We are upgrading the reliability and redundancy of our network

Understanding that high network reliability is the lifeblood of our clients, we are implementing network upgrades in a series of maintenance windows starting this August and lasting through September 2018. Why more than one maintenance window? Best practice mandates minimizing introducing too many variables at one time. In fact, over the past two decades, Hostirian has systematically implemented strategies to keep pace with technological advances.

“Our network is continually evolving in order to effectively maintain a redundant network with no single point of failure,”  said Dakota Jones, Hostirian’s Director of Network Operations.

To accomplish this with minimal disruption to our clients, we routinely schedule an orderly and well-prepared series of maintenance windows during time frames outside of peak business hours.

“Our goal,” according to Sascha Wintz, Vice President of Hostirian, “is to maintain a scalable and highly reliable network according to current standards.”

As always, we’re here to help 24 x 7 x Forever. Our support staff is physically located in the data-center so if you have an issue with your service, we are here to help you resolve that issue immediately. You do not have to wait or play phone tag to get ahold of someone who can actually help you with your problem.

 

Cyber Security Month – 5 Tips for Better Cyber Security

October is Cyber Security Month, a notion that Hostirian holds very near to our hearts. Cyber Security is at the crux of what we believe in, and sentiments for stronger security are ones we strongly align with. Of course, there are many ways for one to go about ensuring they are secure, and it’s highly recommended that one takes the time to review just how safe they are and how safe they can be – in the meantime, we’ll start with 5 important tips for making sure you are on the right track to being safe and secure online:

  1. USE STRONG PASSWORDS
    I’m sure we’ve all read this one time and time again – told it even more times, yet it can’t be said enough. Password security is pivotal for cyber security, and by far the easiest to manage, but often times the most vulnerable. Remember, your passwords aren’t just meant to be bits of memorabilia for fond memories or a relative’s birthday, they are your protection from letting random people access your data. Make sure you are using a relatively complex password, and if need be are storing it in a secure location in case it has slipped your mind (albeit, having a hint rather than the password outright is far more advisable).
  2. KEEP YOUR SOFTWARE UPDATED
    This one is as simple as it comes, and should be the easiest to keep track of. Often times, the software companies and teams are finding the vulnerable spots in their apps, and are constantly providing updates when they do to ensure they are putting out a safe product. Don’t overlook these updates!
  3. USE ANTI-MALWARE/ANTI-VIRUS PROTECTION
    Another common bit of advice, but just because it’s common doesn’t mean it isn’t important. Being safe and cautious won’t do you as much good if you aren’t also making sure you have those slips and cracks covered, and that’s where your anti-malware and anti-virus software come in handy, but which ones should you be using? It’s not as straightforward of an answer as some might make it seem, as some software offer different versions that cover more or different malware than another, so really it comes down to what your needs are. I’ve found that this write-up offers a great breakdown on what each company offers and what their software scans for, and be the perfect starting point for you if you are shopping for anti-malware/anti-virus products.
    To make sure you are fully protected, even when using anti-malware/anti-virus software, we also heavily advise having two security software. Have one to run in the background, and another to have ready for any on-the-spot moments to make sure nothing might have been overlooked or managed to slip its way through. Just remember to disable the one you have running in the background, lest you risk them interfering with one-another.
    Footnote: Make sure you are also using a Firewall and keeping it updated as well. You can never be too safe.
  4. BE WEARY OF ATTACHMENTS AND DOWNLOADS
    This one is going to mostly be related to your email usage, but it is by no means less important. Attachments and downloads are what most people recognize malware as, and they aren’t wrong for doing so. People are getting more creative in the malware they put-out, but email has still remained an effective means for them to do so. When you go to open an attachment, make sure you are aware of the source, the purpose of the attachment, and that you are expecting it. One of the biggest trends of late is spoofing – where someone will send an email under what appears to be another’s email address. This allows them to cover themselves up as, say, someone from your own contacts list, in order to gain your trust in what they are sending you. If you receive a suspicious email from someone you know, check with them to make sure they really did send it before opening.
  5. KEEP ALL IMPORTANT DATA BACKED UP 
    Last, but certainly not least, back. up. your. stuff. Humans are infallible, and sometimes mistakes happen. Maybe it was on your end, maybe it was on the company behind your anti-malware, maybe it was neither…either way you should always be prepared and be ready to get all of your data back up (pun absolutely intended) in case something does end up happening. I’ve said it once here, I’ll say it again: you cannot be too safe. Even if it only happens once, even if it never happens, the investment in making sure all your data is secure for you is definitely greater than the risk of losing it all.

-Trevor Newman

Improving your Business Security with Colocation

With market research estimating a drastic increase in demand over the next few years, managed service providers are working very hard to make sure that their colocation services are up to par with market competitors, resulting in better security and features for businesses looking to outsource their IT infrastructure. With the anticipated increase in demand comes an increase of malware and cyber attacks. This has significantly influenced managed service providers to work on increasing the quality and robustness of their services. 

Colocation can improve a company’s security capabilities in several ways.

  1. Preventing physical access
    1. Gone are the days where companies hold their servers in their closets, causing an increased risk of security. MSP’s that offer colocation can focus more resources on security and provide solutions that can go a long way toward supporting data protection goals.
  2. Avoiding data loss
    1. With cyber attacks anticipated to significantly increase over the next coming years, data backup and prevention is more important than ever before. Colocation providers can offer redundant power and network systems, facilities built to withstand natural disasters and relatively easy access to backup resources.
  3. Network Security
    1. Colocation providers offer customers a secure network link between the third party data center and corporate headquarters. This adds a layer of protection from hackers and other threats. Colocation data centers also are physically off the premise of the business, making them well protected from physical wiretaps.

A company looking to grow and sustain success in the current and future state of the marketplace will undoubtedly come to a fork in the road with their IT infrastructure. It is likely that businesses will need to make decisions on whether or not they can keep their IT in house, and deal with the overhead that comes along with that, or if they will work with a managed service provider that will manage and provide consistent security and upkeep of their important data files. Protection against cyber attacks and outsiders will continue to rise as technology advances, forcing businesses  to fully submerge themselves into the digital age. So our advice to businesses? Invest in your IT, and hire a provider that knows what they are doing. 

 

About Historian:

Hostirian is a global market managed service provider, specializing in colocation, website hosting, social media management, and custom web/software development.  The company’s dedication to the industry, and their clients have given them the honor of working with some of the largest companies in the market. Hostirian’s team of developers, techs, and executives are dedicated to protecting and managing all things IT so that their client’s can focus on what matters.

Hostirian provides complimentary audits of businesses IT infrastructure. The strategy that Hostirian develops for each client is unique to the specific needs and goals of the respective company. Get in touch today.

WannaCry, The Most Severe Malware Attack of 2017… so far.

WannaCry ransomware is a new Trojan virus malware that has swept the global marketplace by force this past week. Security researchers have estimated that about 57,000 computers in more than 150 countries were infected by the end of the day on Friday.

As of this morning (Monday May 15th) the WannaCry virus has infected more than 200,000 systems around the world, and it doesn’t look to be stopping anytime soon.

Our security system team has been tracking the developments of this malware, and are hoping that a solution will ensue very shortly. We put together the top five things you need to know about the WannaCry Ransomware and why our DataVault back up solution will help prevent you from becoming a victim. Sign up today for a 30 day complimentary risk free DataVault solution trial to protect your business from ransomware.

  1. Ransomware is a type of Trojan virus that holds your computer’s files hostage, with the ability to completely wipe out your entire data at any moment’s notice.

There are many types of malware that can cause severe damage to your computer system. One type of malware that can negatively affect your computer is ransomware, this type of virus, like WannaCry will encrypt most or even all of the files on a user’s computer. The software will then demand that a ransom be paid in order to have the files decrypted. If the ransom is not paid, then the software can delete all of the encrypted files on the computer.

  1. WannaCry will increase the ransom amount if it isn’t paid within 3 days.

The WannaCry ransomware will demand that the victim pay $300 in bitcoins at the time of infection in order to decrypt the files. If the victim does not comply within three days, the amount will double to $600. After seven days without payment, WannaCry will delete all of the encrypted files and all data will be lost.

  1. The malware will install a text file on the user’s desktop with the following ransom note.

  1. There is NO cure for an infected computer, the user will need to pay the ransom to decrypt their files.

Antivirus companies and cybersecurity experts are hard at work looking for ways to decrypt the files on infected computers. As of today there is no way of decrypting an infected user’s files beside complying with the malware’s instructions. It is highly advised to install any and all available security updates immediately. Specifically windows users that run Windows XP, or Windows 8. If there is confusion on what immediate steps you should take to protect yourself, please reach out to our team to help walk you through the proper precautions.

  1. If your data is backed up on a regular basis, you can revert your files to the latest back up on your computer instead of paying the ransomware.

It is safe to say that every business small, medium or large should have a backup solution in place so that their data and files are protected. If a business does not have a backup they can become victims of not only WannaCry but any other ransomware that develops in the future.

This troubling malware is still running rampant over the entire world wide web, it is our job to help keep our clients and potential clients safe. Our team of system security experts have developed a DataVault solution that will back up your data in a safe and secure way to prevent such ransomware attacks from keeping your business from succeeding. Click HERE to gain access to our free DataVault solution trial that will protect you from the likes of WannaCry.