That Fake App Just Stole Your ID

Ryan loved tweaking photos on his Android phone.

He’d heard rave reviews from his friends with iPhones about Prisma, a new iOS app for image editing. So when he heard Prisma would soon be released for Android, he logged in to the Google Play Store to see if it was there yet.

To his surprise, he found one that looked just like what his friends were describing. Delighted, he downloaded and started using it. Meanwhile, the app (a fake) was busy installing a Trojan horse on his phone.

When he got to work the next day, he logged his phone into the company network as usual. The malware jumped from his phone to the network. Yet no one knew. Not yet, but that was about to change…

Now, this isn’t necessarily a true story (at least, not one we’ve heard of—yet…), but it absolutely could have been. And similar situations are unfolding as you read this. Yes, possibly even at your company…

Fake apps exploded onto iTunes and Google Play last November, just in time for holiday shopping. Apple “cleaned up” iTunes in an effort to quell users’ concerns, but hackers still find workarounds. Unfortunately, these fake apps pose a real threat to the security of your network. Especially if your company has anything but the strictest BYOD (bring your own device) policies in place. And the more your network’s users socialize and shop on their smartphones, the greater the risk of a damaging breach on your network.

Fake apps look just like real apps. They masquerade as apps from legitimate merchants of all stripes, from retail chains like Dollar Tree and Footlocker, to luxury purveyors such as Jimmy Choo and Christian Dior. Some of the more malicious apps give criminals access to confidential information on the victim’s device. Worse yet, they may install a Trojan horse on that device that can infect your company’s network next time the user logs in.

So what can you do?
First, keep yourself from being fooled. Anyone can easily be tricked unless you know what to look for. Take the following advice to heart and share it with your team:

Beware of Fake Apps!

In case you weren’t aware, one of the latest and most dangerous Internet scams is fake apps. Scammers create apps that look and behave like a real app from a legitimate store. These fake apps can infect your phone or tablet and steal confidential information, including bank account and credit card details. They may also secretly install on your device malicious code that can spread, including to your company network.

Take a moment and reflect on these five tips before downloading any app:
When in doubt, check it out. Ask other users before downloading it. Visit the store’s main website to see if it’s mentioned there. Find out from customer support if it’s the real McCoy.
If you do decide to download an app, first check reviews. Apps with few reviews or bad reviews are throwing down a red flag.
Never, EVER click a link in an e-mail to download an app. Get it from the retailer’s website, or from iTunes or Google Play.
Offer as little of your information as possible if you decide to use an app.
Think twice before linking your credit card to any app.

Most importantly, get professional help to keep your network safe. It really is a jungle out there. New cyberscams, malware and other types of network security threats are cropping up every day. You have more important things to do than to try and keep up with them all.

The Most “Bullet-Proof” Way To Keep Your Network Safe
Let’s not let your company become yet another statistic, hemorrhaging cash as a result of a destructive cyber-attack. Call WAMS TODAY at 800-421-7151, or e-mail me at alopp@wamsinc.com, and let’s make sure your systems are safe. We’ll provide you with a Cyber Security Risk Assessment to check for and safeguard against any points of entry for an attack.

How Can You Go From Reactive to Preventive IT?

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content. But one thing does need clarification: What exactly are “proactive cyber-security” measures?

Understand the Threats You’re Facing

Before any small- or medium-sized business can work toward preventing cyber-attacks, everyone involved needs to know exactly what they’re fighting against. Whether you’re working with in-house IT staff or an outsourced provider, you should review what types of attack vectors are most common in your industry. Ideally, your team would do this a few times a year.

Reevaluate What It is You’re Protecting

Now that you have a list of the biggest threats to your organization, you need to take stock of how each one threatens the various cogs of your network. Map out every device that connects to the internet, what services are currently protecting those devices, and what type of data they have access to (regulated, mission-critical, low-importance, etc.).

Create a Baseline of Protection

By reviewing current trends in the cyber-security field, alongside an audit of your current technology framework, you can begin to get a clearer picture of how you want to prioritize your preventative measure versus your reactive measures.

Before you can start improving your cyber-security approach, you need to know where the baseline is. Create a handful of real-life scenarios and simulate them on your network. Network penetration testing from trustworthy IT professionals will help pinpoint strengths and weaknesses in your current framework.

Finalize a Plan

All these pieces will complete the puzzle of what your new strategies need to be. With an experienced technology consultant onboard for the entire process, you can easily parse the results of your simulation into a multi-pronged approach to becoming more proactive:

Security awareness seminars that coach everyone — from receptionists to CEOs — about password management and mobile device usage.
“Front-line” defenses like intrusion prevention systems and hardware firewalls that scrutinize everything trying to sneak its way in through the front door or your network.
Routine checkups for software updates, licenses, and patches to minimize the chance of leaving a backdoor to your network open.

Web-filtering services that blacklist dangerous and inappropriate sites for anyone on your network.
Antivirus software that specializes in the threats most common to your industry.
As soon as you focus on preventing downtime events instead of reacting to them, your technology will begin to increase your productivity and efficiency to levels you’ve never dreamed of. Start enhancing your cyber-security by giving us a call for a demonstration at 800-421-7151.

Hyperconvergence Improves Virtualization

Don’t worry, we’ll keep this one simple. Virtualization is confusing enough, and hyperconvergence is one of the newest solutions within the field, making it even harder to grasp. The quick and easy summary is this: Hypconvergence is about virtualizing the hardware and software components required to deploy and manage databases and virtualized desktop infrastructures. Not simple enough? No problem, all we’re covering today is the great benefits you can achieve with this solution.

Using a hyperconvergence model to structure your network is very representative of the current trends in small- and medium-sized business technology. It’s about making enterprise-level solutions more accessible to those looking for a smaller scale. So although a lot of these benefits sound like the same points we argue for other technologies, let’s take a look at how they are unique to hyperconvergence.

Software-Centric Computing

It may not sound huge at first, but by packing everything you need into a single box, and wrapping that box with a flexible and adaptable management software, you empower your hardware infrastructure to receive more regular patches and updates. This makes it much easier to add more hardware later, or restructure what you’re currently using.

Unified Administration

Hyperconvergence consolidates a number of separate functions and services into one piece of technology. Whoever is managing your virtualization services can tweak storage, cloud, backup, and database settings and workloads from one place.

Streamlined Upgrading

Different hyperconvergence “boxes” come in different sizes and capabilities. So all it takes to scale up is buying another unit based on your forecasted needs. If you’re in a place where all you need is a little extra, purchase a smaller upgrade. But when you’re expecting rapid growth, a bigger box will ensure your IT can expand with your business.

Stronger Data Protections

Complexity is the achilles heel of most networked IT. When a small group of people are trying to stay on top of a mounting pile of account management settings, malware definitions, and data storage settings, it’s hard to keep constantly probing cyber-attackers from finding a security hole. But with a hyperconvergence infrastructure, your virtual machines aren’t built by bridging a series of third-party services together — it’s all one service.

Keep in mind that while hyperconvergence is simpler than most virtualization solutions, it’s not so simple as to be managed by in-house IT departments at more small- and medium-sized businesses. The benefit of a more unified virtualization solution when you already have a managed services provider is the speed at which your growth and evolution can be managed.

The better your technology, the faster we can make changes. And the faster we can accommodate your needs, the less downtime you experience. Call us today to find out more about a hyperconverged system.

4 Ways IoT Will Change the Game

From smart thermostats to wearable devices, the Internet of Things (IoT) has reinvented the ways both businesses and individuals connect. Many IT experts have even labeled IoT as a “game changer,” and while we’re usually skeptical of this term when it comes to new technology, IoT devices can open up your business to a multitude of possibilities. Here are four of them.

Improved Logistics
With IoT sensors, supply chain management and order fulfillment processes improve markedly to meet customer demand. For example, sensors on delivery containers and trucks in transit give managers real-time status updates, allowing them to track their items and ensure they reach the right location at the right time.

Streamlined Inventory
IoT also presents automation opportunities for businesses that need to manage and replenish their stock. When data recorded from IoT devices are tied to your enterprise resource planning (ERP) system, you can accurately monitor your inventory, analyze purchase and consumption rates of a particular product, and automatically reorder items when IoT sensors detect that supply is running low. This minimizes out-of-stock incidents and prevents excess stock build-up.

Fast Payment
Given how most payments are done electronically via point-of-sale systems or the internet, IoT has the potential to revolutionize the way businesses process transactions. We’re already seeing a few examples of this today as ApplePay not only allows users to purchase goods and services using smartphone applications, but through wearable technology as well.

Soon enough, IoT devices might even allow restaurants and retailers to register or charge their customers the moment they walk through the door.

Market insight
Businesses that can somehow make sense of IoT-collected data will gain a competitive edge. Marketers, for example, can gather valuable insight into how their products are used and which demographic is utilizing them the most. This information can then inform future marketing efforts and give businesses more direction on how to improve their products and services for their customers.

Although businesses will certainly face many challenges in implementing the Internet of Things, those who manage to overcome them will reap all the benefits of this burgeoning technology.

Want to know if an IoT deployment is right for your business? Contact our certified IT consultants today.

5 Reasons to Purchase CRM Software

Failure to understand your customers’ needs and wants could result in ill-informed marketing strategies. When your company can’t satisfy their demands, they’ll likely turn to your competitors instead. To prevent this, deploying a customer relationship management (CRM) system can make a world of difference. Here’s a handful of reasons to make the switch.

Grows With Your Business
The ol’ Rolodex may have been useful for managing a few clients, but you’re going to need a better solution if you plan to maintain relationships with hundreds, possibly thousands, more. CRM scales with your business, meaning it can handle larger data sets and more clients as you expand your sales operation.

Organizes Your Data
CRM software acts as a central database for all your sales records and transactions. This means important customer information can be retrieved in just a few clicks rather than rifling through thousands of documents, sticky-notes, and disorganized cabinets. And since CRM is hosted in the cloud, sales data, customer interactions, and other actionable information are available for the entire company.

Improves Customer Service
Your sales team could be the most persuasive individuals in the world, but this means nothing if they can’t recall anything about their clients and their preferences. When your sales staff follows up on leads or existing customers, CRM will automatically retrieve contact history, past purchases, and customer preferences from your client database and display them on a single page during the call.

From here, sales representatives, armed with detailed customer information, will be able to recommend products and services that meet the client’s needs. So instead of struggling through a sales call, marketing employees can focus on delivering a professional sales pitch.

Streamlines Your Sales Funnel
CRM comes equipped with workflow management functions, supporting your sales pipeline in a number of ways. For example, you can configure your CRM to send instant follow-up emails when a lead visits a particular product page. You can even use automation to track where certain leads are in the sales pipeline and delegate the task to one of your closers.

Analyzes Sales Data
With real-time sales information, business managers can track marketing campaigns and adjust their strategy accordingly. For instance, you might notice that click-through-rates for promotional emails and company newsletters are higher during Tuesday afternoon rather than Friday night. Having this information can help you focus your marketing efforts and message to generate more leads.

In addition, you can use CRM to analyze customer calling activity, market demographics, lead conversion rates, and key performance indicators to help inform future business decisions.

Understanding your customers can put you several steps ahead of the competition. If you need to manage contacts, eliminate time-consuming procedures, and improve your sales performance, CRM is the perfect business solution.

Email us today to find out whether CRM is the right fit for your business at info@wamsinc.com.