Welcome

Welcome to the July 2018 Edition of the Real Times

Before we get to this month’s great articles I wanted to announce that after nearly 50 years in the IT industry, John Azzinaro, our COO, retired from Real Time Consultants at the end of June. One of John’s many contributions at Real Time was that he was the driving force behind our newsletter and penned our intro each month. Please join me in wishing John nothing but health and happiness for the future!

As I “take over” the newsletter this month I want to put an emphasis on Cyber Security for your firm.

As you all know ALL electronic systems are vulnerable to attacks from many different directions. The New Jersey Business and Industry Association recently published an article that addressed Social Engineering, Phishing and Ransomware. It stated that cyber scammers can trick employees into giving up confidential or sensitive information, such as passwords or bank information. It often starts with a phishing email, social media contact, or a call that seems to come from a trusted source, such as a supervisor or other senior employee, but creates urgency or fear. Scammers tell employees to wire money or provide access to sensitive company information. Other emails may look like routine password update requests, or other automated messages, but are attempts to steal your information. Scammers also can use malware to lock organizations’ files and hold them for ransom.

Real Time now offers a Free Dark Web Scan to see if any of your users’ information has made its’ way to the “Dark Web” – What is the Dark Web? - The dark web refers to encrypted online content that is not indexed on conventional search engines. The dark web is part of deep web, a wider collection of content that doesn't appear through regular internet browsing. A specific browser like Tor is required to access dark web sites. It is a repository for illegal activity such as illegal trade, forums, and exchange. Stolen data is often repackaged and sold to other scammers on the dark web.

If you have not had this Free Scan run on your system, please contact DWScan@rtcnt.com ASAP!

Look for our next newsletter which will go more in depth on Phishing Scams and how to avoid them...


Regards.
John Iaccarino, President and CEO
  July 2018
In this issue. . .
Welcome
Tailor your digital security strategy for different departments
72-hour rule: Can you identify and report a data breach within 3 days?
Build your security immunity with an IT infrastructure checkup
Business Continuity Tip
Just for Laughs
 

Real Time Contacts
201 512 1777

John Iaccarino, CEO - 
x1031

Mike Van Pelt, CTO
x1017

Bill Jacques, Vice President -
x1117

Terry Goodfellow,
Service Coordinator -
x1024

Mike Cray,
Director of Technical Services -
X1116

Bob Larsen,
Director of Managed Print -
X1057


Just for Laughs

Quote of the Month

Be yourself.
Everyone else is already taken.

Oscar Wilde

Tailor your digital security strategy for different departments
used with permission from Tektonika (HP)

There are certain digital security principles—like creating strong passwords—universally applicable to everyone in the office, whether you're an intern or an executive. But just as each department fulfills a distinct role in a business, they also require a distinct set of cybersecurity priorities and best practices.

To stay ahead of threats in an increasingly hostile cybersecurity landscape, IT needs to provide each unit with tailored training that reflects their needs. Here's what you should keep in mind.

Read more

72-hour rule: Can you identify and report a data breach within 3 days?
used with permission from IBM Big Data & Analytics Hub
by Seth Dobrin


The 72-hour rule included in the European Union's General Data Protection Regulation (GDPR) has become a major focus for businesses as they work towards compliance.

Article 33 states that breaches must be reported to the regulator within a 72-hour window of an organization becoming aware of it, and to the data subject "without undue delay" after businesses become aware of the breach.

Read more

Build your security immunity with an IT infrastructure checkup
used with permission from Tektonika (HP)
by Joe Hewitson


As a species, humans have a natural tendency to overcomplicate things. Take coffee, for example: It's gone from simple, "good 'til the last drop" black coffee to iced, half-caff, ristretto, venti, four-pump, sugar-free, cinnamon, skinny latte. You'd be hard-pressed to buy a car without a full-blown home theater experience built-in nowadays—and let's not even get started on those "it's complicated" social media relationships.

IT infrastructure and office security are no different. People tend to complicate security until they can barely keep track of all the tricks and tools meant to keep their network secure.

Read more

Business Continuity Tip
Non-Technical Security Tips for the Office

You don't need to be a tech expert in order to master security practices to keep your sensitive data safe. Here are three quick tips for improving security in your office.

1. Keep a clean desktop. At the end of every day, organize your desk, remove unnecessary papers and items, and lock documents with sensitive information (like client information and account numbers) in a drawer.

2. Shred documents before throwing them away. Make use of your office's paper shredder and make sure to thoroughly destroy any documents that have sensitive information before putting them in the trash.

3. Run anti-virus and anti-malware software. Make sure all of your devices are running protective software, even tablets and phones. If your workplace's IT department already runs and manages anti-virus on your machines, never try to disable it.
 
Real Time Consultants, Inc. | www.rtcnt.com | 201-512-1777 | info@rtcnt.com
Headquarters – 777 Corporate Drive, Suite 1, Mahwah, NJ 07430
30 Boright Avenue, Kenilworth, NJ 07033