Network Management

U.S. Warns that Cyber Attacks may be Imminent: What can you do to Protect your Business?

Seras is committed to ensuring that our customers are protected and ready to handle any cyber-related threat that comes their way.  We help businesses all over Columbia, Lexington, and Irmo install and configure their computer networks, but we also work hard to keep them efficient and protected in the future using a variety of tools and scheduled activities that ensure their success. 

With the current turmoil ensuing in Eastern Europe regarding the Russian invasion of Ukraine, there has been a shift in focus in the technology industry towards securing all weak points to prevent Russian interference of U.S. public and private communications networks.  The White House alongside the F.B.I. and CISA (the cybersecurity and infrastructure security agency), have therefore issued several warning notices for American business owners to be mindful of while they fortify their networks against potential Russian state-sponsored black hat cyber actors.

The FBI and CISA recommend organizations remain cognizant of the threat of state-sponsored cyber actors exploiting default MFA protocols and exfiltrating sensitive information. Organizations should:

• Enforce MFA for all users, without exception. Before implementing, organizations should review configuration policies to protect against “fail open” and re-enrollment scenarios.
• Implement time-out and lock-out features in response to repeated failed login attempts.
• Ensure inactive accounts are disabled uniformly across the Active Directory, MFA systems etc.
• Update software, including operating systems, applications, and firmware on IT network assets in a timely manner. Prioritize patching known exploited vulnerabilities, especially critical and high vulnerabilities that allow for remote code execution or denial-of-service on internet-facing equipment.
• Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to have strong, unique passwords. Passwords should not be reused across multiple accounts or stored on the system where an adversary may have access.
• Continuously monitor network logs for suspicious activity and unauthorized or unusual login attempts.
• Implement security alerting policies for all changes to security-enabled accounts/groups, and alert on suspicious process creation events (ntdsutil, rar, regedit, etc.).
— https://www.cisa.gov/uscert/ncas/alerts/aa22-074a

CISA goes on later in the article to include a list of best practices and recommendations for business owners to implement to further reduce the risk of malicious cyber attacks.

Security Best Practices

• Deploy Local Administrator Password Solution (LAPS), enforce Server Message Block (SMB) Signing, restrict Administrative privileges (local admin users, groups, etc.), and review sensitive materials on domain controller’s SYSVOL share.
• Enable increased logging policies, enforce PowerShell logging, and ensure antivirus/endpoint detection and response (EDR) are deployed to all endpoints and enabled.
• Routinely verify no unauthorized system modifications, such as additional accounts and Secure Shell (SSH) keys, have occurred to help detect a compromise. To detect these modifications, administrators can use file integrity monitoring software that alerts an administrator or blocks unauthorized changes on the system.

Network Best Practices

• Monitor remote access/ RDP logs and disable unused remote access/RDP ports.
• Deny atypical inbound activity from known anonymization services, to include commercial VPN services and The Onion Router (TOR).
• Implement listing policies for applications and remote access that only allow systems to execute known and permitted programs under an established security policy.
• Regularly audit administrative user accounts and configure access control under the concept of least privilege.
• Regularly audit logs to ensure new accounts are legitimate users.
• Scan networks for open and listening ports and mediate those that are unnecessary.
• Maintain historical network activity logs for at least 180 days, in case of a suspected compromise.
• Identify and create offline backups for critical assets.
• Implement network segmentation.
• Automatically update anti-virus and anti-malware solutions and conduct regular virus and malware scans.

Remote Work Environment Best Practices

With an increase in remote work environments and the use of VPN services, the FBI and CISA encourage organizations to implement the following best practices to improve network security:
• Regularly update VPNs, network infrastructure devices, and devices used for remote work environments with the latest software patches and security configurations.
• When possible, implement multi-factor authentication on all VPN connections. Physical security tokens are the most secure form of MFA, followed by authenticator applications. When MFA is unavailable, require employees engaging in remote work to use strong passwords.
• Monitor network traffic for unapproved and unexpected protocols.
• Reduce potential attack surfaces by discontinuing unused VPN servers that may be used as a point of entry for attackers.

User Awareness Best Practices

Cyber actors frequently use unsophisticated methods to gain initial access, which can often be mitigated by stronger employee awareness of indicators of malicious activity. The FBI and CISA recommend the following best practices to improve employee operations security when conducting business:
• Provide end-user awareness and training. To help prevent targeted social engineering and spearphishing scams, ensure that employees and stakeholders are aware of potential cyber threats and delivery methods. Also, provide users with training on information security principles and techniques.
• Inform employees of the risks associated with posting detailed career information to social or professional networking sites.
• Ensure that employees are aware of what to do and whom to contact when they see suspicious activity or suspect a cyberattack, to help quickly and efficiently identify threats and employ mitigation strategies.
— https://www.cisa.gov/uscert/ncas/alerts/aa22-074a

These items are quite complex and can be overwhelming to most businesses. Seras is here to help navigate these suggestions and figure out how to incorporate them into your IT infrastructure. Our team of knowledgeable, friendly technicians works hard to make changes as painless as possible and work in alignment with your goals for success. To request more information or a free assessment, email us at ithelpdesk@serasIT.com or click here.

PC Maintenance & Performance Series Part 2: Internet Security Settings

In this series of articles we are going to explore things you can do on your PC to ensure it is properly maintained and protected for peak performance. Part 2 will address effective practices to ensure good internet security.

PC Maintenance & Performance Series Part 1: PC Security & Malware

Most of us spend a considerable amount of our hard earned money on technology. These are more than purchases, they are technological investments. So why not get the most out of your investment? That is why proper maintenance and care is crucial for your PC. When you maintain your PC, you will see a boost in performance.

What is a Firewall and Why do I Need it?

Due to the Covid-19 pandemic businesses have had to be pro-active in ensuring the safety and health of their employees and their customers. Many businesses have been forced to shut down. Many have had to be creative in finding a workaround enabling their employees to be productive even if they’re quarantined. To do so many have been pushed towards working from home. But a company can’t just do this without taking proper security measures and planning. If they don’t they leave themselves vulnerable to the threats to their network.

Need help updating your networking equipment?

An open network rack changed out with a new server and a new rack in Columbia, SC.

Network & Server Management Done the Right Way!

The team had an awesome time helping a customer install and configure a new server along with replacing their rack with something much more organized and secure!  Not only did we get things organized and cleaned up, we configured remote access for a new segment of the client’s users and segmented file storage.  How does your network rack look – are things easy to locate and troubleshoot?  Are there any opportunities for efficiency or profitability within your computer and systems network?  Do you need help managing your security threats and requirements? Call us today to take a look at your network and see how we can help!

Seras IT is Growing!

Seras IT is hiring a new IT Technician!

Seras LLC is seeking a clean-cut, personable, organized candidate who is eager to build a professional career in the Information Technology Industry.  Seras is growing its operations in the greater Columbia SC market and both Level 2 and Level 3 positions are available.

Level 3 (Primarily network and Domain Management)

Coordinate and administer enterprise system support for customers in a broad array of industries working with multiple operating systems and network configurations.  Assist with the engineering design, build, install, and implementation of both local and cloud-based systems.  Occasionally provide direct customer support across a variety of user levels including some Level 1 or Level 2 assistance OR strategic consulting services.  Troubleshoot escalated complex problems related to both hardware and software issues, monitor existing system performance, and ensure security compliance.

Minimum Qualifications: Bachelor’s degree in Information Technology Systems or related field and one year related work experience OR high school diploma and 5 years of work experience.

Salary Range: $44,000-64,000 Annually

Level 2 (Primarily workstation, printer, and basic network support)

Provide direct customer service via both on-site and remote support for Windows machines and connected network devices.  Assist with the installation or new and existing equipment, troubleshooting connectivity issues related to PC’s, printers, scanners, and other end-user devices.  Support Level 1 and 3 technicians with cabling services, service requests, and other projects.  Provide front line representation of Seras to the Columbia SC area.

Minimum Qualifications: High school diploma with a minimum of 3 years in the business service, sales, or retail industries OR Bachelor’s degree with a minimum of 1 year of related experience.

Salary Range: $22,000-42,000 Annually

To apply email your resume to info@serasrecords.com.