Most Vulnerable?</h2>
<p style="text-align: justify;"><strong>Hackers understand that <em>employees</em> are often the weakest link in an organization’s security. That’s why 98% of cyber attacks rely on some type of social engineering, costing companies $billions every year.</strong></p>
<p>Are you familiar with these new Cyber criminal techniques that can leverage ANY connected employee to breach your security?</p>
<p><strong>As an increasing number of employees are forced to work remotely during the COVID-19 crisis</strong>, IT networks have become even more vulnerable to cyber-attack, especially when users connect over unsecure Wi-Fi and/or Home Networks with their personal devices.</p>
<p>In addition to raising awareness about new security threats for your employees, we’ve included 8 tips to help teleworkers (and any connected employees) improve security. You’ll also see recommendations on how ongoing Cyber Security Awareness Training is crucial to a strong defense.</p>
<p>While users are regularly encouraged to keep their anti-virus definitions and software up-to-date, 6% percent of users NEVER receive any type of security awareness training, while another 33% receive only once per year or when they join the company.</p>
<p>&nbsp;</p>
<h3>Key Security Lingo</h3>
<p>Every employee should also become familiar with the latest phishing and ransomware strategies to prevent becoming that weak link.</p>
<h4 style="padding-left: 30px;">Phishing (or Spear Fishing)</h4>
<h4 style="padding-left: 30px;">Vishing</h4>
<h4 style="padding-left: 30px;">Pretexting</h4>
<h4 style="padding-left: 30px;">Business E-Mail Compromise (BEC)</h4>
<h4 style="padding-left: 30px;">Baiting</h4>
<p>From an IT Security perspective, the term “social engineering” refers to cybercriminals using any number of psychological tricks to get users to perform actions (click on an email or link) or divulge personal or confidential information.<br /> While technical hackers seek vulnerabilities in the networks or software, social engineering cybercriminals exploit an end user’s tendency to trust.</p>
<p>Other types of social engineering may include creating distrust, or starting conflicts by altering private or corporate communications. There are literally thousands of variations to social engineering attacks, limited only by the criminal’s imagination.</p>
<p><strong></strong></p>
<h3>Phishing (or Spear Fishing)</h3>
<p>Phishing is the most common type of social engineering attack. Hackers pose as a trusted source (a friend, boss, colleague, bank official, government agency, etc.) and concoct a seemingly logical scenario for handing over login credentials or other sensitive personal data.</p>
<p>The cybercriminal may obtain your email address from a compromised email account or web directory and then go “Phishing,” sending general emails to everyone, or go “spear fishing,” personalizing an email for just you.</p>
<p>The email will contain:</p>
<ul>
<li>A link that you just have to click on, taking you to a website that asks for your personal information and/or automatically downloads malware</li>
<li>An attachment of pictures, music, movie, document, etc., that has malicious software embedded. </li>
</ul>
<p>&nbsp;</p>
<h3>Vishing</h3>
<p>Another type of phishing, using voice instead of text. The cybercriminal recreates an IVR (Interactive Voice Response) system of a trusted company, attaches it to a toll-free number and tricks you into responding to the cell phone prompts with your personal information.</p>
<p>&nbsp;</p>
<h3>Pretexting</h3>
<p>Pretexting is a social engineering technique of presenting oneself as someone else in a fictional situation in order to obtain private information.</p>
<p>This may be another phishing exploit, or use baiting techniques, but it’s all about developing a believable story, which may include:</p>
<p><span style="text-decoration: underline;">Urgent request for help</span>. Your ’friend’ is stuck in another country and needs money to get home or to pay a fine. Or the CEO sends an email titled “URGENT!!!!!,” with a message containing spelling mistakes.</p>
<p>Ask you to donate to a fundraiser, or some other cause. Disaster relief, political campaign, or charity needs money and/or your personal information to keep you informed.</p>
<p>Notify you that you’re a ‘winner.’ This phishing attack claims to be from a lottery, or a dead relative, or the millionth person to click on their site, etc. In order to receive your “prize” you will need to provide your bank routing number along with other details to steal your identity.</p>
<p>Pose as tech support or other professional. Also considered a “Quid Pro Quo” attack, the cyber-criminal is responding to an issue, and requests information, and/or a download of a scanner (malicious software) to scan your system. The criminal may be quite helpful and provide productivity tips while stealing your identity.</p>
<p>&nbsp;</p>
<h3>Serious Business Pre Text</h3>
<p>One form of pretexting, called <strong>Business E-Mail Compromise (BEC)</strong> uses a variety of tactics to con the company into wiring funds. The cybercriminal group likely gains access through spear-phishing and/or malware, and then spends weeks or months discovering the organization’s billing process, vendor payments, and the CEO’s email style and travel schedule.<br /> Then when the CEO is out of office, the scammers send a targeted email posing as the CEO to the finance officer (bookkeeper, accountant, controller, or CFO ) requesting an immediate wire transfer. The vendor will sound familiar though the account numbers will be slightly different.</p>
<p>If undetected, the initial and subsequent requests will cost the company thousands if not hundreds of thousands of dollars.</p>
<p>&nbsp;</p>
<h3>Baiting</h3>
<p>This type of social engineering scheme dangles malicious devices inside a seemingly harmless carrier, hoping someone will “take the bait.”</p>
<p>These schemes are often found on Peer-to-Peer sites offering a recent movie, or music to download, but they’re also found on social networking sites, job posting sites, online auctions and e-commerce sites.</p>
<p><!-- /divi:paragraph --></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/the-basics-of-social-engineering/">The Basics of Social Engineering</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Separate the Kingdom with a VLAN</title>
		<link>https://aditigroup.com/separate-the-kingdom-with-a-vlan/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Tue, 21 Apr 2020 23:07:14 +0000</pubDate>
				<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=420</guid>

					<description><![CDATA[<p>You&#8217;re working at home. Only YOU should be able to access the company data. It also crops up in offices with different divisions or departments. Not just anyone and everyone should be able to view, copy, edit or worse, DELETE, the files that don&#8217;t pertain to them. You&#8217;ve Gotta Keep &#8216;Em Separated We all do [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/separate-the-kingdom-with-a-vlan/">Separate the Kingdom with a VLAN</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>You&#8217;re working at home.  Only YOU should be able to access the company data.   It also crops up in offices with different divisions or departments.  Not just anyone and everyone should be able to view, copy, edit or worse, DELETE, the files that don&#8217;t pertain to them.</p>



<p></p>



<h2 class="wp-block-heading">You&#8217;ve Gotta Keep &#8216;Em Separated</h2>



<p>We all do it.  We are told we should do it.  Keep &#8217;em separated.  Don&#8217;t put all of your eggs in one basket.  Keep the hot side hot and cold side cold.  We do it in school.  We divide groups so that they don&#8217;t mix with each other, when it&#8217;s really important to keep things pure.</p>



<p>A fundamental tenet of security is to keep minimize access to just those who need it.  Health and Human Services tells health providers through HIPAA requirements to give people, including staff, access to the &#8220;minimum necessary&#8221;.  </p>



<p></p>



<h2 class="wp-block-heading">Why It Matters &#8211; Real Life Implications</h2>



<p>Dividing computers or workers from each other into groups is a way to minimize the risk that the wrong people view data they shouldn&#8217;t.  It also keeps people from altering data they shouldn&#8217;t.  And it one of the strongest ways of keeping hackers from getting access to the whole kingdom once they get through one tiny crack in the wall. </p>



<p>Reflecting back on some of the largest data breaches on record, we see a common pattern.  Hackers get access to one computer.  Then they move out and over to other computers and shared devices &#8211; file folders, data bases, etc.   Target&#8217;s breach of 70 million credit card users that took place on Black Friday is a poignant example of hackers getting to one computer and moving up, over, and into other data systems.  Ultimately from one computer at a subcontract air conditioning service company into the Target financial systems.  </p>



<p></p>



<h2 class="wp-block-heading">Separate Physical Networks</h2>



<h3 class="wp-block-heading">Physical Local Area Network (LAN)</h3>



<p>Easy enough to imagine a large office building with different networks that employees log into.   Sure.  Big offices often have numerous file servers.  And the most basic method for keeping things split art is to hard wire the network cables that connect each computer to a specific server.   Physical separation makes sense and is easy to understand.  But it&#8217;s not always the most practical.</p>



<p></p>



<h2 class="wp-block-heading">Virtual Networks</h2>



<h3 class="wp-block-heading">Virtual Local Area Network (VLAN)</h3>



<h4 class="wp-block-heading"><em>What Does V<strong>irtual Network</strong> Mean?   </em></h4>



<p>Virtual networks share the same physical network connections &#8211; same wires, same routers and switches.   But they are kept separate through software.   Sophisticated server software, now routine for big businesses, allow networks to be created virtually.  Once done, users on one VLAN have no ability to connect with users on another VLAN.  They&#8217;re kept apart even though they use the same hardware.</p>



<p></p>



<h3 class="wp-block-heading">Isn&#8217;t That the Same As My Home Guest Network?</h3>



<p>No.  Yes.  Maybe.  Sort of.  It depends on details of the router and how the networks are set up on the router.  Most &#8220;Guest&#8221; networks are not functioning as separate VLANs.  In most cases, guest network users have the same resource access as primary network users.  And everyone is on the same domain and ultimately, hackers can move from Guest to the Ring doorbell, Alexa or your computer with the family financial portfolio on it.  </p>



<p class="has-text-align-center"><em><strong>A guest network puts into place an ACL (access control list) that prohibits users from that SSID from accessing any network that is private. </strong></em><br><em><strong>10.x.x.x/8, 192.168.x.x/16, or 172.16.x.x/12</strong></em></p>



<h4 class="wp-block-heading">2.4GHz, 5GHz, and Guest WiFi Networks</h4>



<p>Your 2.4 GHz and 5 GHz primary and &#8220;guest&#8221; network settings on that router from AT&amp;T, Cox, Spectrum or Comcast all tie to the same &#8220;Home&#8221; network.   Depending on the router make and model, your Guest WifFi network could be set by default (factory settings) to only allow internet traffic, and not to allow it to share other Home network resources.  So, for the casual user, it means they can&#8217;t see your IP camera or your printer.  But advanced users and hackers can scan other addresses on the network and get access.   </p>



<p></p>



<h2 class="wp-block-heading">Separation with VLAN and Managed Switches</h2>



<p>A <strong>Managed Switch</strong> is the piece of hardware that allows us to create virtual or logical separate groups.  A managed switch is not the same as a Router.  A <strong>Router</strong> is a <strong><em>Layer 3 network device</em></strong> and it connects the outside world  &#8211; the internet &#8211; with the devices inside.  </p>



<p></p>



<h2 class="wp-block-heading">Get Your VLAN at Home</h2>



<p>VLANs can be developed with more advanced network components than the typical home parts.  Combine a Managed Switch with a wireless access point (AP) and you&#8217;ve got the hardware for creating a true VLAN.  You don&#8217;t need an expensive 48-port commercial grade managed switch, but  you do want a managed switch.  And APs like Ubiquity offers are more what you&#8217;re looking for instead of your typical WiFi-Router.  It does take more time to setup and learn, but the results are real network security and real separation of resources.</p>



<p></p>



<h2 class="wp-block-heading">Separate Kids, Parents Personal, and Business</h2>



<p>The real security pay-off is in creating separate areas where kids can user the internet with their bad judgement and ask-questions-later enthusiasm for web surfing.   You can create KIDS, PARENTS, and WORK networks and truly keep them separated.</p>



<p></p>



<h2 class="wp-block-heading">Professional Guidance</h2>



<p>Aditi Group can provide the hardware and installation and setup of home and small business networks including VLANs, VPNs, Firewalls, and more.  Call us if you need help keeping your business secure for your Work At Home office.</p>



<p></p>
<p>The post <a href="https://aditigroup.com/separate-the-kingdom-with-a-vlan/">Separate the Kingdom with a VLAN</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s the harm in sharing your mobile number?</title>
		<link>https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Tue, 22 Oct 2019 14:24:31 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Learning]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=310</guid>

					<description><![CDATA[<p>For some of you, it has (prior to this) been routine to punch in your phone number as an identifier for &#8220;club reward&#8221; points at the grocery store or other retail location. Yet, for many of us, mobile phone numbers especially follow us from apartment to apartment to home. We don&#8217;t change that number often, [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/">What&#8217;s the harm in sharing your mobile number?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For some of you, it has (prior to this) been routine to punch in your phone number as an identifier for &#8220;club reward&#8221; points at the grocery store or other retail location. Yet, for many of us, mobile phone numbers especially follow us from apartment to apartment to home. We don&#8217;t change that number often, if at all. It therefore, becomes a good identifier of who we are and tied with other publicly available information, becomes the key to unlock a lot of digital information. The article linked below shows the surprise findings of a tech journalist when he gave his mobile number to a security researcher. (click the picture)</p>
<p><iframe title="I Shared My Phone Number. I Learned I Shouldn’t Have." class="wp-embedded-content" sandbox="allow-scripts" security="restricted" src="https://www.nytimes.com/svc/oembed/html/?url=https%3A%2F%2Fwww.nytimes.com%2F2019%2F08%2F15%2Ftechnology%2Fpersonaltech%2Fi-shared-my-phone-number-i-learned-i-shouldnt-have.html#?secret=3W3PhXyG4U" data-secret="3W3PhXyG4U" scrolling="no" frameborder="0"></iframe></p>
<p>The post <a href="https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/">What&#8217;s the harm in sharing your mobile number?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
