Smartphone glowing with security alert notifications on nightstand at 3 AM with red digital alarm clock showing the time and hand reaching to answer

The Early AM Alert No One Answered: A Christmas Day Ransomware Attack

The week before Christmas, in the early hours of Christmas Day, a security system detected something unusual. A desktop device inside a company’s network had been compromised. Then the attackers moved laterally, reaching two domain controllers. The controllers began making suspicious connections to endpoints linked to known ransomware operations.

The security platform alerted at every stage. Every lateral movement. Every suspicious connection. Every indicator of compromise.

No one acted.

“Although the system had alerted to this activity at every stage,” the security company later reported, “the security team was under great stress during the December period and did not manage to action even these highly critical alerts.”*

The attackers waited. On Christmas Eve, after business hours, the threat re-emerged. Suspicious executables were written. Data was exfiltrated. And in the early hours of Christmas Day, while most employees were offline opening presents with their families, the ransomware payload executed.

The alerts had done their job. The coverage gap turned a detected threat into a full-scale breach.

How would your team manage this situation?  Take The 3 AM Test

Read more “The Early AM Alert No One Answered: A Christmas Day Ransomware Attack”

Office worker at desk with wall clock visible, reviewing computer screen in bright fluorescent-lit corporate office setting, illustrating the critical first hour of a network breach.

The First 60 Minutes: What Happens When Your Network Is Breached

The Clock Starts Now

A ransomware attack doesn’t announce itself with sirens. It starts with something small-a frozen screen, an error message, a file that won’t open. By the time most organizations realize what’s happening, they’ve already lost precious time.

The first 60 minutes after a breach begins are the most critical. What happens in that window often determines whether an incident becomes a manageable problem or a catastrophic failure.

Here’s what actually happens-minute by minute-when ransomware hits an organization that isn’t prepared.

Take Our 2-Minute Security Assessment

Read more “The First 60 Minutes: What Happens When Your Network Is Breached”

Featured Forbes SMBs

Article: How Bad Could It Be? Three Key Steps For Preventing An SMB Cybersecurity Disaster

This article first appeared on Forbes.com on June 2, 2022. Dylan Natter is the CEO and founder of centrexIT, a San Diego-based Managed Service Provider devoted to industry-leading standards of professionalism and care.

We all know cybersecurity is a serious threat, so I won’t bore you with statistics you’ve heard a thousand times. But consider this: Studies indicate the cybercrime industry is more profitable than the worldwide illegal drug trade. Cyberattacks will continue and are only going to increase, especially with global conflict and political unrest on the rise. Bad actors leverage technology to automate attacks. They don’t care who you are, so small to midsize businesses (SMBs) are not immune.

Read more “Article: How Bad Could It Be? Three Key Steps For Preventing An SMB Cybersecurity Disaster”

5 Top IT Security Habits

5 Top IT Security Habits

We recently teamed up with PBO Advisory Group and Franklin | Soto to present the top best cyber practices to help protect your organization’s valuable IT and financial assets. The 5 top IT security habits we shared in the webinar will help your business get started right away with a better IT security posture. 

Listen to the full webinar, “Hacking Is on the Rise.”  

Read more “5 Top IT Security Habits”

Why You Need a Security Plan for Microsoft 365

Why You Need a Security Plan for Microsoft 365

In our recent webinar with Veeam, we reviewed why you need a security plan for Microsoft 365. When Microsoft 365 was officially announced in 2017, it came as the next obvious evolution of the already powerful collection of Microsoft office tools. From a collaboration perspective, it provides an elegant solution to connect and empower remote team members. From an IT perspective, it streamlines IT management of users, devices, apps and services. And best yet, it uses integrated, intelligent security to safeguard company data, customer data, and intellectual property. If security is already baked into the software, why do you need a security plan for Microsoft 365?

Webinar recording: Microsoft 365 Security and Backup: Why You Need It.

Read more “Why You Need a Security Plan for Microsoft 365”

Podcast: The Digital Nomad

Podcast: The Digital Nomad

Darin Andersen and Merrin Muxlow from Seamless Podcast welcome special guest Sean Ernst, in this podcast episode “Smart Cities: Digital Nomad.”

“The missing link for us was a platform that allowed us to develop…but not be full-blown developers 100% of the time. So throughout the many trials and tribulations of looking for the right platform, we ended up partnering with a local San Diego company that had done just that.”

In this Smart Cities episode, Sean Ernst talks about the changed workplace environment from an IT and technology-use perspective, including work life during Covid-19, digital transformation and the digital workplace, the rise of the digital nomad, and the future of technology for human communication. He also discusses the new innovation platform being created by Dreamtsoft and centrexIT that is poised to transform the MSP world.

Listen here or on your favorite platform below. Quick transcript reference:

  • 00:02:43 Darin introduces Sean Ernst
  • 00:04:48 High-level market trends and application sprawl
  • 00:07:10 Efficient online collaboration improves efficiency & reduces working day
  • 00:09:29 Dogs barking & other new distractions when working from home
  • 00:12:14 How the shared experience of the WFH “new normal” has helped grow understanding & compassion for the WFH situation
  • 00:14:52 Managed IT platform development with Dreamtsoft & centrexIT
  • 00:18:40 How the new platform with help shape the IT industry
  • 00:21:52 The importance of having top-notch HR practices to support remote work and how accessing great talent is one of the benefits of a remote business structure
  • 00:25:37 Darin discusses how technology has shaped communication over the years
  • 00:28:42 How collaboration platforms have spearheaded new forms of language and communication
  • 00:35:48 What will future technology do to communication?
  • 00:29:42 Closing thoughts and contact info

 

Sean Ernst travels as a Digital Nomad while spearheading the MSP industry’s cutting-edge technology

Full Transcript

Read more “Podcast: The Digital Nomad”

Article: How MSPs Can Self-Regulate To Keep Businesses Safe

In the historically unregulated MSP industry, self-regulation is key to keeping businesses safe.

In this Forbes Technology article, Dylan Natter, CEO of centrexIT, exposes the correlation between the overall security of a company and the cybersecurity practices of their Managed Service Provider.

With damage related to cybercrime projected to hit $6 trillion annually in 2021, the critical importance of cybersafety cannot be understated, especially since the widespread shift to working from home has stripped users of traditional protections. Everything from the security of work from home users to broader system security can and must be considered.

Read full article on Forbes

Article: How MSPs Can Self-Regulate To Keep Businesses Safe

Podcast: The Digital Workspace

Darin Andersen and Kim Hakim from Seamless Podcast welcome special guest Dylan Natter, in this podcast episode “Futurecon: The Digital Workspace.”

It’s been a challenge to say the least. People have had to adapt and transform their skills almost overnight.

In this Futurecon episode, Dylan speaks about providing IT services during Covid19, the transition from the Digital Office to the emerging Digital Workspace, and cybersecurity in remote environments. He also shares his 20 years worth of entrepreneurial experience and perspective of numerous topics related to IT and cybersecurity. Additionally, Dylan discusses a new MSP software product centrexIT is developing that will radically change how the MSP industry operates.

Listen here or on your favorite platform below. Quick transcript reference:

  • 00:03:42 Darin introduces Dylan Natter
  • 00:05:16 How “fire drill” practice prepared centrexIT to move to remote work
  • 00:07:45 The digital workplace starts with communication
  • 00:10:01 The challenge of working with dozens of clients’ applications
  • 00:13:25 Securing remote workers
  • 00:17:15 Great tech partners were critical for the large scale remote-work transition
  • 00:21:57 centrexIT partnership with Dreamtsoft for platform development
  • 00:25:32 Need in MSP industry for new IT management solution
  • 00:28:15 Dylan’s thoughts on managing IT teams for success
  • 00:29:42 Closing thoughts and contact info

 

Full Transcript

Read more “Podcast: The Digital Workspace”

Work-from-home security options

How To Secure Your Work-From-Home Users for Optimal Business Results

Now that many businesses are comfortable with working remotely, it’s time to review how to secure work-from-home users in order to achieve optimal business results.  Do you want flexibility for your users? Do you want a system that is easy to scale and manage?  We compare the top two ways of securing remote users so you can decide what is best for your business. Read more “How To Secure Your Work-From-Home Users for Optimal Business Results”