EXPERTLY MANAGED PROFESSIONAL SERVICES UNIVERSITY BLOG CONTACT SUPPORT Login

How can we be of service to you?

Relationships are everything in life and we've been lucky to have created unique and lasting relationships with people and organizations from all walks of life around the world. This gives us access to sources not readily known or overlooked, much less accessible to most. These relationships generate inordinate amounts of information which is parsed to form the basis of our threat intelligence. 

Kontinuum's ability to gather information and formulate threat intelligence has taught us many lessons, one of which is how to help secure those we serve from what can become insider threats or picking up on the cues of shifting alliances and double dealing which let the bad actors inside the wire. Mind you, no system/solution is infallible, which is why security and vigilance, like a relationship must constantly evolve.

Our end goal is to help you work effectively and securely without being intrusive to you or your processes, preferring to be quiet operators. If on the other...

Continue Reading...

Reimagining the modern office.

I read an article this morning which lead me to writing this post scratching the surface of the distributed office/workforce, costs and the redistribution of some of those costs. 

Over the last eight plus weeks we have seen many of our clients successfully move jobs/tasks to a work from home environment. However, we have also seen some of our clients unable to pivot certain jobs/tasks to a a work from home model. After all, the prep-chefs in our restaurant group clients can't operate from home, no matter how bleeding edge their technology.

No is no one size fits it all for work from home.

What does all of this mean? We created a working group with representatives from some of our clients and  "sat down" (i.e Microsoft Teams meetings) with them to establish a framework for analysis. 

First, this framework lead to calculating the cost of each employee and each office location down to the penny. There was to be no margin for error. We opted...

Continue Reading...

Honesty is an expensive gift.

All too often, price is the defining factor in our industry without considering the opportunity cost of lesser solutions. What does this mean to you and why should you care?

Eight plus weeks ago you went remote, your ability to Work From Home (WFH) was put in place when you initially hired us, your business processes and procedures have not had to be augmented to work from home, your office locations have been in stasis waiting for your return. You have peace of mind knowing every aspect of your IT systems continue to be monitored, managed and secured no matter the location.

Great, you're set up to live your purpose!

In my opinion, you've accomplished the following;

  1. You've identified your core business needs;
  2. You've set your business up for success;
  3. You've developed a comprehensive business continuity plan that has shown to work, scale and evolve;
  4. You've stayed in business while maintaining productivity, even gaining new business;
  5. You've demonstrated to clients your ability to...
Continue Reading...

It is better to be a warrior tending to a garden than a gardener in a war?

be prepared security Apr 01, 2020

I use this phrase to enforce why I must stay in shape physically and mentally. If I am able to conquer the harder things, I may be more prepared to deal with the easier.

A battle is not relegated solely to the physical, the "enemy" might not be as obvious as one may assume. How many people do you know, yourself included, battle addiction or a psychological condition? How about more benign battles, like those in the office or at home? And then there’s the obvious question: do you know how to fight?

The hubris of that statement made my head spin. Aren’t we all fighting battles at any given time? Battles others know nothing about? Aren't we all warriors?

Next, we ought to deal with the fact that most of the fights one undertakes throughout a lifetime are rarely physical and/or violent. I say this with the understanding that it only takes one violent encounter to put your life in peril and that you should prepare for those as well. But I will let others tell you how to do...

Continue Reading...

Life lessons from social distancing.

If I’ve learned anything these last few days, it’s that human connection feeds our soul. We’re human, we crave being around other people, and pets of course.

No one knows how long we’ll have to distance ourselves. But the beauty of remote access and collaboration tools is that we can stay connected through the internet.

Let's keep that human connection.

You’ve got a lot on your mind right now and I get it. I only share this because I know you’re serious about your business. Now is always the time to focus on what matters: serving others in the best way you know how. Have us build out that remote workforce option for you. The world hasn't stopped, let's create that future for yourself that you’ve always wanted.

When you started out, you wanted to help people. And today, despite all that’s happening, you can still pursue that dream and build something even bigger than you thought possible. 

Progress is still happening....
Continue Reading...

Anatomy of a PHISH.

phishing security Mar 15, 2020

In these uncertain times, we must all be vigilant. Moments ago I received this text message from something purporting to be "Chase".

ARROW 1: The first things that stood out was the the url www[.]mobile05-chase[.]net

This is a fragmented URL, which means they are hoping you focus on the last bit chase dot net and assume its real, in hopes you enter your credentials for them to harvest.

ARROW 2 above shows the actual URL which of course is not chase.com.

Here you are asked to enter your Username, Password and Phone Number. Once you submit on this page, they now have your credentials and your phone number.

NOTE: the links at the bottom seemingly go to legitimate CHASE pages.

The image above is a screenshot of the next page asking you to enter the MFA code you just got on YOUR phone, because they tried logging in with the credentials you just entered.

By entering the code you received here, you will now allow them to successfully log in to your Chase account.

Once you enter the code...

Continue Reading...

Is tele-medicine secure?

Fear mongering and cautious optimism have likely been the drivers behind IT expenditure in recent weeks. I'd wager few of those dollars were allocated to securing this "new work from home" bug that has bitten everyone. 

Aside from the health risks, COVID-19/Coronavirus has demonstrated and/or revealed the wanton disregard for IT security in the global workplace. No where more prevalent than HIPAA related entities. This lack of importance placed on proper implementation and maintenance of IT systems to support a medical practice has exacerbated security issues over time. 

The usual justifications I hear are merely excuses underpinned by budgetary and time constraints. Does this absolve a practice owner from the inherent responsibility to their patients? My answer to this is, if you can't do it properly, don't do it at all.

Modern cyber threats are quickly changing, complex and difficult to prevent. This problem is compounded by the reality that most...

Continue Reading...

Cyber Hygiene

Practices for Organizations

Take any necessary steps to secure systems that enable remote access, such as:

  • Test the current capacity of secure remote access solutions and increase the capacity if necessary.
  • Ensure that business continuity plans are up-to-date.
  • Increase the awareness of IT support mechanisms for employees who work remotely and clearly outline the steps to take in the event of a security incident.
  • Update Incident Response plans to consider workforce changes in a distributed environment
  • Ensuring Virtual Private Network (VPNs) and other remote access systems are fully patched.
  • Enhancing system monitoring to receive early detection and alerts on abnormal activity.
  • Implementing multi-factor authentication (MFA).
  • Ensuring all machines have properly configured firewalls, as well as anti-malware and intrusion prevention software installed.

Practices for the Workforce

  • Review Tips on Avoiding Social Engineering and Phishing Scams for more information on recognizing and...
Continue Reading...

Our unwavering commitment to our clients.

For immediate release;

As we continue to monitor Coronavirus (COVID-19) developments closely, the health and well-being of our people and you, our clients is of utmost importance to us.

As a critical component to your business, we understand that limiting any impact this health event could have on our service to our clients is imperative. We are acutely focused on our efforts to maintain a safe work environment for our employees and to sustain our business operations.

Security, safety and well-being are integral to our products, business processes and infrastructure. We have a robust and integrated Business Resiliency Program in place, managed by a dedicated team committed to keeping our operations running smoothly so that we can provide you with the best possible service.

As such, we have activated our Business Resiliency Plan, which includes:

  • Enabling work from home capabilities
  • Deploying a strategy to coordinate delivery of services and support to our clients
  • Providing our...
Continue Reading...

When we do I.T., it's art in motion.

The future is here, are you ready?

I challenge the status quo to disagree that mobility and remote workers don't present the identical security concerns as those working in the confines of the "office".

Oh, you have security in place? That's cute. Have the steps you've taken towards your little version of security been reactive or proactive?
In our travels, we have seen very few organisations being proactive in their efforts to mitigate security breaches. No matter how manual your processes are, you cannot operate without computers and the inherent risks associated. You have to be on top of your game everyday, the hacker just needs to succeed once.

Today's digital user eats, breathes and sleeps via internet connected devices, most of whom are blissfully unaware of how they are being tracked. They have more notifications than the Pentagon (probably not, but you get what I'm saying). Whether you're ready to accept it or not, if your employees are checking email and...

Continue Reading...
1 2 3 4
Close

75% Complete

Two Step

Enter your name and email address below to receive updates from us.