Cybersecurity Toolbox

While the attention of the world is focused on COVID-19, cyber-criminals are elevating their activities targeted towards companies, small businesses, institutions and individuals. 5NINES takes the risk of cyber-attacks very seriously. We help prevent the spread of attacks by providing education, security assessments, mitigation and other technical services to organizations of all sizes.

5NINES Cybersecurity Toolbox is an online guide to current resources and effective tools designed to help companies safeguard their assets against cyber-criminals. Start with free practices and tips to assess your current security measures or contact us today, and we will help you improve your company’s cybersecurity readiness and response protocols. Scroll down to learn more.

SECURE AND REDUNDANT INTERNET CONNECTION

Staying connected in the fast-changing conditions is vital. Our locally grown and locally owned Internet offers guaranteed high-performance Internet connection for businesses, residential property managers and dwellers. The same bi-directional speeds up to 100Mbps, consistent all day long and during peak times.

 

Main features:

  • Guaranteed high performance Internet
  • Bi-directional – up to 100Mbps
  • Flexible pricing packages | No contracts
  • 24/7 monitoring of network
  • Great customer service
  • Locally owned company that cares about its customers

Secure devices and cybersecurity training

Concern over the Coronavirus (COVID-19) has sent many employees to work from home. And now cybercriminals are more active than before using all tools available to spread social engineering scams via phishing. At 5NINES we believe educating and training your employees on cybersecurity measurements is the only method against cybercriminals. 

We’ve partnered with industry best IT and security training professionals to provide you the most effective cybersecurity tools and tips. Our Security IQ products offer 2,000+ phishing awareness resources and simulations. As your service provider, we’ll handle all aspects of employee training — including implementation, management and reporting. 

Main benefits include:

  • Prevent data breaches and other security incidents 
  • Meet and track security awareness compliance requirements 
  • Save time and money with automated course delivery, management and reporting

To learn more about the product, please contact us using the form below.

Our Free Resources and Tips

We’ve collected free resources and tips to help you start securing your company today! They are very simple and easy to implement.

Share them with your employees or use them as a template!

Click on the button to download or scroll down to continue to read.

Cybersecurity Tips

While many companies are deploying a remote work policy to comply with State and local Health authorities’ direction, protecting your company’s infrastructure integrity is paramount. This is a significant cybersecurity issue that requires your attention.  We’d like to offer some advice and recommendations as you implement your remote work policy to ensure the digital safety of your company and employees.  

Best Cybersecurity Practices for Working Remotely:

  • Use secure/encrypted communication channels such as secure VPN to access company assets.
  • Install updates regularly.
  • Disable pop-ups on home system web browsers and ensure they are updated to the most recent release.
  • Limit the download of working documents onto personal machines and/or devices.
  • Enforce proper Antivirus and Patch Management protocols
  • Deploy and enforce strong requirements for authentication.  Complex passwords and the implementation of two-factor authentication (preferably with a token device) should be required.
  • Create and distribute a work-from-home policy that highlights an employee’s responsibility to keep the security of the company and client information a top priority (e.g. we suggest companies establish a follow up phone call policy or two-factor authentication on financial or information requests made via email or chat means).
  • Lock your device when unattended. 
  • Exercise good judgement in regards to social engineering/phishing attacks. Beware of Coronavirus domains and spam email campaigns from false addresses.
  • Ensure all employees contact IT in the event of suspicious behavior on their machines.
  • Ensure that proper back up procedures are in place and are successfully executed.
  • Beware of inserting USB devices to your computer. Especially, if they don’t belong to you.
  • Keep in mind, the Center for Disease Control and Prevention (CDC) will never directly send you emails. If you received one, don’t click on any links or download any files.
  • Check URLs to see if SSL encryption is implemented (a little lock next to the URL).
  • Beware remote desktop tools.
  • In public places turn off automatic connections to WiFi and use private browsing.
  • Secure in-home routers correctly through proper configuration.

1. Do not click on hyperlinks in emails
A lot of attackers will mask a harmful webpage up by hiding it under a hyperlink. If an email is instructing you to go to their website for any reason, go onto that company’s website directly by searching for it in the address bar. 

2. Verify any request via phone or in person
Some attacks are carried out by attempting to ask the user to send money or information through email. These methods can pretend to be another company as well as an insider executive (e.g. a CEO). To prevent this, it is best to call the company directly or talk to the person who is requesting the receiver’s input in a way that you can verify them. 

3. Disable pop-up notifications 
Pop-up phishing is a tactic where cyber criminals deploy pop-up messages that may encourage the user to call a scam service, direct them to a fraudulent website, or prompt them to put in personal information. These pop-ups can even infect usually legitimate websites. The best way to combat this is to disable pop-ups all together. 

4. Have an antivirus software installed and up to date 
While avoiding risky websites and staying away from anything suspicious is best practice, there is always a possibility of the user being tricked in some way. To avoid the computer from being infected with malware, an antivirus should be in place and regularly updated to catch any malicious code. 

5. Keep up to date on current phishing attempts 
Scammers and attackers utilize current trends and headlines to draw their victims in. Understanding the methods attackers use as well as overall templates/buzz words can help in knowing what to be more cautious with while online. 

Anti-Phishing Best Practices

As many companies are instructing their employees to work from home, online threats are becoming more frequent. The easiest and most used method these threats use is done through social engineering via phishing. This is done through email as well as webpages and attempt to trick the user into thinking the information is legitimate. Attackers can also put malware onto the users’ computer, ciphering more information from the device. We’ve gathered some of the best practices to keep in mind during this time to keep you and your business well protected from these attacks. In addition, 5NINES offers Security IQ phishing awareness products to maximize your protection from cyber criminals. 

Anti-Phishing Best Practices

As many companies are instructing their employees to work from home, online threats are becoming more frequent. The easiest and most used method these threats use is done through social engineering via phishing. This is done through email as well as webpages and attempt to trick the user into thinking the information is legitimate. Attackers can also put malware onto the users’ computer, ciphering more information from the device. Here are some of the best practices to keep in mind during this time to keep you and your business well protected from these attacks. 

1. Do not click on hyperlinks in emails
A lot of attackers will mask a harmful webpage up by hiding it under a hyperlink. If an email is instructing you to go to their website for any reason, go onto that company’s website directly by searching for it in the address bar. 

2. Verify any request via phone or in person 
Some attacks are carried out by attempting to ask the user to send money or information through email. These methods can pretend to be another company as well as an insider executive (eg. A CEO). To prevent this, it is best to call the company directly or talk to the person who is requesting the receiver’s input in a way that you can verify them. 

3. Disable pop-up notifications 
Pop-up phishing is a tactic where cyber criminals deploy pop-up messages that may encourage the user to call a scam service, direct them to a fraudulent website, or prompt them to put in personal information. These pop-ups can even infect usually legitimate websites. The best way to combat this is to disable pop-ups all together. 

4. Have an antivirus software installed and up to date 
While avoiding risky websites and staying away from anything suspicious is best practice, there is always a possibility of the user being tricked in some way. To avoid the computer from being infected with malware, an antivirus should be in place and regularly updated to catch any malicious code. 

5. Keep up to date on current phishing attempts 
Scammers and attackers utilize current trends and headlines to draw their victims in. Understanding the methods attackers use as well as overall templates/buzz words can help in knowing what to be more cautious with while online. 

Remote Management Tools

5NINES Managed Services offers Remote User Management and Setup Plan of $20 per user/month plus one-time set-up fee of $100.  This includes our 7×24 call center, asset tracking, monitoring & security, configuration management, anti-virus protection and regular patch updating.

To learn more about the product, please contact us using the form below.

Microsoft Teams & Office 365

Microsoft Teams & Office 365 is easy to get, but utilizing all its features takes skill. 5NINES can train you and your team how to leverage these tools in order to keep remote work productive and engaging.

What is Microsoft Teams – quick introduction video about MS Teams 

Security and compliance in Microsoft Teams – learn about MS Teams-specific information security and compliance

Work remotely with Office 365 – get started with MS informative video on Office 365 features 

Top tips for working more securely from home – learn how organizing your workspace, keep your data secure, and better communicate with your coworkers 

Interested in setting up MS Teams or Office 365? Please fill out the form below and we will contact you shortly.

Secure data backup for Microsoft 365

Mail Assure and Veeam Backup for Microsoft Office 365 will protect your emails from phishing, malware and spams. All your emails, calendar, contacts, files on SharePoint and OneDrive are automatically backed up and secured against data and access loss.

Why do I need Mail Assure?

  • real-time threat recognition with build-in anti-phishing protection
  • 24/7 email continuity
  • encrypted, long-term email archiving for unlimited period
  • seamless and easy integration with Microsoft 365®, Microsoft Exchange®, Google® G Suite® and other email tools

Visit our link below to learn more about Mail Assure and how it can benefit your organizations.

Why do I need Veeam Backup for Office 365

  • protect your data from accidental delition, security threats and retention policy gaps
  • store and backup your data on premises or in the cloud
  • restore individual Office 365 emails, sites and files from SharePoint, OneDrive, Exchange, Microsoft Teams
  • meet compliance requirements with flexible recovery and export

To learn more about the product, please contact us using the form below.

Our Services include

l

1. Assess

 

Comprehensive Vulnerability Assessment

Evaluate small business network scope and needs while providing accurate vulnerability assessments.

~

2. Protect

 

Mitigation

Apply lessons learned within the assessment to build a plan and develop processes to strengthen security footprint.

3. Manage

 

Managed Services

Execute planned initiatives, report results, and fight against complacency.

Get an IT Partner You Can Trust

EMAIL
inquiry@5nines.com

PHONE
608.512.1000

ADDRESS
316 West Washington
Suite 600
Madison, WI 53703

Security Partners

Verified By: