Is Remote Work Straining Your Corporate Network?

In this age of Covid-19, when most people are working at home, your network may experience downtime, or slow response time. It’s not unusual for companies to have users who are accessing the network from multiple directions. Users may also have trouble connecting in the first place, or they complain about response time and the ability to work efficiently.

The problem. In most cases, the inability to access the network is usually not a bandwidth issue, but rather a network traffic management issue. Having an intelligent, fully informed partner, knowledgeable in compliance issues as well as PacketShaper technology, is critical. Here’s how Braxton-Grant can help.

As a platinum Symantec Cyber Security partner, with certified, experienced, and cleared PacketShaper engineers, Braxton-Grant would first utilize the application to measure your network performance and view your web traffic in order to reshape new traffic patterns that reflect current use. The process includes:

  • Complete visibility of all traffic and security events with customizable usage and event analytics.
  • Valuable network intelligence information to identify and manage business applications, giving them priority over recreational applications or shadow applications that may be managed and utilized without the knowledge of the enterprise’s IT department, as well as other unsanctioned applications.
  • Ability to identify network issues accurately and rapidly with real-time monitoring and reporting – and with the ability to drill-down to the most granular traffic and threat data.

Why work with Braxton-Grant? We are a platinum, Symantec, Cyber Security partner with certified, cleared PacketShaper engineers that have years of experience in engineering, implementation, mitigation, testing and training. Braxton-Grant Technologies is available to support your transition from the discontinued PacketShaper line of products. Available support includes:

  • Bridge support. Though Symantec will no longer provide upgrades, Braxton-Grant is available for continued technical support, including policy review, troubleshooting, compliance support for network attached devices, and planning for transition.
  • After intense evaluation of options available, our certified engineers selected Allot as the best fit. To that end, Braxton-Grant’s Allot certified engineers can help maximize your transition from PacketShaper to Secure Service Gateway (SSG).

Why Allot? Allot Secure Service Gateway has been designed specifically with business in mind, providing the most efficient combination of analytics, policy enforcement and bandwidth management, thereby maximizing cost-efficiency and quality of experience for all network users.

Start your journey today with Braxton-Grant Technologies at www.Braxtongrant.com. For more information, contact Braxton-Grant at 443.545.2052.

Braxton-Grant Technologies Inc Receives Accreditation for ISO 90012015 Quality Management System IssueWire

Braxton-Grant Technologies, Inc. Receives Accreditation for ISO 9001:2015 Quality Management System

PRI Registrar recognizes Braxton-Grant Technologies, Inc. for its commitment to continual improvement in their management system

Hanover, Mar 20, 2020 (Issuewire.com) – Braxton-Grant Technologies announces that it has received accreditation for all aspects at its Hanover, MD facility including quality management, product sales as a reseller, customer support services, and professional technology and cyber security support services.

“We here at Braxton-Grant are proud that once again, working with PRI, we have received accreditation for ISO 9001:2015 in the areas of Sales, Quality Management, Professional Services, and Customer Support Services. It is a testament to the vigilance and continued focus all of us at Braxton-Grant have for process improvement in key areas that aid our ability to provide world-class products and services to our customers,” said Peter Cushley, Director of Maryland Operations for Braxton-Grant.

Braxton-Grant Technologies received accreditation for demonstrating their ongoing commitment to quality by satisfying customer requirements and industry specifications.

Braxton-Grant Technologies has demonstrated its commitment to world-class quality management by implementing and becoming certified to the ISO 9001 standard. They have joined an elite number of organizations worldwide who have achieved certification to this globally recognized quality standard,” said Randy Daugharthy, Director of the Registrar Program at the Performance Review Institute Registrar. “PRI Registrar is proud to partner with Braxton-Grant Technologies in this accomplishment and look forward to continued support of their objective of quality excellence.”

About PRI Registrar
Since 1995, Performance Review Institute Registrar, a management systems registrar, has helped a multitude of organizations achieve and realize their true potential through the development of management systems and quality systems certification. As an affiliate of SAE International, PRI Registrar is a not-for-profit organization, uniquely motivated with a mission and commitment to raise the bar in any industry it serves. To learn more information, visit www.priregistrar.org or contact PRI Registrar at priregistrar@p-r-i.org today.

Cyber Solutions Social

Join us at our new location on November 6th, 2019 for a business event! Come network with local businesses and enjoy the technical demonstrations provided by Array Networks and Fortinet. Partake in adult beverages, soft drinks, and appetizers while learning about the latest in Cyber Security. Cosponsored by Tower Federal Credit Union.

Register now at EventBrite!

8 Ways To Identify Phishing Attempts

What is phishing? 

Phishing is a cybercrime that uses electronic communication to take advantage of users. Attackers attempt to gain sensitive or confidential information, such as usernames and passwords, credit card information, and more by posing as legitimate organizations or individuals. They use social engineering to manipulate victims into clicking on malicious links and entering this information. Below are eight ways to identify a phishing email. 

Types of Phishing 

Spear Phishing 

These attacks will not look random, like a general phishing attempt. Attackers will gather information about the victim to make the email feel more authentic. 

Clone Phishing 

Attackers will make almost identical copies of previously delivered email messages and change an attachment or link to something malicious.  

Whaling 

Specifically targeting high profile and/or senior executives at organizations, they will often present themselves as legal communication or other high-level executive business. 

Methods of Phishing 

Requests for Sensitive Information.  

A legitimate organization will never ask you to enter any information that is sensitive by following a link. You will usually be asked to go to the official website or app to enter your credentials and any other information that is required. 

Generic Salutations.  

Most hackers will greet you with a “Dear valued customer” or “Dear account holder”. Sometimes, ads will not even include a greeting. These are clear signs that this might be a phishing attempt. Genuine organizations will use your full name.  

 Check the Domain.  

Don’t just check the name of the sender. Check the email address attached by hovering over the ‘from’ address. If you see any changes from what you were expecting, like numbers or letters added, this might be a phishing attempt.  

 Bad Grammar.  

Legitimate organizations will send emails that are well written. There are no spelling errors or bad syntax. Hackers believe their prey are less observant and easier targets, so they tend to have spelling errors and grammatical mistakes in what they send out.  

 Forcing You on to Site.  

If in doubt, don’t open the email. A lot of the time, emails can be coded entirely as a hyperlink so any accidental click anywhere in the email can lead you to a malicious site or start a spam download on your computer. 

 Unsolicited Attachments.  

Authentic organizations will seldom send you attachments. They will usually direct you to their website to download what you need from there. It’s not foolproof because there are times when they will send you information that you need to download, but this isn’t very common. 

 Hyperlinks.  

Always hover over any links in the email because it may not be all it appears to be. When you hover over the link, it will show you the actual URL it will direct you to. 

 Sense of Urgency.  

One of a hackers favorite methods to hook a victim is asking them to act fast, either by offering a one-time deal for a limited time or stating that your account has been compromised. It is usually best to ignore these communications. 

Email Security 

Why is email such an easy target? Because while most people know how to send and receive emails, the same cannot be said about the understanding of how emails are sent or received. This lack of understanding also make gaining access to emails so simple, that hackers just can’t resist.  

The simplicity inherent to modern email interfaces lulls users into a false sense of security. “Of course the email is secure, how could it not be?”. We can check it anywhere. Send communication from anywhere at any time with a click of a button. However, a potent combination of human error and malicious agents can make emails one of the most dangerous threats to an organizations security. Email-based threats account for 25% of all data breaches within the US and causes major losses numbering in the billions of dollars annually.  

As with all cyber security, email security starts with employee training, helping employees understand how to identify and question suspicious looking emails. Alongside this training, organizations need to make sure that they have the right tools to fight against this data theft; anti-virus filters, email filtering, email encryption and more.  

Need more info? The Federal Trade Commission can help you identify and avoid phishing scams. Also make sure your employees follow the Braxton-Grant Technologies guide on the fundamentals.  

Reducing Your Digital Footprint

digital footprint is the trail and traces that people leave behind online, on social media, websites, or chats.  Often, you may be leaving a trail unwittingly.  These days we are bombarded with so much noise when we go online.  “Sign up with us and get a free something or other.”  “20% off XXXX when you register…”  We set up accounts on social media platforms and apps every day without thinking twice.  Most often, when you do that, you are adding to your digital footprint and leaving yourself open to vulnerabilities or in the least, unwanted solicitations.

There are many ways you can reduce that footprint or make it more positive.  Here are eight simple steps you can take to stay a little safer online.

Check your privacy settings on your social media accounts.  

It’s very important to know who is seeing the information you post online.  And now social networks offer you more control with settings that can help you manage the content you share.  Keep in mind that updates and changes to the platform can affect your privacy settings, so make sure to check them once or twice year.

Antivirus software should always be up to date.  

Updating your software regularly will ensure that any vulnerabilities will be patched up.  Security holes aren’t preventable but with the latest versions of AV software, hackers will have a harder time getting into your system.  Before clicking that little “New update available” popup, make sure that the updates are accurate and relative.

Delete or deactivate old shopping or social accounts. 

Did you buy a widget from Widgets-R-Us last year to fill out the ol’ Christmas shopping list?  What happens if widgetsrus.com goes under, and the assets for the company are auctioned off to the highest bidder?  Your personal data is now in the hands of an unknown third party.  Deleting your data from a service by contacting a company directly and asking for your customer data to be deleted is the best way to cover yourself in this case.  If you cannot do this, at least delete your account on the website!

Browse the Internet with “Do not track” enabled.

Most modern browsers and even operating systems have the option for you to send a request to each website you visit which says, “do not track my activity on this website”.  While imperfect, this is a simple way to keep your data out of the hands of compliant websites.

Don’t click on random surveys.

Unless going through a trusted service, such as Survey Monkey or Google Opinion rewards, giving data to a random website to “Find out what Game of Thrones Character is your spirit animal” is a surefire way to get your information out to the world at large.  That’s not a good thing.  It’s all fun and games until your email address gets leaked in a data breach.

Have a public-facing email.

Let’s face it, you can’t always avoid giving out your email.  There are tangible, financial incentives tied to giving away your email address.  The reason for this, however, is because they can make a lot more money off of your email than you will save to get your discount.  Using a single email which is dedicated to absorbing spam offers and which, at worst, you can simply delete without any major repercussions allows you to avoid not only spam email, but also exposing your proper email in a data breach.

Clear your browsing history and cache.

Clearing your browser history isn’t just for getting away with browsing sites you shouldn’t be using at work.  It also protects you in the event that your computer is compromised; it will be harder for a thief to see what sites you frequent.  Clearing your browser cache, on the other hand, will clear out tracking cookies which are used by websites to track you, even between multiple websites.  Enabling “Do not track” can prevent some of these cookies from being stored, but clearing your cache deletes any that make it to you despite your request.

Think about your offline presence.

You need to be aware of the information you share offline.  Make sure you understand how the businesses you use, whether it be a utility company or a grocery store, will use your information.  Most information you see online originates from somewhere offline.

Every time you post, share, or enter your information online, you are creating a digital trail.  It’s not always a bad thing.  A digital footprint can be a positive image, an extension of who you are online.  But be aware of the risks and keep track of your information.

Print out the handy little guide above so you can take it wherever you go.