• IT intelligence from a national leader.

  • IT intelligence from a national leader.

  • IT intelligence from a national leader.

Involta Blog

Get Everything You Need at Your Fingertips to Work Remotely

Today, every company has multiple locations from which employees are working. The work-from-home mandates that have been put in place during the COVID-19 pandemic have created a scenario where employees are unable to work from one central location. However, it’s likely that location is where their files and applications that they need to do their work live. So, how do companies maintain the central location of their corporate environment, thus preserving the security, yet still give their employees what they need to do their job remotely?

read more...

The Power to Work From Home

Most of the American workforce is facing a new normal: work from home. Prior to the onset of COVID – 19, statistics showed that only 5 million employees (3.6% of the workforce) were working from home half-time or more [Global Workplace Analytics’ analysis of 2018 American Community Service (ACS) data].  As employees and companies adjust to temporary regulations due to the outbreak of COVID-19, the majority of the workforce is finding themselves working from home. As they settle into this new routine, many companies are quickly realizing that they don’t have the right tools in place for employees to be successful. Luckily, work-from-home technology development has far outpaced its real world use.  Right now, the single best thing for every person who is forced to work differently is to take the initiative to use the great technology that is available. If given the right tools, your employees can become empowered like never before and continue to add value in driving your business forward.

read more...

How to Create a Security Culture to Protect Your Company

Security is an essential but often overlooked component of a solid business strategy. From lax password habits to clicking untrustworthy links, any one person, at any level of an organization, can create weaknesses that allow a bad actor to strike. One thing is certain – businesses are under attack by these bad actors, and they are becoming more sophisticated each day.  

read more...

What is password spraying?

In recent news, password-spraying attack methods are on the rise due to Iranian hackers that go by the name of Magnallium. Although they are targeting electric utilities, oil and gas firms, and US infrastructure, any company in any industry could be impacted due to various intrusions caused by the attempts.

read more...

Preparing Your Company for Potential Cyberattacks

In the last decade, the threat of cyberterrorism has continued to grow, ebbing and flowing in response to political climate shifts and reported data breaches at global companies, including Sony, Equifax, and Marriott.

Shortly after it was reported that Iranian general Qasem Soleimani had been killed in a U.S. airstrike, these reports cycled again, concerning the threat of cyberwarfare retaliation by the second largest country in the Middle East.

It is important to understand that security threats always exist, even without increased geopolitical tensions.  Sean Williams, Director of Security at Involta, shares ways to keep your business and sensitive information more secure.

  • Train your employees in cybersecurity principles.
  • Install, use, and regularly update antivirus and antispyware software on every computer used in your business.
  • Use a Next-Gen (advanced threat capabilities) firewall for your Internet connection and regularly review firewall rules.
  • Make sure IDS/IPS (Intrusion Detection and Prevention) are enabled on the firewall.
  • Download and install software updates for your operating systems and applications as they become available.
  • Run vulnerability scans and patch and/or update vulnerable devices.
  • Monitor devices using a SIEM (Security Incident and Event Monitoring) tool.
  • Make backup copies of essential business data and information.
  • Control physical access to your computers and network components.
  • Secure your Wi-Fi networks. If you have a Wi-Fi network for your workplace, make sure it is secure and hidden.
  • Require individual user accounts for each employee, regularly change passwords and implement multi-factor authentication
  • Limit employee access to data and information based on business need, and limit the authority to install the software

It is often the basics that are overlooked in favor of more advanced security tools and techniques.  Without the fundamentals, it is extremely difficult to control overall security risk.

 

Download our white paper "9 Common Security Mistakes" to find out what you can do to avoid common mistakes.

For more information on the related Department of Homeland Security bulletin, visit their website.

read more...

The Cloud Looks Different In Pittsburgh. Involta’s Hybrid Cloud Is Reshaping the Pittsburgh IT Market.

Involta has launched its Involta HybridCloudSM services in the Pittsburgh market. These services are being provided with national expertise through Involta’s local Pittsburgh Data Center facility, an Uptime Institute Certified Tier 3 facility located in the Northpointe Industrial Park. Involta’s HybridCloudSM services include secure, reliable, and local private cloud services combined with high-speed connectivity to and management of all hyperscale public cloud services. Involta’s HybridCloudSM services have doubled in size, making it one of the fastest growing cloud services available in the market. The services now offered in Pittsburgh will help businesses move to the cloud faster and enable time to value through a high level of security, control, performance, and compliance of cloud environments. 

read more...