Skip to content
Menu
Applied Technology Group Inc.
Specializing in Technology Solutions
  • Schedule Your Network Assessment
  • Home
  • About
  • Support
  • 260.482.2844 Fort Wayne, Indiana
  • 317.759.2062 Indianapolis, Indiana
  • 419.549.5599 Lima, Ohio
Close Menu
Degree of Awareness
February 15 2021

Degree of Awareness

jacobw Uncategorized Cyber Security, Cybersecurity, Hacking, Information Technology, IT, Proactive, Scam, Security 0

This week we are sharing a true story about a girl named Jane who is a college-aged student and who is applying for jobs. Jane is in graphic design and has a portfolio, so when she came across a well-known company that creates sports-branded gear that was hiring, it was something she wanted to pursue.  She sent them her portfolio electronically, and they set up an interview using a chat forum.  They asked a few questions and then asked her to fill out forms that were going to put her in the queue to receive work from them.  She completed each one and recommended this to friends, who were all excited about this opportunity that would give them income, experience, and work on a contractor basis. 

Until one of her friends paused as he was asked to give his social security number, his address, date of birth, banking information for payments rendered, and so on. 

You can see where this is going.  They were hackers and they had just been handed Jane’s entire identity by merely dangling a carrot of opportunity in front of her. 

Most of us are probably thinking how can you possibly think that a job interview is conducted over a chat room? How can you hand over so much information without questioning what they need it for?  Or without even questioning if it is legitimate?  Think about this – Jane is a young adult in her early twenties, she is intelligent, she is not careless, and she has worked two jobs. The point is she is a responsible adult that fell victim to a cybersecurity attack just like thousands and thousands of other adults. 

It is also safe to say that these days many people would not question anything about interacting entirely online, never meeting face to face, or even via video.  Electronic communication is the norm and oversharing is all part of the game too, so why would it be strange to have a job interview any other way?  She was trying to find a way to provide income and gain experience.  Hackers know our weaknesses; they know how to gain our trust and they customize their attacks based on the audience.  You think you know what you would do, but that is because you can see things clearly from the outside when you aren’t the target.  When you are in it, you are less likely to see it so obviously.  Humans are after all, only human. As we work to protect our homes, our businesses, our identity, and our families let’s remember that smart cybersecurity is like a streaming account – everyone is going to have a different profile but still be using the same platform.  Yet the commonality among all of it is that humans are the weak link that will inevitably be the way a cybercriminal gets in the door.

Do you wonder if you or your staff are making the same mistakes Jane is making? Is it possible that hackers have your data? Click here to get more information or to schedule your free assessment.

Cybersecurity 2021 Trends
January 29 2021

Cyber Security Trends for 2021

jacobw Uncategorized Cyber Security, Cybersecurity, Information Technology, IT, technology 0

Bell bottoms, neon colors, kale. Trends come and trends go, and generally, at Applied Technology Group, we’re not one to care much about what’s in style, but cybersecurity trends? That’s one we can get behind and think that there can never be enough of! 

So, what can you expect to see as a consumer, employee, employer, business owner or just a member of the general public who has a computer? Let’s take a look at what we are seeing.   

Home is where the heart is.   

And it is where the school is, and the office, and unfortunately it is where the likelihood of an attack or breach happens as well.  That means that you need to ready your home and prepare to not only protect but also respond in the event of your network or smart devices being compromised.  Ensure that as a worker or student, you are well protected and working with your IT support staff to have all security measures in place.  As an IT provider, you must do the same for yourself and those that you support.  It will not be easy since many of us are playing catch up to the unexpected transition from last year to work from home scenarios, but it will be of the utmost importance as we move forward with this being the structure for the foreseeable future. 

Inside Job 

There is a horrible phenomenon that is growing in popularity known as insider-threat-as-a-service.  Yes, you can buy a disgruntled employee to sabotage a business and compromise data integrity by stealing information or breaking the business from inside.  While this has been around for longer than 2021, with the hiring process for remote employees being done via video or other long-distance methods, it isn’t always easy to gather and gain the trust you might have had from years of sharing office space. 

Fake ID 

Stolen credentials can be used for more than obtaining a credit card.  Yes, you can build up an identity and establish credit, but you can take it a step further and build up a history that doesn’t exist in reality to the person it is being created for.  This is a step up from the insider job that can happen, but you do need to be aware of who you are hiring and providing your confidential information to. 

Bigger Phish 

With humans being the biggest risk to cybersecurity and working from home being the norm, you can expect a rise in attacks.  Why?  Because humans are the easiest point of entry for any hacker, and unmonitored humans are even easier to trick.  So phishing scams will be even more popular when it comes to attack attempts.  You can mitigate your risks by using a training program like our simulated phishing emails. 

The bottom line with any trend is that it will increase and decrease in popularity over time, but the one trend that isn’t going anywhere is the threat of data breaches.  While the outfit or the outward appearance may change, it is always worn on in an attempt to disguise the true identity. 

ATG logo - 2010 - Transparent
March 19 2020

Our update regarding COVID-19 (Coronavirus)

jacobw Uncategorized 0

We know COVID-19 (coronavirus) continues to be a large concern for many of you – just as it is for all of us here at Applied Technology Group. Our thoughts and prayers are with those directly affected by the virus and we are grateful to those who are working tirelessly to treat them.

We want you to know that Applied Technology Group is taking proactive measures to ensure that we will be able to continue to support our partners whether we are in the office or working remotely. We have made sure that our staff has everything they need to continue to provide support, no matter where they are, with as little disruption as possible.

There are many factors that must be considered with remote working. If you need help getting your company setup for remote work, please contact us immediately. We have solutions that can help with the transition to remote working. For many of our clients, the solutions we have in place will already support remote workers. We encourage you to reach out to our support teams if you have any questions or concerns.

 

You can reach our support teams at the following email addresses:

For IT related questions: itsupport@atgfw.com

For telephone system related questions: voicesupport@atgfw.com

For security related questions: security@atgfw.com

black-calendar-countdown-273026
September 24 2019

Tech bit: Dangers of NOT Upgrading Windows 7 & Server 2008

jacobw IT IT, Microsoft, Windows 10, Windows 7, Windows 8, Windows End of Life, Windows EOL, Windows Update 0

TO UPGRADE OR NOT TO UPGRADE?

SHOULD YOU GET RID OF WINDOWS 7 AND SERVER 2008? WHAT IF YOU DON’T SWITCH?

On January 14, 2020, Microsoft will end its support for Windows 7 and Server 2008. But just because you can continue to use Windows 7 after the end of life date, it doesn’t mean you should. Businesses who rely on technology to keep them running are proactively upgrading their Windows environment to avoid downtime, user issues, poorer functionality and increased security vulnerabilities.

Businesses who remain on Windows 7 and Server 2008 will be left behind with:

  • No technical support
  • No software updates
  • No security updates

Businesses who do not upgrade might think they are saving some money now, but may have a far bigger and more expensive problems coming.

Windows 7 end of life countdown:

adult-computer-connection-2696299
PC stressed

END OF LIFE IS COMING.

Don’t get caught without support. Update your operating system and server before time runs out for Windows 7 and Server 2008.

Call Today

WHAT DOES THIS MEAN FOR SECURITY?

Procrastinating the upgrade will leave your company’s systems weak and vulnerable to data breaches, liability issues and other cyber threats. Any new vulnerabilities will remain vulnerable. Operating systems and servers need to be continually updated to stay secure. Without updates, patches, and bug fixes, your environment will be exposed to cybercriminals who will exploit vulnerabilities.

Not upgrading your Windows environment will expose your company to external threats. Hackers are waiting for companies who don’t migrate from Windows 7 after the end of life date and are no longer supported or secure. Don’t be tempted to try to save a bit of money and be at risk for a situation that is preventable… because it could end up costing an unpredictable amount!

WHAT DO YOU NEED TO DO? MAKE PLANS TO UPGRADE FROM WINDOWS 7 AND SERVER 2008.

You now know that Windows 7 and Server 2008 will not be a safe product to use after January 14, 2020. If you haven’t already done so, it’s time to start preparing your business to get upgraded. For businesses, we recommend using an IT professional, like us, to ensure everything is working properly and upgraded correctly.

  • Develop a budget & plan to replace or update your computers and servers before 2020.
  • Call us for an inventory evaluation.
  • Act now…time is moving fast and we want to help you before it’s too late.

If you don’t know where to start, we’re here to help. As a trusted technology adviser, we are actively helping companies upgrade their Windows environment with a seamless process and affordable rates to accommodate their budget and time frame. Contact us today to see how we can help you transition your Windows environment to be more secure and better protect your business.

hourglass background
May 31 2019

Tech Bit: Windows 7 EOL

jacobw Uncategorized 0

What Does Windows End of Life Mean to my Business?

You’ve all heard the panic. Windows is cutting off support for its widely popular version 7 software. January 14, 2020 will officially mark Windows 7 End of Life. Many companies have used Windows 7 since it launched in 2009 and are still actively using it today. So, what’s the big deal? Can you just stick with Windows 7 or will your computer self-destruct?

The good news is that your computers will work just fine after the End of Life date. However, just because your computer will function doesn’t mean it’s wise to hold onto outdated software. The largest concern for Windows 7 users is security. Since updates and support will no longer be available, your device will be extremely vulnerable to cyber threats. In fact, this is a bit of a hacker’s dream. They are standing by, knowing people will neglect to update their operating system.

Windows 7 is actually already in its ‘extended support’ phase and has been since 2015! Microsoft ended mainstream support including new features and warranty claims. Yet, throughout this time, Windows has kept virus patches and security bug fixes up to date. With End of Life, that will go away. IT and security experts alike strongly suggest migrating your operating system to something current before the Windows EOL date. Theoretically, you could pay for Windows 7 extended support on each individual device, but the costs will build up faster than simply migrating. Not only that, but specific security and bug fixes will also be more expensive and charged on an individual basis.

Currently, there are a few options to choose from when it comes to Windows 7 EOL. Don’t be tempted to go to Windows 8. Though it is a newer version, it’ll only be a matter of time before you need to migrate all over again. You should transition to Windows 10. Depending on when you purchased your computer, you might be eligible for a free upgrade to Windows 10.

It’s important to begin working on this migration as soon as possible. Please reach out to us so we can take a look at the devices you are using, determine how many are utilizing Windows 7, and ensure your hardware isn’t out of date. Not all computers will be able to handle a new operating system, which could make a migration take much longer, more difficult, and costlier as you upgrade hardware. We will provide a recommended path for an upgrade with a clear budget and timeline for completion.

Overall, take some time to plan your transition. Talk to us if you need additional help or options. Most of all though, get moving now. EOL will be here in no time.

(featured image rights to TDM Group)

Email - Fraud - Phishing
May 3 2019

Tech Bit: Phishing Pt. 2

jacobw IT blog, Email, IT, Network, phishing 0

 

As technology evolves, so do phishing attempts. This makes it nearly impossible to prepare for all types of phishing attacks. In this post we will break down 2 forms of popular phishing attacks and the best way to combat them.

 

 

Breakdown of potential phishing attacks:

 

Credential Stealer – An attacker will make a convincing clone of an existing webpage such as a Google account login screen or Facebook login screen. The idea behind this clone of a webpage is to have a victim enter their credentials (username/password) giving the attacker access to their account. Some popular examples of this attack are account verification, sharing files on the cloud, and package delivery. All of them revolve around receiving an email marked with apparently legitimate indications it is from a real company or organization such as Amazon, Google, or UPS. All 3 examples share the same purpose of luring you to enter your login information giving access to the hackers.

Malicious attachments – In our Increasingly technology-based world, it is more likely that companies you use regularly will contact you via email. Examples such as your bank, Google, or even your anti-virus service providers. This gives hackers a whole new opportunity to attack you based on specific services you use. Hackers create emails nearly identical to the ‘Credential Stealer’ emails, with one major difference: They come with a malicious attachment. These attachments may include fake reviews of your recent bank activity. Once you click to the see your bank activity in this malicious attachment your computer can be infected with viruses or malware.

 

Credential Stealers and Malicious Attachments are just two attack methods. Targeting methods used by hackers include the following:

 

Vishing – Refers to phishing done over phone calls. Since voice is used for this type of phishing, it is called vishing → voice + phishing = vishing.

Smishing – The user is targeted by using an SMS (short message service) alert.

Search engine phishing – Refers to the creation of a fake webpage for targeting specific keywords and waiting for the searcher to land on the fake webpage.

Spear Phishing – Unlike traditional phishing, which involves sending emails to millions of unknown users, spear phishing is typically targeted in nature, and the emails are carefully designed to target a particular user.

Whaling – Similar to spear phishing, expect whaling targets a more specific and confined group. Whaling is more focused on “landing the whale” and targeting higher level executives, while with spear phishing anyone from the top or the bottom of the company is at risk.

 

 

Phishing schemes will continue to develop and update as does the surrounding technology, but there are ways to prevent the attacks described above:

 

The most significant thing you can do to ensure your business is taking the correct steps against phishing attacks is working with a trusted MSP. With how impossible it may seem to stay up-to-date with threats regarding technology is where your MSP should step in and be your knowledgebase for technology. Phishing prevention and protection requires a multi-layered solution. A full stacked solution can consist of a plethora of things such as scans, phishing tests, monitoring, and much more. These solutions can be custom tailored to fit your business as no business is 100% the same as another. Phishing hackers won’t care whether you are a small or large business. They will target their victims without discrimination.

Like any other security risk, it’s better to act proactively to phishing rather than reactively. Contact us today at (260) 482-2844 to begin the process of tailoring a solution specifically for you.

 

Our simple process to get your business secure:


1. Discovery – An initial meeting to learn more about your organization and what you do.
2. Assessment – Our engineers examine your network and policies to learn how to best project you.
3. Implementation – We deploy our solution designed specifically for your organization followed by exceptional ongoing service.

 

Thank you for reading!

Citations:
Preethi. “14 Types of Phishing Attacks That IT Administrators Should Watch For.” SysCloud Blog, 8 Jan. 2019, blog.syscloud.com/types-of-phishing/.

Slavin, Brad. “Top Phishing Email Attacks Worldwide in 2018.” DuoCircle, 12 Feb. 2019, www.duocircle.com/phishing-protection/top-phishing-email-attacks-worldwide-in-2018.

Wright, Jordan. “The Trouble with Phishing.” Duo.com, Duo Security , 2016.

Click below for part 1 on Phishing

Click Here
  • Facebook Facebook
  • Linkedin Linkedin
cyber security cybersecurity device 60504
March 18 2019

Tech Bit: Phishing pt. 1

jacobw IT

Network security’s importance continues to grow with the ever-evolving technology industry. Ensure your network is secure ahead-of-time instead of waiting until disaster strikes. Protecting the IT infrastructure within your business increases the reliability and safety of the business. Threats to your business can come in forms such as viruses/malware, phishing attacks, password attacks, or a denial-of-service (DoS) attack, and new attacks are being created regularly. All of these will cause more than just a headache for your IT department and could end up costing your business time and money.

Phishing is one of the most common threats hitting organizations. A phishing scam is when an email is sent in an attempt to get a response in order to gain information; such as a username and password. Phishing works because email, like physical mail, is built to assume that the sender is whom they claim to be.

Typically, the scammers will attempt to create a great amount of fear or panic in a potential victim by saying things such as “an attempt to login to your email was made from some [insert random city] click this link below to reset your password”. When someone reads that tag line from an email and sees legitimate looking aspects to the email, such as a Google logo displayed on it, they are more likely to believe it without even checking the website address.

Phishing is common because it is easy to create these fake emails and it has continued to grow in recent years. According to Webroot, a company that specializes in end-point protection, over 1.5 million new phishing sites are created each month. Since a clear majority of phishing attempts come through email, anyone with an email account is a potential target for these attacks. Just because you have not been targeted yet does not mean you never will.

Here are a few things to keep in mind if you don’t believe the effectiveness of a phishing scam attempt:

• According to Cybersecurity Ventures, a world leading research group in the global cyber economy, Ransomware damages are now predicted to cost the world $11.5 billion in 2019, and $20 billion in 2021.

• According to Intel, 97% of people around the world are unable to identify a sophisticated phishing email.

• According to Cisco, 31% of people click the phishing links. Cisco saw that 17% of users enter their credentials into the phishing site as well.

Again, these attacks happen because they work. Phishing is effective because of how easy it is to send out massive amounts of emails. Sending large amounts of emails significantly increases the odds of someone clicking the link and entering their information.

Want to learn more about phishing? Give us a call at 260.482.2844 and make sure you keep an eye out for more information as this is just part 1 of our 2-part blog posts on phishing. Part 2 will go more in-depth over the specific types of attacks that people are using and what steps you should take to protect your business.

Thank you for reading!

  • Facebook Facebook
  • Linkedin Linkedin
ATG Logo symbol ONLY 443 x 275
January 7 2019

Welcome Blog

jacobw IT, Phone System, Security System Fort Wayne Indiana, Information Technology, Northeast Indiana 0

Starting in 2019 Applied Technology Group will be creating a blog. This blog’s main purpose will be to provide an informative resource on what is happening in the world of technology. If you are not familiar with us as a company we provide multiple services revolving around the tech space. We primarily do IT support, phone systems, and surveillance/security systems. We are conveniently located in Fort Wayne, Indiana on Coliseum blvd. just next to Metal X. Since 1996 we have been serving the Fort Wayne area with quality, reliability, and service in mind. Be on the lookout for our upcoming blogs that will be highlighting relatable tech topics!

Back To Top
Applied Technology Group Inc.
  • Facebook
  • Linkedin
  • Home
  • About
  • Sitemap
  • Support
  • Schedule Your Network Assessment
Fort Wayne, Indiana:
260-482-2844
Monday-Friday 8:00-5:00
Indianapolis, Indiana:
317-759-2062
Monday-Friday 8:00-5:00
Lima, Ohio:
419-549-5599
Monday-Friday 8:00-5:00