tag:blogger.com,1999:blog-73806062073481678902024-02-19T17:30:28.402-06:00WatchGuard Certified TrainingThis blog is dedicated to WatchGuard training, coaching and mentoring which must consist of more than just technical competency, it also consists of training, coaching and mentoring the soft skills and character pieces necessary for each individual to hold themselves accountable to the highest standards of ethics and integrity, resulting in a high level of trust and a culture of ownership wherever they work, and whatever company or organization they are protecting with WatchGuard firewalls.WatchGuard Traininghttp://www.blogger.com/profile/18261747250357499981noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-7380606207348167890.post-65732120621579790512018-02-05T11:21:00.002-06:002018-02-05T11:21:46.977-06:00Important! Scam of the Week: Wave of Payroll Direct Deposit Phishing Attacks <div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 16px; margin: auto; max-width: 800px; padding: 20px;">
<div style="float: left; line-height: 12px; margin: auto; max-width: 600px; padding: 0px;">
<span style="color: #676767; font-family: "Open Sans", sans-serif; font-size: 10px; line-height: 10px;">Scam of the Week: Wave of Payroll Direct Deposit Phishing Attacks<br /> </span></div>
<div style="float: right; line-height: 12px; margin: auto; max-width: 200px; padding: 0px; text-align: right;">
<span style="color: #676767; font-family: "Open Sans", sans-serif; font-size: 10px; line-height: 10px;">Email not displaying?<br /><a data-saferedirecturl="https://www.google.com/url?hl=en&q=http://newsletter.knowbe4.com/a/1022/click/685/137325/b0b95ee283cb9cc9fc41475b777a158c4a77b943/6048395564073d71465a13cd873b39c1edf1c8c5&source=gmail&ust=1517936257054000&usg=AFQjCNHJUFGgZGW8v4KUnBDZ7F61BXgBPw" href="http://newsletter.knowbe4.com/a/1022/click/685/137325/b0b95ee283cb9cc9fc41475b777a158c4a77b943/6048395564073d71465a13cd873b39c1edf1c8c5" style="color: #f16824; text-decoration-line: none;" target="_blank">View Knowbe4 Blog</a></span></div>
</div>
<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 16px; margin: auto; max-width: 800px; padding: 40px 20px 20px; text-align: center;">
<a data-saferedirecturl="https://www.google.com/url?hl=en&q=http://newsletter.knowbe4.com/a/1022/click/685/137325/044ac0b3da603dc543019ea4b8f92228baf8fbe8/6048395564073d71465a13cd873b39c1edf1c8c5&source=gmail&ust=1517936257054000&usg=AFQjCNGDBtNrHJIcKSxCkee8IMtTrG2_Gw" href="http://newsletter.knowbe4.com/a/1022/click/685/137325/044ac0b3da603dc543019ea4b8f92228baf8fbe8/6048395564073d71465a13cd873b39c1edf1c8c5" style="color: #1155cc;" target="_blank"><img align="center" class="CToWUd" src="https://blogger.googleusercontent.com/img/proxy/AVvXsEj6uYSsHvBM0DtIHz2eL9KPOgh5tYdcmUoZ9TXG0s-8BseHZkzL2qBm-OLEXc24YZidwDXZvdXgYj84-ixJwjGV5ggdW2ef7a-BOm7Xq9aRyGkjBzpHbQP1KdsmY9aKgHuDEN9WGyo47mg4VfOxc8suMzsKvYdkAoI=s0-d-e1-ft" style="width: 800px;" /></a></div>
<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 16px; margin: auto; max-width: 800px; padding: 0px 20px; text-align: center;">
<hr style="background-image: linear-gradient(to right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0)); border: 0px; height: 1px;" />
<span style="color: #676767; font-family: "Open Sans", sans-serif; font-size: 14px; line-height: 14px;">CyberheistNews Vol 8 #06 | Feb. 5th., 2018</span><hr style="background-image: linear-gradient(to right, rgba(0, 0, 0, 0), rgba(0, 0, 0, 0.25), rgba(0, 0, 0, 0)); border: 0px; height: 1px;" />
</div>
<div style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 16px; margin: auto; max-width: 800px; padding: 20px 20px 40px;">
<span style="color: #f16622; font-family: "Open Sans", sans-serif; font-size: 24px; line-height: 30px;">Scam of the Week: Wave of Payroll Direct Deposit Phishing Attacks</span> <span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;"><img align="right" class="CToWUd" src="https://blogger.googleusercontent.com/img/proxy/AVvXsEiv-vlOJ0d7DKHt53esmaVC_VogpXIUV7gv19gXO79Uil1ejVRSnpklpHrvNCFcrGsLtWv00L5h38vkzzqG0X7oW8XB3nqZLbK9s4EWbXOOAVxYIaC3FZgkAuctDk7cXHYkS-oEKyfbEXNnMEH597h1bReiC0Vx3A=s0-d-e1-ft" style="padding: 20px 0px 20px 20px;" width="144" /><br /><br />Lexology had an excellent post from Ogletree Deakins by Rebecca J. Bennett and Danielle Vanderzanden, related to a crafty new phishing scam they warned about and that you should be aware of, because <i>it has bad guys in real-time behind it</i>, reinforcing the scam with quick answers via email.<br /><br />These scams are affecting employers nationwide without regard to their payroll portals or payroll service providers:<br /><br />"Employers beware: Companies are experiencing a wave of phishing scams that target employee paychecks. Here is the scenario:</span><ul>
<li style="margin-left: 15px;"><span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">An employee receives from a company email account e-mail that mimics a familiar and trusted company service or resource, such as an e-signature request or a request to complete a survey.</span></li>
<li style="margin-left: 15px;"><span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">The e-mail asks the employee to click a link, access a website, or answer a few questions.</span></li>
<li style="margin-left: 15px;"><span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">Then it directs the employee to “confirm” his or her identity by providing his or her complete log-in credentials. Skeptical employees who question the request via reply e-mail receive a prompt response purporting to verify that the employee should complete the steps contained in the link.</span></li>
<li style="margin-left: 15px;"><span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">The threat actors then use the employee’s log-in credentials to access payroll portals, reroute direct deposits to other accounts, and wreak other havoc upon the employer’s network.</span></li>
</ul>
<span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">In some versions of the scam, hackers access employee e-mails to request a password change from the employer’s payroll service and then use the new log-in credentials to change direct deposit instructions."<br /><br />Bennett and Vanderzanden have the following recommendations:<br /><br />"The threat actors are doing substantial due diligence on the social engineering side of things, and these e-mails look real. In many circumstances, they are effectively spoofing the sender’s account, and employers are learning of the scam when employees begin reporting that they did not receive their direct deposits. By then, the damage has been done.<br /><br />In addition to diverting funds, the <i>scam creates a data breach for the employer and triggers notification obligations</i>. Failure to take prompt action may result in penalties and liability to unsuspecting employers.<br /><br />Employers may want to immediately take the following precautions to avoid security breaches as a result of these phishing scams:</span><ul>
<li style="margin-left: 15px;"><span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">Alert your workforce to this scam.</span></li>
<li style="margin-left: 15px;"><span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">Direct employees to forward any suspicious requests to the information technology or human resources departments, rather than replying to the e-mail.</span></li>
<li style="margin-left: 15px;"><span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">Instruct employees to refrain from supplying log-in credentials or personally identifying information in response to any e-mail.</span></li>
<li style="margin-left: 15px;"><span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">Ensure that log-in credentials used for payroll purposes differ from those used for other purposes, such as employee surveys.</span></li>
<li style="margin-left: 15px;"><span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">Enforce (or, where necessary, establish) multifactor authentication requirements.</span></li>
<li style="margin-left: 15px;"><span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">Review and update the physical, technical and personnel-related measures taken to protect your sensitive information and data."</span></li>
</ul>
<span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">This is a link to the original article:<br /><a data-saferedirecturl="https://www.google.com/url?hl=en&q=https://www.lexology.com/library/detail.aspx?g%3D75685deb-06fc-4e47-a696-44843104f866&source=gmail&ust=1517936257054000&usg=AFQjCNFmE2GqQLFE7G-BNnm9_cUTNbmEWA" href="https://www.lexology.com/library/detail.aspx?g=75685deb-06fc-4e47-a696-44843104f866" style="color: #1155cc;" target="_blank">https://www.lexology.com/<wbr></wbr>library/detail.aspx?g=<wbr></wbr>75685deb-06fc-4e47-a696-<wbr></wbr>44843104f866</a><br /><br /><i>I suggest you send the following to your employees, friends, and family. You're welcome to copy, paste, and/or edit:</i> </span><br /> <blockquote>
<span style="color: #333333; font-family: "Open Sans", sans-serif; line-height: 22px;">There is a new Direct Deposit phishing attack you need to watch out for. It's a sophisticated scam that starts with an official-looking email that asks you to click a link and access a website. Next, they ask you to confirm the data with your real username and password. Last, they use your info to access payroll portals, and reroute your direct deposit amounts to bank accounts owned by the bad guys. The lesson here is to never give anyone your credentials in response to an email... Think Before You Click!</span></blockquote>
End of KnowBe4 newsletter clip.<br />
<br />
Stay alert! Stay Vigilant!<br />
<br />
Best Regards,<br />
Dane </div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-7380606207348167890.post-58705745145924487672018-02-05T11:10:00.001-06:002018-02-05T11:15:57.914-06:00WatchGuard Training FREE eBook on Ransomware = Ransombear<iframe frameborder="0" height="2400" src="https://learn.watchguardtraining.net/watchguard-training-classes" width="100%"></iframe>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-7380606207348167890.post-54196162249849366062017-08-22T16:00:00.000-05:002018-01-12T14:38:21.484-06:00DCS Wi-Fi Experts - 4 Wi-Fi Services that Add Business Value<div style="font-family: HelveticaNeue; text-align: center; text-size-adjust: auto;">
<span style="color: #20124d; font-family: "raleway" , sans-serif; font-size: large;"><b>Wi-Fi is changing and we can Help</b></span><br />
<span style="color: #222222; font-family: "raleway" , sans-serif; font-size: large;"><b><br /></b></span></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
At Dynamic Cloud Solutions (DCS Netlink) we have built our security foundation on WatchGuard Security Services, and WatchGuard Wi-Fi is part of that security foundation. <br />
<br /></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
Today, every business and organization has to have security installed in every part of their network(s) and Wi-Fi is no different. Almost every business today has some type of Wi-Fi in place in an effort to service their customers better.<br />
<br />
However, most companies just put the Wi-Fi in and never give security a second thought.<br />
<br /></div>
<span style="font-family: "helveticaneue";">At DCS we are experts at installing and managing Wi-Fi and Wi-Fi services that are secure, and simple.</span><br />
<span style="font-family: "helveticaneue";"><br /></span>
<span style="font-family: "helveticaneue";">And, guess what? Wi-Fi isn't just for surfing anymore.</span><br />
<span style="font-family: "helveticaneue";"><br /></span>
<span style="font-family: "helveticaneue";">Retail businesses and other organizations can use Wi-Fi to push data, coupons, or ads out to their customers while they are on your network.</span><br />
<br />
<br />
<header style="font-family: HelveticaNeue; text-size-adjust: auto;">
<div>
That allows the Wi-Fi owner to know and understand their customers better thus resulting in a better customer & Internet experience for everyone! Sound cool?<br />
<br />
To learn more about WatchGuard Wi-Fi Services read our WatchGuard July blog article below and connect with us at DCS to find out how we can help you add value and security to your Wi-Fi network. Give us a call at 877-327-6385.</div>
</header><header class="entry-header" style="background-color: white; box-sizing: border-box;"><div>
<br />
<a name='more'></a><span style="color: #222222; font-family: "raleway" , sans-serif; font-size: 36px;"><br /></span>
<span style="color: #222222; font-family: "raleway" , sans-serif; font-size: 36px;"><br /></span>
<span style="color: #222222; font-family: "raleway" , sans-serif; font-size: 36px;">4 WatchGuard Wi-Fi Services that Add Business Value</span></div>
<div class="entry-meta" style="box-sizing: border-box; color: #7e7e7e; font-family: roboto, sans-serif; font-size: 14px; margin-bottom: 30px; padding: 0px;">
<time class="entry-time" datetime="2017-07-18T15:10:32+00:00" itemprop="datePublished" style="box-sizing: border-box;">July 18, 2017</time> By <span class="entry-author" itemprop="author" itemscope="" itemtype="https://schema.org/Person" style="box-sizing: border-box;"><a class="entry-author-link" href="https://www.secplicity.org/author/wgvoxus/" itemprop="url" rel="author" style="background-color: inherit; box-sizing: border-box; color: #7e7e7e; text-decoration-line: none; transition: all 0.1s ease-in-out;">The Editor</a></span></div>
<div class="entry-meta" style="box-sizing: border-box; margin-bottom: 30px; padding: 0px;">
<span style="color: #7e7e7e; font-family: "roboto" , sans-serif;"><span style="font-size: 14px;"><a href="https://www.secplicity.org/2017/07/18/4-wi-fi-services-add-business-value/">https://www.secplicity.org/2017/07/18/4-wi-fi-services-add-business-value/</a></span></span></div>
</header><br />
<div class="entry-content" itemprop="text" style="background-color: white; box-sizing: border-box; color: #222222; font-family: roboto, sans-serif; font-size: 16px;">
<div style="box-sizing: border-box; margin-bottom: 26px; padding: 0px;">
<img alt="smart city and wireless communication network" class="aligncenter size-full wp-image-11085" height="403" sizes="(max-width: 743px) 100vw, 743px" src="https://www.secplicity.org/wp-content/uploads/2017/07/Wi-Fi-graphic.jpg" srcset="https://www.secplicity.org/wp-content/uploads/2017/07/Wi-Fi-graphic.jpg 743w, https://www.secplicity.org/wp-content/uploads/2017/07/Wi-Fi-graphic-600x325.jpg 600w" style="border: 0px; box-sizing: border-box; display: block; height: auto; margin: 0px auto 24px; max-width: 100%;" width="743" /></div>
<div class="p1" style="box-sizing: border-box; margin-bottom: 26px; padding: 0px;">
<span class="s1" style="box-sizing: border-box;">As a company that sells exclusively through the channel, WatchGuard gets constant requests for new Wi-Fi services and capabilities from our MSP channel partners. Since our target market is SMBs and distributed enterprises, their Wi-Fi needs are a bit different from larger enterprises. Over time, we’ve noticed that these requests break down into four general categories and each one presents an opportunity for MSPs to create an ongoing billable service that goes beyond just connecting the customer to the internet. </span></div>
<div class="p1" style="box-sizing: border-box; margin-bottom: 26px; padding: 0px;">
<span class="s1" style="box-sizing: border-box;">What are those four levels? Here they are from least to most complicated.</span></div>
<ol class="ol1" style="box-sizing: border-box; margin: 0px 0px 26px 40px; padding: 0px;">
<li class="li1" style="box-sizing: border-box; list-style-type: decimal;"><span class="s1" style="box-sizing: border-box;">Managed Wi-Fi: The MSP will handle all aspects of Wi-Fi setup and troubleshooting for the customer.</span></li>
<li class="li1" style="box-sizing: border-box; list-style-type: decimal;"><span class="s1" style="box-sizing: border-box;">Managed Wi-Fi Security: The MSP will offer Wi-Fi secured with WIDP or WIPS to keep customers safe from hackers and meet HIPAA or PCI 3.2 compliance standards.</span></li>
<li class="li1" style="box-sizing: border-box; list-style-type: decimal;"><span class="s1" style="box-sizing: border-box;">Developing the guest experience: The MSP has the ability to create login pages or push announcements that customers can use as part of their marketing strategies.</span></li>
<li class="li1" style="box-sizing: border-box; list-style-type: decimal;"><span class="s1" style="box-sizing: border-box;">Tracking real-time data: The MSP offers the ability to track metrics like footfall and the movement of connected devices within a brick-and-mortar store.</span></li>
</ol>
<div class="p1" style="box-sizing: border-box; margin-bottom: 26px; padding: 0px;">
<span class="s1" style="box-sizing: border-box;">Many Wi-Fi vendors offer some or all of these services through third-party products that integrate with their Access Points (APs). Other vendors, including WatchGuard, offer them all in one complete package with WatchGuard <a href="https://www.watchguard.com/wgrd-products/access-points/cloud-managed" style="background-color: inherit; box-sizing: border-box; color: red; text-decoration-line: none; transition: all 0.1s ease-in-out;"><span class="s2" style="box-sizing: border-box;">Wi-Fi Cloud</span></a>. It’s a true game-changer in today’s market and is engineered to provide a safe, protected airspace for Wi-Fi environments, while eliminating admin headaches and greatly reducing costs. Secure, simple and intelligent Wi-Fi that includes expansive engagement tools and visibility into business analytics. </span></div>
<div class="p1" style="box-sizing: border-box; margin-bottom: 26px; padding: 0px;">
<span class="s1" style="box-sizing: border-box;">You can read more about these four levels of Wi-Fi service in this <a href="http://www.channelpartnersonline.com/blog/4-wi-fi-services-that-will-delight-customers/" style="background-color: inherit; box-sizing: border-box; color: red; text-decoration-line: none; transition: all 0.1s ease-in-out;"><span class="s2" style="box-sizing: border-box;">article</span></a> in Channel Partners by <a href="https://www.secplicity.org/author/ryanorsi/" style="background-color: inherit; box-sizing: border-box; color: red; text-decoration-line: none; transition: all 0.1s ease-in-out;"><span class="s2" style="box-sizing: border-box;">Ryan Orsi</span></a>, our Director of Product Management for Wi-Fi, or in <a href="http://www.channelpronetwork.com/article/wi-fi-opens-add-revenue-opportunities" style="background-color: inherit; box-sizing: border-box; color: red; text-decoration-line: none; transition: all 0.1s ease-in-out;"><span class="s2" style="box-sizing: border-box;">ChannelPro Network</span></a>. Read more about <a href="https://www.secplicity.org/2017/06/15/eliminate-5-critical-wi-fi-mistakes/" style="background-color: inherit; box-sizing: border-box; color: red; text-decoration-line: none; transition: all 0.1s ease-in-out;"><span class="s2" style="box-sizing: border-box;">Wi-Fi</span></a> <a href="https://www.secplicity.org/2017/06/06/key-considerations-wi-fi-security-iot-security-work-arounds-c-level-targets/" style="background-color: inherit; box-sizing: border-box; color: red; text-decoration-line: none; transition: all 0.1s ease-in-out;"><span class="s2" style="box-sizing: border-box;">security</span></a> for SMBs here on Secplicity. </span></div>
</div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-7380606207348167890.post-78345479829188018842017-06-12T10:28:00.003-05:002017-06-12T10:28:45.200-05:00[FINALLY] Next Windows Version 10 Stops Ransomware Cold - article courtesy of KnowBe4<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
[FINALLY] Next Windows Version 10 Stops Ransomware Cold - by Stu Sjourman<img align="right" src="https://blogger.googleusercontent.com/img/proxy/AVvXsEiv-vlOJ0d7DKHt53esmaVC_VogpXIUV7gv19gXO79Uil1ejVRSnpklpHrvNCFcrGsLtWv00L5h38vkzzqG0X7oW8XB3nqZLbK9s4EWbXOOAVxYIaC3FZgkAuctDk7cXHYkS-oEKyfbEXNnMEH597h1bReiC0Vx3A=s0-d-e1-ft" width="144" /><br /><br />OK, finally there is some good news in the fight against ransomware!<br /><br />(In case you did not know, I was the Editor-in-Chief for WServerNews for 15 years, and I have been following the Win OS closely since 1995. Glad to be back on my old stomping grounds for a bit here!)<br /><br />Microsoft has been closely watching the onslaught of this new ransomware epidemic and added a slew of new features to the second major update of Win10 which is called "Creators Update" — Win 10 CU for short — which has been rolling out for a few weeks, consumers first.<br /><br />Presenting new anti-ransomware protection features added in Win 10 CU, Robert Lefferts, Director of Program Management, Windows Enterprise and Security, said that no Windows 10 customer was affected by the recent WannaCry ransomware outbreak that took place in mid-May and no currently known ransomware strain can infect Windows 10.<br /><br /><b>From a security perspective, CU is a massive improvement.</b><br /><br />The new security features include the following list, apart from a host of non-security related additions like a 3D version of MS Paint. :-)</div>
<ul style="font-family: HelveticaNeue; text-size-adjust: auto;">
<li><b>Click-to-run for Adobe Flash in Edge</b> — which prevents ransomware and other malware from landing on Windows 10 PCs via exploits kits and drive-by downloads.</li>
<br />
<li><b>Instant cloud protection via Windows Defender</b> — According to Microsoft, starting with CU, Windows Defender AV can suspend a suspicious file from running and sync with the cloud protection service to further inspect the file.</li>
<br />
<li><b>Fast remediation mechanism at detection</b> — Microsoft says it has made great strides to "remediate ransomware infection and limit ransomware activity from minutes to seconds, reducing its damage from hundreds of encrypted files to a few." Microsoft credits this to Windows Defender AV’s behavioral engine, who can aggregate malware behavior across processes and stages.</li>
<br />
<li><b>Improved detection for script-based attacks</b> — Microsoft says its Antimalware Scan Interface (AMSI) was modified to intervene during the strategic execution points of JS or VBS script runtimes, two infection vectors often used by ransomware.</li>
<br />
<li><b>Wow64 compatibility scanning</b> — In CU, Windows Defender AV added a process-scanning feature that uses the Wow64 compatibility layer, enabling it to better inspect system interactions of 32-bit applications running on 64-bit operating systems.</li>
<br />
<li><b>Process tree visualizations</b> — feature added to Windows Defender ATP, the commercial version of Windows Defender.</li>
<br />
<li><b>Artifact searching capabilities</b> — feature added to Windows Defender ATP.</li>
<br />
<li><b>Machine isolation and quarantine</b> — feature added to Windows Defender ATP.</li>
<br />
<li><b>Windows Edge browser</b> — better protection against remote code execution attacks.</li>
</ul>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<b>Overall, your average user will probably not notice the difference</b><br /><br />Overall, it's a good update, but it stands out for its incremental tweaks and behind-the-scenes improvements to matters such as security, updates and privacy, rather than for spectacular new features.<br /><br />Obviously, you will not be able to roll this out immediately in your organization, despite the CU security improvements. Implementing CU is likely not a priority if you have just started to deploy Win10, and you might jump straight to the next major update, codenamed Redstone 3 which is due later this year.<br /><br />The update is available to MSDN/TechNet subscribers running the Enterprise, Education and IoT Core edition. Organizations that have Windows via the Volume License Service Center have been able to get the update since <span data-term="goog_850276996" tabindex="0">May 1</span>.<br /><br /><b>These Goodies Only Come in the Latest Version</b><br /><br />Microsoft has a very good 14-page PDF with all these features detailed and illustrated. You can download that at the blog. It is obvious that they are adding all these features only to the most recent version, giving you an incentive to accelerate your wall-to-wall upgrades to the latest rev of the OS, which in this case you should be looking at seriously.<br /><a data-saferedirecturl="https://www.google.com/url?hl=en&q=https://blog.knowbe4.com/finally-next-windows-version-10-stops-ransomware-cold&source=gmail&ust=1497364277428000&usg=AFQjCNGmqzGEDjO4z1M80b-e4y5EL9VNYg" href="https://blog.knowbe4.com/finally-next-windows-version-10-stops-ransomware-cold" target="_blank">https://blog.knowbe4.com/<wbr></wbr>finally-next-windows-version-<wbr></wbr>10-stops-ransomware-cold</a><br /><br />The whitepaper contains excellent ammo for budget requests, but is too technical for average C-level execs since it talks about data science, machine learning, automation, behavioral analysis, and other exotic subjects like that. :-D</div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<i><br /></i></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<i>End of Article by Stu Sjourman (CEO KnowBe4)</i></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<br /></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<b>More Information on KnowBe4 from DCS Netlink:</b></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<div>
<span style="color: black; font-family: Open Sans, sans-serif;"><br /></span></div>
</div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
You can get a FREE Phishing test and a FREE email exposure check at KnowBe4. Two FREE tools to tell you how you measure up again the bad guys. Need more info on KnowBe4 check this out: </div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<br /></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<br /></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<b><span style="font-size: small;"><a href="https://info.knowbe4.com/phishing-security-test-partner" target="_blank">https://www.knowbe4.com/phishing-security-test-offer</a></span></b></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<br /></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<span style="color: blue; font-family: Open Sans, sans-serif;"><b><a href="http://security.dcsnetlink.com/security-hom-epage/-combat-social-engineering"><u>Find out more about KnowBe4</u></a></b></span></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<span style="color: #333333; font-family: Open Sans, sans-serif;"><br /></span></div>
<div style="font-family: HelveticaNeue; text-size-adjust: auto;">
<div>
<span style="color: blue; font-family: Open Sans, sans-serif;"><b><u><a href="https://info.knowbe4.com/kmsat_get_a_quote_now_dcs">Request a Quote for KnowBe4 Services from DCS Netlink</a></u></b></span></div>
<div>
<span style="color: black; font-family: Open Sans, sans-serif;"><b><br /></b></span></div>
<div>
Stay Safe! Stay Secure!</div>
<div>
<br /></div>
<div>
Regards,</div>
<div>
Dane</div>
</div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-7380606207348167890.post-64538162691496086172017-03-20T08:38:00.000-05:002017-04-25T09:30:27.311-05:00Ransomware stopped by WatchGuard<div style="text-align: center;">
Ransomware Stopped by WatchGuard</div>
<div style="text-align: center;">
<br /></div>
<div style="text-align: left;">
As a <b>Watchguard Certified Training Partner,</b> many times we know about new features and capabilities with the WatchGuard firewall products before the general public knows about them. Such was the case with a new module that WatchGuard released over the last couple of months in its Total Security Suite called Threat Detection and Response (TDR).</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
As you probably know, Ransomware is exponentially increasing in quantity and severity and has been very effective in doing its job by encrypting customer data and holding it hostage. Here is a quick WatchGuard video explaining the threat and vulnerability of Ransomware: <a href="https://www.youtube.com/watch?v=xZbTFrmr_0E">https://www.youtube.com/watch?v=xZbTFrmr_0E</a><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/xZbTFrmr_0E/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/xZbTFrmr_0E?feature=player_embedded" width="320"></iframe><br />
<br /></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
If you are not familiar with ransomware, here is a really good video explaining what it is in English...the video features"Ransombear" as a cartoon character. This video is called "Ransombear is on the hunt": <a href="https://www.youtube.com/watch?v=eEKAlupYgDc">https://www.youtube.com/watch?v=eEKAlupYgDc</a></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
Last week I saw a WatchGuard (WG) engineer demonstrate how extremely effective the WatchGuard firewall and TDR module were together in stopping Ransomware "dead in its tracks."</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
During this short demo, the WG engineer clicked on a real ransomware file and showed how the WG TDR not only stopped the ransomware but also showed information in a WG console which captured and explained what had just happened. There was nothing for the user to do, and you could see nothing happening. The WG TDR module simply just did its job and kept the ransomware from executing and encrypting files. </div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
To prove that the Ransomware file was real, the WG engineer then turned off the TDR services on his Windows machine and then double-clicked the same file....and whoa la! Within a matter of a few seconds, a screen popped up letting us know that our files were now encrypted and showed us a ticking clock to let us know how much time we had remaining to pay the ransom.<br />
<br />
Now, you can watch it too! Just visit my YouTube channel at <span style="font-size: xx-small;"><a href="https://youtu.be/ORqaWDvF5nQ" style="background: rgb(255, 255, 255); border: 0px; color: #167ac6; cursor: pointer; font-family: Roboto, arial, sans-serif; margin: 0px; padding: 0px; text-decoration: none;" target="_blank">https://youtu.be/ORqaWDvF5nQ</a><span style="font-size: x-small;"> </span></span>and you will get a chance to hear more about WatchGuard Threat Detection and Response, as well as watch the WG Sales Engineer, demonstrate how ransomware is stopped by the WatchGuard Threat Detection and Response Host Sensor.</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
Extremely effective! Up until now, I have had to explain that firewalls and anti-virus do little to nothing in protecting you against Ransomware...and could not detect, let alone, prevent a Ransomware attack. Now, we have WG Threat Detection and Response to detect and respond to threats like Ransomware. The new TDR module is available for laptops and desktops and is available as part of your Total Security Suite. TDR is very effective as endpoint protection and the best part is that TDR is <b>effective even if you are operating on Windows or Linux and you are not physically behind a WG firewall!</b></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
If you own a WatchGuard firewall but don't know or understand how the TDR module works, give us a call at DCS Netlink -Toll-Free: 877-327-6385. Our WatchGuard certified engineers will help you determine how you can protect yourself and your network against Ransomware with the new WG TDR module.</div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
Watch for our on-line WatchGuard Certified Training Partner seminar on the new TDR module.... Coming Soon! </div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
Visit <b><a href="http://watchguard.dcsnetlink.com/" target="_blank">http://watchguard.dcsnetlink.com/</a>, <a href="http://www.watchguardtraining.net/" target="_blank">watchguardtraining.net </a>or</b> <b><a href="https://sites.google.com/a/watchguardtraining.net/watchguard/security-training">https://sites.google.com/a/watchguardtraining.net/watchguard/security-training</a></b></div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-7380606207348167890.post-17890587686431512542017-02-08T10:53:00.003-06:002017-02-14T16:05:24.320-06:00The Customer is NOT always right - Partnership versus Customer Service!I recently read a great article by Danny Iny. In that article, he points out that the customer is not always right. He also says there is a big difference between customer service and partnership.<br />
<br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdotsTlbfzlKm9VSeTy_dmcftN9Mq9bwQ6AFtpHOFCwSzQwKVKObtC4Q5Js8-tJ3W16dpYURlXbS46DSHndSDjMEK3oDJelpT-__8BbmTwrUieNHQ_DVBg_F_i5a-1jeeWz0qxm-MQpFA/s1600/AraratClearSkyClean.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img alt="Mt. Ararat - 17,000 ft mountain in Turkey" border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdotsTlbfzlKm9VSeTy_dmcftN9Mq9bwQ6AFtpHOFCwSzQwKVKObtC4Q5Js8-tJ3W16dpYURlXbS46DSHndSDjMEK3oDJelpT-__8BbmTwrUieNHQ_DVBg_F_i5a-1jeeWz0qxm-MQpFA/s320/AraratClearSkyClean.jpg" title="Mt. Ararat - 17,000ft " width="320" /></a></td></tr>
<tr><td class="tr-caption" style="font-size: 16px;"><div style="font-size: 16px;">
Mt. Ararat (Agridag)- 17,000 ft mountain in Turkey</div>
<span style="background-color: white; color: #252525; font-family: sans-serif; text-align: start;"><span style="font-size: xx-small;">Ⓒ Photo by Dane Deutsch</span></span></td></tr>
</tbody></table>
<br />
At Deutsch's Inc., we are in the "people business" and all of our businesses (i.e.- DCS Netlink, Deutsch's Gymnastics, and Leadership Management Development Center) focus on partnerships not pure customer service. So, I totally agree with Danny Iny.<br />
<br />
I am not a professional climber by any stretch of the imagination, but I had the privilege of climbing Mt. Ararat (17,000 ft dangerous climb - which in Turkish, Mt. Ararat is called Agridag, which means "mountain of pain") during the 5 years I lived in Turkey. Having made that climb, I can tell you that what Danny says about the difference between customer service and partnerships is exactly right! He says, <b style="font-style: italic;">"</b><span style="background-color: white; color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif; font-size: 16px;"><b style="font-style: italic;">Think of it this way: If you were climbing Mt. Everest, customer service is your porter. </b>Partnership<b style="font-style: italic;"> is your Sherpa climbing guide." </b>Perfectly said!</span><br />
<span style="background-color: white; color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif; font-size: 16px;"><br /></span><span style="background-color: white; color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif; font-size: 16px;">In other words, your porter carries your supplies for a fee...strictly <b>transactional</b>. However, your Sherpa climbing guide is your key to reaching your goal (i.e.- the mountain Peak) and getting back to base camp successfully and safely. The relationship with the Sherpa is totally <b>transformational</b> and Trust is two way. Big Difference!</span><br />
<span style="background-color: white; color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif; font-size: 16px;"><br /></span><span style="background-color: white; color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif; font-size: 16px;">At Deutsch's Inc. we are all about partnerships, NOT customer service as our primary goal. Why? Because as Danny says, <b>"</b></span><span style="background-color: white; color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif; font-size: 16px;"><b>The goal of customer service is to make the customer happy. In contrast, the goal of a partnership is for the customer to achieve their goals. Buyer and seller are both focused on a goal that's bigger than the buyer. The customer's happiness is a by-product of achieving that goal."</b></span><br />
<span style="background-color: white; color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif; font-size: 16px;"><b><br /></b></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7y6AQaETiRz_8Ct0MT8HYeBsaLwxpIIHb3-Woks2PgbRip3RxxcQimBdscSFpqCq-YHlpHe1deY9BfCQQO1fYwm3bnwlYinYb5gLL-LQB5sa7tSaT8ISDbMY4_3qtC_ySvA9uKU0MLgs/s1600/AraratTeamonTop.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img alt="Dane's climbing team successfully at the top of Mt Ararat with climbing Guides" border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7y6AQaETiRz_8Ct0MT8HYeBsaLwxpIIHb3-Woks2PgbRip3RxxcQimBdscSFpqCq-YHlpHe1deY9BfCQQO1fYwm3bnwlYinYb5gLL-LQB5sa7tSaT8ISDbMY4_3qtC_ySvA9uKU0MLgs/s320/AraratTeamonTop.jpg" title="Dane's climbing team with climbing Guides " width="320" /></a></div>
<br />
<div style="text-align: center;">
<span style="background-color: white; color: #252525; font-family: sans-serif; font-size: xx-small; text-align: start;">Ⓒ Photo by Dane Deutsch</span></div>
<span style="background-color: white; color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif; font-size: 16px;"><b><br /></b></span><span style="color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif;"><span style="background-color: white; font-size: 16px;">I want to encourage you to read Danny's full article here: </span><span style="font-size: 16px;"><a href="http://www.inc.com/danny-iny/the-biggest-customer-service-mistake-you-don-t-know-you-re-making.html?cid=email">http://www.inc.com/danny-iny/the-biggest-customer-service-mistake-you-don-t-know-you-re-making.html?cid=email</a></span></span><br />
<span style="color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif;"><span style="font-size: 16px;"><br /></span></span><span style="color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif;"><span style="font-size: 16px;">I also encourage you to read Danny's book: <a href="https://www.amazon.com/Teach-Grow-Rich-Knowledge-Freedom/dp/1541232518/ref=sr_1_1?ie=UTF8&qid=1486571501&sr=8-1&keywords=danny+iny">https://www.amazon.com/Teach-Grow-Rich-Knowledge-Freedom/dp/1541232518/ref=sr_1_1?ie=UTF8&qid=1486571501&sr=8-1&keywords=danny+iny</a></span></span><br />
<span style="color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif;"><span style="font-size: 16px;"><br /></span></span><span style="color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif;"><span style="font-size: 16px;">And as always, focus on leading with Character First! To learn more about how to lead with character first, grow relationships, leadership and teamwork, you can pick up a copy of my new book called <i><b>"The Tricycle Effect"</b></i> on Amazon: <a href="https://www.amazon.com/Tricycle-Effect-Significant-Productive-Successful-ebook/dp/B01N91PPL0/ref=as_sl_pc_tf_til?tag=coach0e1-20&linkCode=w00&linkId=46359a1675537eea4e7912907092a781&creativeASIN=B01N91PPL0">https://www.amazon.com/Tricycle-Effect-Significant-Productive-Successful-ebook/dp/B01N91PPL0/ref=as_sl_pc_tf_til?tag=coach0e1-20&linkCode=w00&linkId=46359a1675537eea4e7912907092a781&creativeASIN=B01N91PPL0</a> </span></span><br />
<br />
or visit my website at: <a href="http://www.thetricycleeffect.com/">www.thetricycleeffect.com</a><br />
<span style="color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif;"><br /></span><span style="background-color: white; color: #333333; font-family: "robotoregular" , "helvetica" , "arial" , sans-serif; font-size: 16px;">Thanks for letting me serve as your Sherpa during this short "blog." Keep leading with Character First! Trike On and Smile On!</span>Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-7380606207348167890.post-43654312941012430182017-01-25T11:11:00.000-06:002017-01-25T11:29:41.092-06:00Bad Guys are Getting Badder, Faster then the Good Guys are Getting Gooder!<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">“Nothing has happened to my network, computer, or email yet, so most likely nothing will happen!” That phrase is one I hear people make all the time. Is that something you might say?</span></div>
<b id="docs-internal-guid-a9ec1792-d678-51ce-b893-0fece3b91077" style="font-weight: normal;"><br /></b>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">If you said “Yes,” then I guess you might also live by “The Odds.” Are you a gambler? Would you gamble your business or livelihood away?</span></div>
<b style="font-weight: normal;"><br /></b>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">At DCS Netlink, we don’t live by “The Odds.” We don’t gamble when it comes to computer, network or Internet security. The reason: the odds are not in any person’s favor when it comes to computer, network or Internet security. There are lots of explanations on why that is true. </span></div>
<b style="font-weight: normal;"><br /></b>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Think about these it:</span></div>
<ol style="margin-bottom: 0pt; margin-top: 0pt;">
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> You are most likely a smartphone or computer user. You are not an IT expert or even less likely to know about IT security. Do you agree?</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Like most people, we are HUMAN and we don’t like change. So, you might ask, “Why do I need to add extra security when I haven’t needed it so far? Fair question. Do you agree?</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">There are lots of explanations, but there is one more…...that is security stuff is TOO expensive! So, what most people think is that adding security also adds costs, and you want to be responsible with your money, right? WRONG! Your reputation in business has more value than a dollar amount. Once you become a victim, your reputation will suffer and most likely your business will suffer, and that may translate to dollars in the end.</span></div>
</li>
</ol>
<b style="font-weight: normal;"><br /></b>
<br />
<div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">So, what should you do about your computer, network and Internet Security?</span></div>
<ol style="margin-bottom: 0pt; margin-top: 0pt;">
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;"> Change your beliefs about the BAD guys! You need to believe that they are working hard to take you down and many of those users around you. If you don’t believe that, then you have already most likely lost the battle. In this day and age of the Internet of Things, the risks, vulnerabilities, and threats are increasing at an ever alarming rate and with greater consequences! Do you agree?</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Find a company that will look out for your best interests, and not give you answer or propose a solution with the least cost. Getting the right solution is more important!</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Partner with a computer, network and Internet Security company that has done background investigations on each and all of their employees. After all, these engineers and technicians will most likely see some of your most confidential information in the scope of carrying out their duties.</span></div>
</li>
<li dir="ltr" style="background-color: transparent; color: black; font-family: Arial; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: decimal; text-decoration: none; vertical-align: baseline;"><div dir="ltr" style="line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;">
<span style="background-color: transparent; color: black; font-family: "arial"; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;">Hire a company that has gone through at least some semblance of security training on firewalls, and Internet Security. Most IT companies do not have any formal training and/or certifications as a testimonial to their legitimacy in carrying out their duties.</span></div>
</li>
</ol>
<br />
<span style="font-family: "arial"; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;">So, that is the nitty gritty of IT! If you want to know more and would like a network assessment and/or a security assessment, give us a call. We would be happy to help coach you to a stronger and more secure future….after all, your business and reputation depend on IT! Visit us at </span><a href="http://www.dcsnetlink.com/" style="text-decoration: none;"><span style="color: #1155cc; font-family: "arial"; font-size: 16px; text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;">www.dcsnetlink.com</span></a><span style="font-family: "arial"; font-size: 16px; vertical-align: baseline; white-space: pre-wrap;"> or call 877-327-6385.</span>Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-7380606207348167890.post-89845040237346176482013-06-30T16:40:00.000-05:002016-08-20T21:02:33.817-05:00Accountability - What's that? And, why should I care?<br />
Accountability....What is that?<br />
<br />
Uh Oh!! Another thing to add to my ToDo List. I can't keep up now, so how can I manage accountability? Every hear yourself say or ask something similar in your own life?<br />
<br />
This is the reaction to interesting questions almost every leader has made in this day and age. In reality, the real questions need to be, "How do I lead and manage with accountability?" Why is it important and why is it important to me and the health of the organization, company and/or family that I lead?<br />
<br />
When I am teaching, training, and coaching WatchGuard firewalls, VPNs, and Internet Security, the subject of trust and accountability comes up every time. So many organizations, companies, and people have come to me in the last 6 months and without directly using the word "accountability," they were very concerned about things going on in their organization. Think about it...trust can't develop to healthy levels if no one can be trusted to perform and execute on time when promised. That is why we need accountability.<br />
<br />
Leaders at all levels at one time believed that their people and teams were doing the right thing, but they may not have addressed accountability, nor did they "front load" accountability with the job description and expectation. So now they are finding out that without the accountability, stuff never got done, or managed or executed on time. That is generally what leads to disappointment and miscommunication in the end, which then keeps a "culture of ownership" from developing.<br />
<br />
All of those things that concerned these leaders really referred back to what we call accountability. That is a big word, and has HUGE implications for the health and vitality of every organization, company, family and person. Every leader needs to be very good at inserting accountability into their personal lives to grow and develop healthy trusting relationships with themselves, their family, and their companies...and no, it does not mean discipline...it is so much more than that. Furthermore, they need to "front load" the accountability and expectations up front before the journey or task even starts. Don't wait until the task is done or the event is over to think about accountability. Building accountability and building it in pre-loaded beforehand is the tough stuff that great organizations and strong leaders know best and act on.<br />
<br />
In this link to Lee Ellis' part 1 of his 6 part blog series on Accountability, he talks about: Leaders and Accountability.<br />
<br />
Lee says, "Even thought there are 14 lessons in my book, Leading with Honor, three foundational attributes rise to the top - character, courage, and competency. To put it another way, the best leaders push through their selfishness and fear to skillfully do the right thing even when it's painful. And part of doing the right thing is being accountable for one's actions."<br />
<br />
To read more on the tough subject of accountability and why it is critical to healthy relationships in every person's life, visit Lee's blog at:<br />
<span style="background-color: white;"><span style="line-height: 20px;"><span style="font-family: "times" , "times new roman" , serif;"><br /></span></span></span>
<a href="http://leonleeellis.wordpress.com/2013/01/02/on-leaders-and-accountability-notes-from-the-cliff/" target="_blank">On Leaders and Accountability: Notes from the Cliff - Lee Ellis on Leading with Honor</a><br />
<br />
Until next time, "Keep leading with Character First." - DaneAnonymousnoreply@blogger.com1Superior, WI, USA46.7207737 -92.10407959999997746.5465247 -92.426803099999972 46.895022700000005 -91.781356099999982