How to Make Your Home Office More Secure

Cybersecurity has become the top concern for governments and businesses around the world. As our world becomes increasingly digital, our lives are made easier, but we are also more vulnerable. We entrust our personal data to complete strangers every day, and this puts us at tremendous risk.

As a result, it’s critical you do everything you can to protect you and your business from hackers and other cybercriminals. And this is no longer something that only major corporations need to worry about. Small businesses are being targeted more and more each year, largely because they have weaker defense systems, and few have the resources to recover from such an attack.

And for those who work at home, your responsibility is even greater. Without the benefit of a dedicated IT or cybersecurity team, you’re more exposed than ever. It’s important you do all you can to keep your home office as secure as possible, and here are five ways to help you do just that.

1. Set And Use Strong Passwords

Passwords have been around since the beginning of time; nearly all of us have seen movies or TV. shows set in medieval times where a password was required to enter a walled city. Today, passwords serve the same purpose, but instead of being used to fortify a physical barrier, they are used to create a digital defense.

However, too many of us engage in bad password habits. Either we use something absurdly easy to guess, we use the same password for everything, or both. Or we don’t use a password at all! But this just simply cannot be. Not using a password is like leaving the front gate to your walled city wide open.  And using one that’s too easy defeats the purpose of having a password in the first place.

Make sure to set and use strong, unique passwords for the following things in your home office:

  • Your computers. It’s a pain to have to log in every time, but if you don’t use a password than you’re just exposing yourself to unnecessary risk.
  • Your phones. Most of us do this anyway, but don’t be like Kanye and use 000000, as this is way to easy for someone to guess
  • Important folders. If you have document folders that contain sensitive information, then change the settings on your computer so that they can only be accessed with a password.
  • Your WiFi. If a hacker can get onto your WiFi network, then it’s much easier for them to access your other devices using that connection. Most internet service providers will help you set up security protocols, but if they don’t, or if you’re not satisfied with their security offering, then consider switching to another provider.

2. Use a Password Manager

While it’s super important to use passwords wherever you can, it’s also critical you don’t use the same password for everything. This way, if someone does manage to learn a password, they won’t have access to each and every account you have.

However, if you’re like most of us, then the thought of using a different password for each account is simply terrifying. How can we ever hope to remember all of them? Well, it turns out you don’t need to. Password managers, such as LastPass, DashLane and RoboForm will all manage passwords for you in a safe and secure way.

They work by storing your password information in a personalized, secure “vault,” which only you can access. This way, when you go to log into a site, you don’t need to remember your password, which makes it easier to use stronger, harder to guess passwords. And because these managers encrypt all your passwords inside their “vault,” you don’t need to worry about this central location being compromised.

3. Keep Up-to-Date

Whether it’s your operating system, antivirus software or WordPress, make sure to keep all the software you use up-to-date. Developers are working around the clock to the identify any holes in their products’ defenses, and when they find one and fix it, they send it out in an update, but it’s up to you to incorporate these changes.

Consider setting up a day during the week to check for updates, such as Friday afternoon. It’s true that installing these can sometimes take time, especially if multiple reboots are needed, so make sure you’re doing it at a point in the day or week where you don’t need to use your computer, as this will make it easier to put up with the inconvenience of updating.

4. Lock Up

When we talk about cybersecurity, we tend to spend a lot of time talking about all the digital practices you need to engage in to stay safe. But this causes us to overlook other risks, such as someone stealing your computer or phone.

Of course, if this does happen, then you should still be okay if you’ve managed to secure your devices. But the best thing to do is take all possible steps to ensure this doesn’t happen. So if you haven’t already, then install a lock on your office door, and make sure to use it when you’re not in there working. Furthermore, consider investing in a fireproof lock box to store important documents.

5. Shred Important Documents

While it’s true we live in a digital world, paper still has a place. And many of the paper documents we do receive are filled with sensitive information. Get into the habit of shredding any and all documents you get that have even an inkling of your personal information on them. This might seem excessive at first, but all it takes is a bill or statement falling into the wrong hands to compromise an account and give a hacker access to all of your personal information.

Stay Safe Out There

It’s true that cybercrime is on the rise. But this doesn’t mean you will automatically be a victim. Hackers want easy targets that will give them a good return on the time spent acquiring valuable information. So make sure to follow the steps outlined here to make it harder for people to get at your most sacred and sensitive digital information.

About the Author: Kevin Conner is the founder of a lead generation and customer acquisition service Many of his clients are eCommerce companies, so Kevin has had first-hand experience with the importance of cybersecurity, something he likes to share with other entrepreneurs and business leaders whenever he can.

Been a Victim of Ransomware? Contact Axiom Cyber Solutions

Been a Victim of Ransomware? Contact Axiom Cyber Solutions

One of the first things that you should do following a ransomware attack is to alert the authorities. While the FBI and local law enforcement may not launch a formal investigation into the incident, they do want to be informed of the incident. The FBI released guidance on ransomware in 2018 that does not encourage the payment of ransomware but acknowledges that sometimes businesses will be forced to make the difficult decision of payment for the restoration of their files (I-091516-PSA). The FBI states that “The FBI does not support paying a ransom to the adversary. Paying a ransom does not guarantee the victim will regain access to their data; in fact, some individuals or organizations are never provided with decryption keys after paying a ransom. Paying a ransom emboldens the adversary to target other victims for profit, and could provide incentive for other criminals to engage in similar illicit activities for financial gain. While the FBI does not support paying a ransom, it recognizes executives, when faced with inoperability issues, will evaluate all options to protect their shareholders, employees, and customers.”

Victims of ransomware are requested to contact the FBI Internet Crime Complaint Center (IC3).

How Axiom Cyber Solutions Can Help

If you have been victimized by ransomware and don’t know where to turn for help, contact Axiom Cyber Solutions for a free consultation. Axiom Cyber Solutions specializes not only in ransomware protection but also in helping the victims of ransomware. Dealing with a ransomware attack is a stressful event so having a trusted adviser on your side who knows what you are going through can make a real difference.

A Crash Course on Internet Safety for Our Children

A Crash Course on Internet Safety for Our Children

Online access is all around us and it’s especially prevalent with children. While it has many redeeming traits, including instant entree to global information from a variety of tools, it also has a dark side that includes:

  • Inappropriate content
  • Cyberbullying
  • Online predators and
  • Smartphone addiction

It’s that dark side I want to address today with simple tools and techniques to protect your children. Given that access to information is exploding using digital assistants and wearable technology, I expect this issue will continue to be a challenge for years to come.

Tips that Work

  1. Talk to your children regularly about your safety concerns. Make sure they NEVER reveal their full name, address, phone number age or school location.
  2. Remind them they are only allowed to share their passwords with you, their parents.
  3. Online predators want photos of your children and/or to meet them somewhere. Talk about this danger and encourage your children to come to you when they receive these requests.
  4. Have your child immediately report cyberbullying to you and school officials.
    Look at these tips from gov for ways to prevent it. Be sure they do not respond to cyberbullying emails, texts or social posts as these just add fuel to the fire of a bad situation.
  5. Use tools to monitor their online activity. Let’s face it: As much as you talk and try to be aware of their online activities, you can’t be with them every waking moment. Software programs can help. PC Magazine recently came out with their assessment of the top 10 monitoring tools on the market. The other key benefit: It will filter out inappropriate content when conducting an innocent search on Google and keep them away from websites you don’t want them to have access to.
  6. Have only one family PC and put it in the common area so it can be easily observed.

  7. Limit smartphone and PC screen time.
    1. With the newest edition of iOS, Apple will be integrating Screen Time, currently a separate app, into the operating system. Users can receive a weekly summary of application usage and parents can set time limits on each one. Look for other operating systems to follow their lead.
    2. Make dinner time, smartphone and TV free.
    3. Only allow so many hours per week on the computer, especially during the summer and on weekends.
  8. Add a cybersecurity solution to keep out unwanted traffic.
    Nowadays, hackers are smart. They will try and get access to your children through a method called spear phishing aimed at their social media accounts. The right home cyber solution can prevent these attacks from happening in the first place.

Understand the Laws

The Children’s Online Privacy Protection Act (COPPA) helps protect children under 13 years old from predatory or harmful websites. Each web administrator must have parental consent if they are collecting personal information from a child within this age category. Parents that believe an operator is violating COPPA, may submit complaints through the FTC’s website,, or call their toll-free number, (877) FTC-HELP.

The National Center for Missing and Exploited Children has much information about online exploitation and encourages you to report such activity to their tip line at (800) THE-LOST.

Be sure to contact your local law enforcement agency if your child has received pornography on the Internet.

Axiom Defender Home is Your Ticket to Home Protection

Our solution is installed just behind your connection to the internet, usually through a cable or DSL modem. By being the first stop in and the last stop out, the Axiom Defender inspects all internet traffic — also protecting your family against anything on the dark web, crypto-jackers, ransomware, or malware. Get started now with a 30-day free trial!


How to Make Your Passwords Worthless to Hackers

How to Make Your Passwords Worthless to Hackers

Passwords have been around since the dawn of computers. Initially they were meant to prohibit employees from accessing the wrong accounts and keep competitors away from your company’s trade secrets. However, they have long outlived their effectiveness in today’s cyber risk world.

According to Verizon’s 2017 Data Breach Investigation Report, compromised passwords are, by far, the most prevalent gateway for hackers to get into personal and company information. 81% of data breaches last year occurred via weak or stolen passwords. Believe it or not, 17% of users still use 123456 and 10% use password as their passwords.

Here are six password strategies to keep bad actors at bay.

Create Hard-to-Guess Passwords

There’s been a lot of discussion about what makes up a good password. Most organizations endorse a password practice of length, made up of alpha, numeric and special characters. The problem is you may not remember it if it’s too difficult. Even worse, you’ll store it on a sticky note beside your computer, so you can reference it often.

NIST recently came out with a recommendation to choose a very obscure long phrase, something you only know. For example, your favorite movie as a kid. Or your childhood best friend’s first and last name. Their research states the right choice, if it is more than eight characters, is more effective than a combination of letters, numbers and special characters.

Use Different Passwords for Different Apps

If you use one or two of the same passwords for many sign-ins, you will make a cybercriminal’s day. Create a unique password for each sign-in.

Change Them Often

Establish a policy regarding password changes. I recommend they be altered at least every 90 days.

Use a Password Manager

Only want to remember one password? Companies like Dashlane, LastPass, and RoboForm store all your passwords in one location.

Use Multi-Factor Authentication (MFA)

First, there were passwords. Then, there was two-factor verification. Now, prepare for multi-factor where a password, code and something unique to you (i.e. voice, face, fingerprint) identifies that you should have access to that data.

While MFA isn’t available everywhere, I strongly recommend you implement 2FA now, so when the next layer is available, you are ready.

Check for Email Breaches on a Regular Basis

Using a tool like have i been pwned? can help identify which applications associated with your email address have been compromised and the type of data that was stolen. Change passwords immediately for those apps at risk.


Brought to You by Axiom Cyber Solutions

Even with the best password strategy, you still need a holistic solution that makes your company’s data nearly impenetrable. We’ll monitor your network 24 hours a day and update your systems hundreds of times per day to ensure your organization has the highest levels of protection. Give us a call today at (800) 519-5070 to learn more!

Everything You Need to Know About Studying Cyber Security at Degree Level

Everything You Need to Know About Studying Cyber Security at Degree Level

You’re interested in pursuing a career in cybersecurity, but aren’t sure where to start. What does a career path look like? Compared to other established industries, cybersecurity is still in its infancy in the civilian sector, which means there isn’t a clearly defined path to enter this growing sector. Unlike other industries, however, this isn’t one where you get your degree, land a job and then coast through it. We’ve mentioned previously on Axiom Cyber how jobs in this field require you to be driven and constantly on top of the latest technology and trends.

As with all computer science related degrees, cybersecurity studies are heavily math-intensive, and as such require strong analytics and statistical analysis skills. Cyber security degrees that are offered are associate, bachelor’s, master’s and doctoral levels. An associate degree will prepare you for entry-level positions related to support, programming, help-desk IT, and basic network administration. A bachelor’s degree will build on that knowledge to open up mid to upper level positions by providing you with skills in software development, network security, as well as forensics and tactics to defeat cyber-crime. Cyber Security Degrees website reveals that with a master’s degree you will be prepared for more senior level positions, or able to step into mid-level roles with less experience.

While it’s possible to find entry or mid-entry level positions with an associate or bachelor’s degree, many employers, like government agencies and established corporations, will require candidates to have a master’s degree in cybersecurity. In their feature on cybersecurity career paths, Learn How To Become notes that a master’s degree provides advanced instruction on protecting computer networks. While it will take an extra one or two years to complete, it does provide you with better skills to tackle network security defense techniques and countermeasures. A master’s degree also allows you to specialize in areas like cryptography, digital forensics and risk analysis among others.

Degree programs are available both in class or exclusively online, with the latter a convenient option adaptable around work and family schedules. Online degrees also allow you to work at your own pace without the need to attend classes every day. Maryville University breaks down how a master’s degree in cybersecurity also has a big return on investment, with top earners receiving six-figure salaries. Therefore, a master’s degree in cybersecurity can help you land management level or even C-suite positions, with companies offering better sign-on bonuses, relocation pay, and free medical insurance. You can later further your education by pursuing a doctoral degree, which will prepare you for leadership roles and allow you to innovate new solutions.

Even if you’re not in a tech position currently, VP of cybersecurity at IT security firm Infoblox, Rod Rasmussen recommends that you should start learning IT fundamentals on your own. Self-directed learning and experimentation are critical. Once you have that, build on that knowledge by applying for a degree program and complete certifications. Many established cybersecurity analysts got their start working in entry-level IT jobs and amassed experience in positions like network administration or programming. They studied on their own, then went on to complete degree programs and various certifications, to allow them to learn new skills and stay abreast of new technologies and security measures.

Article intended only for the use of

Submitted by HackersAway18

Own a Cannabis Business? You Need Cybersecurity

Own a Cannabis Business? You Need Cybersecurity

You wouldn’t necessary think this, but a cannabis business holds a treasure trove of information bad actors are anxious to steal. Because the industry is in its infancy, hackers are very attracted to it, hoping cybersecurity isn’t even on your radar. If they get in, they will sell your data on the dark web, encrypt it for ransomware, or even worse, provide it to your competitor down the street.

Consider this: At a minimum, your business holds a customer’s personal, and perhaps, their medical information. This includes their date of birth, driver’s license number, SSN, credit card number and medical information.

Add to the fact you are bound by at least two regulations, HIPPA if you are a medical marijuana establishment and PCI-DSS if your business accepts credit cards.

This blog will focus on ways to protect that data and keep your business going and growing!

Five Proactive Measures to Protect Your Business

  1. Use an airtight Point of Sale (POS) system.
    Make sure your POS network offers end-to-end encryption for credit card transactions. In addition, call your provider and review how your customer’s data is protected, where it is stored and how you will be alerted if critical updates are needed on the system. If there isn’t a systematic process to their offering, switch POS providers as soon as you can.
  2. Establish a system integration plan.
    Your business may have several apps such as QuickBooks and BigCommerce that you want to sync on a real-time basis with your POS system. While this makes great business sense, you may be leaving gaps for cybercrimes to happen. This is where a good cybersecurity audit comes in to measure your vulnerabilities and fix them before they become problematic.
  3. Keep employees out of data silos they don’t need to do their jobs.
    Establishing who can access your data and at what level is vital to making sure one of your own doesn’t accidently open the gate to a hacker.
  4. Make sure your operating systems, applications and anti-virus software is up to date.
    This is the number one method cybercriminals get into your system.
  5. Outsource cybersecurity.
    Look for a firm that has the following capabilities:

    1. Security Operations Center that can continuously monitor your network
    2. Security Information and Event Management analytical tool that provides real-time analysis of security alerts generated by applications and network hardware
    3. User and Entity Behavior Analytics models to identifies typical and atypical behavior of humans and machines within a network.

About Axiom Cyber Solutions

We can provide your cannabis business with a holistic solution that is nearly impenetrable, using all the tools and techniques listed above. We will monitor your organization around the clock and make hundreds system updates per day to keep hackers out. Contact us today for more information!

A Cybersecurity Action Plan for Your Virtual Workforce

A Cybersecurity Action Plan for Your Virtual Workforce

According to Global Workplace Analytics, approximately 50% of all organizations have positions where employees can work remotely, all or some of the time. This number has grown 115% in the last thirteen years and is expected to continue to rise in the coming years.

However, with this flexibility, comes potential risk to your data. As virtual workers pick up and go from their home to the local coffee shop to a client meeting, the level of system security diminishes. The risk is especially high in open, and usually free, Wi-Fi areas.

The good news is there are practices you can implement today to make the virtual worker’s environment safer.

7 Cybersecurity Practices for Your Remote Workforce

  1. Make sure every operating system, applications, antivirus and anti-malware software is up to date. This can be a challenging task to complete if your workforce resides all over the country and only comes into the office once or twice a year.

    However, if you hire a cybersecurity company, they can identify your vulnerabilities through an assessment, know where your risks are and help fix them right away.

  2. Make cybersecurity training mandatory. You can help users identify suspicious emails, spear phishing and who they should call if they aren’t sure about a message. Reinforce the training in conference and video calls. Be clear about the repercussions if they violate protocol.
  3. Activate a Virtual Private Network (VPN) service. If your workforce must sign in via a public network, the right VPN will provide a high level of encryption for all transactions going to and coming from your company.
  4. Implement Perfect Forward Secrecy (PFS). These are specific key agreement protocols that gives assurances your session keys will not be compromised, even if the private key of a server is hacked. This is good protection if the remote user’s laptop or tablet is infected with malware. It limits the hacker’s access to one server or a partition of your cloud services.
  5. Be able to disable and wipe clean remote devices. If a worker’s device is stolen or lost, its vital you can disarm it right away.
  6. Establish a different password policy. According to the National Institute of Standards and Technology (NIST) passwords need to be obscure, long and For example, putting together alphanumeric combinations a user can remember, but no one else will, can be almost impossible to crack. An example might be a house address of long ago, the user’s favorite childhood sport and their last movie title.

    In addition, the NIST determined that changing passwords every few months did not enhance security, because most users don’t make significant changes to their existing password when forced to make a change.

  7. Implement proactive practices.
    Rather than being reactive to a situation, put in place the following:

    1. Outsource cybersecurity. The right organization can continuously assess, monitor and protect your network and workforce no matter where they are or what time they access their data.
    2. Obtain cyber liability insurance. In the event of a breach, in which personal information, such as Social Security or credit card numbers, are exposed or stolen, this will garner you the protection you need.
    3. Establish a remote workforce policy. The key is to be fair to everyone and still protect your business. Many individuals enjoy working from home because they have more freedom, don’t have to make a long, stressful commute and can have more balance in their lives. Gain buy-in to the policy and have consequences if individuals violate them.

Axiom Cyber Solutions Can Manage Your Remote Users

Our Managed Cybersecurity Solution which includes next-generation firewall Intrusion Detection and Prevention (IDS), managed anti-virus, network monitoring, and patch management is available for a low monthly subscription fee. Contact us today for more information!

HARDCAR Distribution Partners with Axiom Cyber Solutions to Help Cannabis Businesses Protect Their Customer and Business Data

HARDCAR Distribution Partners with Axiom Cyber Solutions to Help Cannabis Businesses Protect Their Customer and Business Data

As the cannabis industry continues to grow, so does the amount of business intelligence and personal information available to hackers and other entities, making cybersecurity more critical now than ever before.

June 26, 2018 – (Palm Springs, CA) – HARDCAR Distribution is excited to announce a newly minted partnership with Axiom Cyber Solutions to protect businesses in the cannabis industry from cyber attacks and the theft of valuable data. New businesses are coming online every day as the cannabis market explodes throughout the United States and Canada, making them prime targets for hackers.

Although HARDCAR Distribution brings years of security experience to the cannabis industry ensuring the safe and secure transport of cash and product, they understand the importance of protecting their clients on every level. With Axiom’s team of infrastructure specialists, developers, database and business intelligence experts, and project managers, growing cannabis businesses now have a full-service solution with the addition of cutting edge cyber security technology.

“There are few industries bringing the kind of attention like the cannabis industry, so partnering with Axiom was a no-brainer. Not only do they provide an incredible service, but they do it at a relatively inexpensive price that startup businesses can afford. The future for cannabis is massive and we need to make sure everyone is protected!” – Todd Kleperis, HARDCAR Distribution CEO

Axiom Cyber Solutions offers solutions that keep valuable information safe and secure, monitoring 24 hours a day to ensure the highest levels of protection against hackers and other entities. As medical and recreational cannabis become legal across North America, cannabis businesses are at greater risk of having their patient information, intellectual property, distribution and route information, vehicle information, and other valuable data, stolen.

“An important aspect of the cannabis industry is the reputation of your business and there’s no worse way to compromise it than having to tell your customer’s that you’ve lost their data in a breach. Besides your customer data, you have proprietary information on your blends, grow operations, and business practices that competition would love to have. And lastly, the industry is investing heavily in smart, internet-connected technologies to aid and improve grow operations and these systems need to be protected. Could you imagine having an entire crop destroyed because someone hacked in a changed the environmental settings of your internet-connected HVAC systems?” – Troy Wilkinson, CEO of Axiom Cyber Solutions

Although data management and cyber security are often the last item on an organization’s lengthy to-do list, the need for a secure platform is more critical now than ever before. As the cannabis industry continues to grow, small operations are expanding into large scale ones and companies are scrambling to find solutions to their network and IT security. Axiom offers a variety of solutions to keep businesses secure:

  • Managed Enterprise Cybersecurity
  • Continuous Risk and Compliance Monitoring
  • Vulnerability and Penetration Testing
  • Smart Home Cybersecurity

The cannabis industry offers a massive amount of valuable information, including Personal Identifiable Information (e.g. SSNs, Birth Dates, Addresses, etc.), Protected Health Information (e.g. patient name, address, certification/license numbers, medical record numbers, health related information, account numbers, SSNs, etc.), and Business Intelligence (e.g. research and development, inventory, product intelligence, software applications, payouts, manifests, equipment, sales, etc.). Unfortunately most business systems are being monitored by untrained staff, or not being monitored at all, putting companies at a huge risk.

With this risk being so high, HARDCAR and Axiom are dedicated to protecting their clients on every level, including threats against cyber attacks and data theft. For more information, please contact Axiom Cyber Solutions at or call at (800) 519-5070.

Media Contact
Jon Pierce

About HARDCAR Distribution

HARDCAR is an award-winning and long-time contributor to the cannabis space, with a proven track record of cultivating and solidifying meaningful relationships throughout the industry. From packaging, to distribution, secured storage, and transport, HARDCAR Distribution has all aspects of cannabis retail covered. Through collaboration with our diversified team of highly qualified and talented professionals, we help cannabis businesses stand out in the industry by providing the highest quality industry services that keep our partners’ products safe, while maintaining excellence and compliance throughout our work.

For more information, please visit

About Axiom Cyber Solutions  

Axiom Cyber Solutions strives to be the leading cyber-security technology partner by providing world-class solutions that are intelligent, adaptive, innovative, and automated. Through our technology solutions, we enable our clients to be disruptive in their markets while remaining focused on what they do best. We believe in the saying “if you find a job you love, you never work another day in your life”. We seek to cultivate a culture that attracts energetic, motivated, and creative individuals that share our passion for technology.

7 Cybersecurity Threats Every K-12 School Faces

7 Cybersecurity Threats Every K-12 School Faces

Ransomware. DDoS. Phishing. Identify theft.

Sadly, schools across the United States are becoming very familiar with these terms. In fact, recent research indicates that K-12 institutions will have the highest rate of ransomware attacks of any industry in the coming years.

For example, the release of sensitive student and teacher information can lead to identity theft. A hacker’s encryption of students’ grades and teachers’ lesson plans can lead to loss of productivity (especially if they are not backed up) and thousands of taxpayer dollars being spent to replicate data that is gone.

As you to turn to the 2018-19 school year, this is your opportunity to make cybersecurity a budget priority. Here are seven reasons why it’s important:

  1. Clickbait.
    The email may look legitimate but unfortunately, it is not. Embedded in the text is a hyperlink that sends you to a malicious site. This link has now taken down your school’s system.Solution: Ensure every employee has the highest email filter settings for spam, phishing and executable files. Employees should also be trained on what suspicious emails look like and always report suspected emails to the IT department.
  2. Outdated Technology.
    Your school may feel they need to hold onto computers and tablets until they break. The problem with this plan is they may not support the current operating system, which opens you up to a cybersecurity breach.Solution: Do a complete inventory of all your computer equipment. Make certain it runs iOS 11.3.1 for iPhones/iPads, macOS 10.13.4 for Mac computers and Windows 10 for PCs. For all devices that do not support these versions, disengage them from your network today. Purchase new devices to replace them before or during the next fiscal year.
  3. Not Paying Attention to Patches.
    All operating systems require patches from time to time.Solution: When your computer tells you updates are needed, complete them within a few hours. It will require a restart however, many patches have security updates within them.
  4. User Error.
    When users are allowed access to sensitive and/or confidential data, there is always a risk for exposure.Solution: Partition student, administration and public networks. Practice whitelisting which allows only a handful of individuals into the classified information, blocking nonessential personnel from that data.
  5. Allowing Weak Passwords and not having a Change Policy.
    Passwords less than 14 characters are problematic and/or not enforcing changes of the passwords can lead hackers right to your data’s door.Solution: Make strong passwords a norm, along with two-factor authentication. Provide an automated system that requires password change every 60- to 90-days.
  6. No tools.
    Its time to think of your school network, more like a bank. These financial institutions have a vault, security guards and cameras – different methods to keep your money safe. The same goes for cybersecurity. You need the right tools to keep all the data out of the hands of hackers.Solution: From Mobile Device Management to cybersecurity audit and monitoring, speak to a cybersecurity expert for a full understanding of the best tools for your school system.
  7. Vulnerability testing is nonexistent.
    Without continuous checking, hackers will continue to try and access your data. 

Solution: Initially, you need a cybersecurity organization to analyze the vulnerabilities in your network and recommend fixes. Once those solutions are in place, its vital to have 24/7 monitoring of your network to ensure your data is safe.

Start a Conversation with Axiom Cyber Solutions

We can protect your school from cyberthreats at a very reasonable cost! Give us a call at (800) 519-5070 today to learn more about our offerings!

FBI Recommends Home & Small Business Owners to Reboot Their Routers

FBI Recommends Home & Small Business Owners to Reboot Their Routers

As news has broken about the FBI’s warning to consumers and small business owners about rebooting their routers, many have reached out to Axiom to ask what do they need to do. Our advice to them is what the FBI has recommened: if you have one a cable modem or router at home, do a quick unplug/replug of the router (D-Link, NetGear, etc). The good news is the FBI has taken control of the domain that was harvesting the information so even if you were infected, the FBI is just collecting information to find how widespread the infection was (500,000 devices are suspected to be infected).

What is VPNFilter?

VPNFilter is a malware, that contains a killswitch for routers (meaning it can permanently shutdown your device) and it also could steal usernames and passwords. The infection appears to be hitting Ukraine hard but has been found in 54 countries.

Good News?

There is some good news for some users. If you have kept on top of firmware updates and changed the default credentials on your devices, you may be protected. But as we know, most of us never log in and update our cable modem’s firmware.

Axiom’s customers are protected from VPNFilter through a combination of rules that restrict access to our devices as well as addition of the known bad addresses to our blocklists.