Databranch Monthly Tech Talk
IT Solutions for the Workplace

September | 2022

What's Inside?

01 - Monthly Update from David

02 - Congratulations to Karyn!

03 - RBS and Databranch at Datto Con 2022

04 - Small Businesses Attacked 3x More than Larger

05 - Patching Vulnerabilities

Did you know:


Twitter's original 140 character limit was due to it being

originally built for SMS which only allow 160 characters (140+twitter handle with a 20 character limit) 

Congratulations to Karyn Fox on her new role as Manager of Business Services

We are very pleased to announce that Karyn Fox has been promoted to Manager of Business Services.


Karyn has been with Databranch for over a decade and has been an integral part of our service team.


In her new role, Karyn will be managing much of the business and accounting functions needed to keep our company running smoothly!

 

Please join us in congratulating Karyn on her well-deserved promotion!

RBS and Databranch at Datto Con 2022!

Members of our team had the pleasure of attending the Datto Con conference of 2022.


We are proud to be an Elite Partner for Datto, our preferred disaster recovery and business continuity solution provider.


The Datto product line includes devices with the following features: instant local and off-site virtualization, Screenshot Backup Verification, Inverse Chain Technology, Backup Insights and End-to-End Encryption. 


These products ensure our customers are not only able to recover from a data disaster, but ensure they can recover quickly with minimal downtime. 


Click here to learn more about Datto and our backup and recovery solutions.

Monthly Update from David

Time has gone by so fast these last two years!


On October 1st , 2020, Databranch joined the Repeat Business Systems team and at that time, we began implementing our transition plan.


I am pleased to say that our business has seen incredible growth and we continually seek ways to better serve our clients, especially when it concerns cybersecurity.


As part of the planned transition, I will be stepping back from my role as President of Databranch effective October 1, 2022. This is a position I have held since I started the Databranch journey way back in 1985.


I will continue to be actively engaged in an advisory and consulting capacity. Mike Wilson, our VP of operations, will be stepping up as president.


Mike has over 20 years of IT experience. He started his career as an Intern with Databranch and we were delighted to have him re-join the team as our first Chief Technology Officer (CTO) three years ago. 


Mike has played an integral part in leading the engineering team at Databranch as CTO and was promoted to Vice President of Operations earlier this year. 


We have a great team at Databranch that is committed and passionate about delivering high-quality service and solutions to our clients.


It has been my privilege to work for you! I am very grateful for your business, the trust you have placed in us and your loyal support. 


Thank you for giving us the opportunity to earn your business each and every day. Please do not ever hesitate to reach out to me if I can ever help you in any way.



Regards,

David Prince

President - Databranch

Our Extensions Have Changed!

Please note that Databranch recently conducted a phone system update which has altered our phone extensions. All employee phone extensions now have an additional 1 in front of them (extension 15 is now 115).


Hosted VoIP is the next generation of phone systems and has steadily replacing traditional communications since 2004.

Click Here to Read About Rock-IT VoIP and it's Benefits

Small Businesses are Attached by Hackers 3x More than Larger Ones

Have you felt more secure from cyberattacks because you have a smaller business? Maybe you thought that you couldn’t possibly have anything that a hacker could want? Didn’t think they even knew about your small business.


Well, a new report from the cyber-security firm, Barracuda Networks, debunks this myth. Their report analyzed millions of emails across thousands of organizations. It found that small companies have a lot to worry about when it comes to their IT security.


Barracuda Networks defines a small business as a company with less than 100 employees. They found that employees at small companies saw 350% more social engineering attacks than those at larger ones. This puts small businesses at a higher risk of falling victim to a cyberattack.


We’ll explore why below.


Why Are Smaller Companies Targeted More?


There are many reasons why hackers see small businesses as low-hanging fruit and why they are becoming larger targets of hackers out to score a quick illicit buck.


Small Companies Tend to Spend Less on Cybersecurity


When you’re running a small business, it’s often a juggling act of where to prioritize your cash. You may know cybersecurity is important, but it may not be at the top of your list. So, at the end of the month, cash runs out, and it’s moved to the “next month” wish

list of expenditures.


Small business leaders often don’t spend as much as they should on their IT security. They may buy an antivirus program and think that’s enough to cover them. But with the expansion of technology to the cloud, that’s just one small layer. You need several more for adequate security.


Hackers know all this and see small businesses as an easier target. They can do much less work to get a payout than they would trying to hack into an enterprise corporation.


Every Business Has “Hack-Worthy” Resources


Every business, even a 1-person shop, has data that’s worth scoring for a hacker. Credit card numbers, SSNs, tax ID numbers, and email addresses are all valuable.


Cyber-criminals can sell these on the Dark Web. From there, other criminals use them for identity theft.


Here are some of the data that hackers will go after:

  • Customer records
  • Employee records
  • Bank account information
  • Emails and passwords
  • Payment card details


Small Businesses Can Provide Entry Into Larger Ones


If a hacker can breach the network of a small business, they can often make a larger

score. Many smaller companies provide services to larger companies including digital

marketing, website management, accounting, and more. Vendors are often digitally

connected to their client’s systems.


This type of relationship can enable a multi-company breach. While hackers don’t

need that connection to hack you, it is a nice bonus.


Small Business Owners Are Often Unprepared for Ransomware


Ransomware has been one of the fastest-growing cyberattacks of the last decade. So far in 2022, over 71% of surveyed organizations experienced ransomware attacks.


The percentage of victims that pay the ransom to attackers has also been increasing. Now, an average of 63% of companies pay the attacker money in hopes of getting a key to decrypt the ransomware.


Contact us today at 716-373-4467 x 115 or info@databranch.com to see what options we have available to enhance your businesses security.

The Biggest Vulnerabilities that Hackers are Currently Exploiting

Software vulnerabilities are an unfortunate part of working with technology.


A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code.


The developer issues a patch to fix the vulnerability. But it’s not long before a new feature update causes more. It’s like a game of “whack-a-mole” to keep your systems secure.


Without ongoing patch and update management, company networks are vulnerable.


Around 82% of U.S. cyberattacks in Q1 of 2022 were due to exploiting patchable vulnerabilities.


Microsoft Vulnerabilities

  • CVE-2012-4969: An Internet Explorer vulnerability that allows the remote execution of code.
  • CVE-2013-1331: This Microsoft Office flaw enables hackers to launch remote attacks.
  • CVE-2012-0151: This Windows vulnerability allows user-assisted attackers to execute remote code.


Google Vulnerabilities

  • CVE-2016-1646 & CVE-2016-518: These Chrome & Chromium engine vulnera-bilities both allow attackers to conduct denial of service attacks.


Adobe Vulnerabilities

  • CVE-2009-4324: This is a flaw in Acrobat Reader that allows hackers to execute remote code via a PDF file.
  • CVE-2010-1297: A Flash Player vulnerability that allows remote execution and denial of service attacks. (Flash Player is no longer supported, so you should remove it).


Netgear Vulnerability

  • CVE-2017-6862: This router flaw allows a hacker to execute code remotely


Cisco Vulnerability

  • CVE-2019-15271: This vulnerability impacts Cisco RV series routers, and gives a hacker “root” privileges.


Patch & Update Regularly!

These are a few of the security vulnerabilities listed on the CISA list. You can see all 36

that were added at https://www.cisa.gov


How do you keep your network safe from these and other vulnerabilities?


You should patch and update regularly to ensure you don’t have a breach waiting to happen, lurking in your network.


Our Foundation Security Plan offers a wide variety of benefits such as increasing malware/ransomware protection, helps prevent data theft/loss, and patches any vulnerabilities found on your network


Contact Databranch today at 716-373-4467 x 115 or info@databranch.com if you would like to learn more. You can also request a free Baseline Security Assessment here.




Article used with permission from The Technology Press.

Technology Trivia


What do you call a company's internal network?


The first person to email us at info@databranch.com and give a correct answer gets a $25 Amazon Gift Card!

Need a Laugh?


What sound does a

mouse make?

 

Click!

If you were forwarded this email from one of our great Databranch clients and would like to receive future updates, reply to this email and we will add you to the list!

Databranch  www.databranch.com

Facebook  Twitter  Linkedin