Your Computer Users’ Bad Habits Put Your Business In Danger

Register for our Interactive Security Best Practices Webinar!

Join our Interactive Security Webinar!

Tuesday, January 16, 2018
10 am – 11 am CT

In 2014, IBM reported that, “over 95% of all [security] incidents investigated recognize ‘human error’ as a contributing factor.

Let that sink in a moment. This means that if you have a cyber incident, like ransomware, it is FAR more likely that a human being in your organization triggered it.

When companies focus their attention on solving what they think are technology problems with technology solutions, they’ll neglect to identify simple interventions that can help reduce the incidence of bad behaviors and promote good ones.

This is why we conduct training on social engineering exploits to keep our clients safer. Unfortunately, there are limits to just what technology is capable of doing. HBR says it best:

In the absence of fail-proof AI, human judgment is still needed to fill the gap between the capabilities of our security technologies and our security needs. But if human judgment isn’t perfect, and technology isn’t enough, what can companies do to reduce behavioral risks?

Training is the best way to protect users – and your company – from attacks that could potentially risk your entire company and it’s existence.

Register now!

Webinar Agenda

  • Security is a big business
  • Multi-layered approach to protection is required
  • Understanding and identifying social engineering tactics
  • How to manage credentials properly to stop  hackers in their tracks
  • Prevent your business from becoming a victim



Register now!

Dave Ramsey 1 Day EntreLeadership Streaming Event

Dave Ramsey 1 Day EntreLeadership Streaming Event

This event, hosted by Radcliff CPA, a Dave Ramsey Endorsed Local Provider, covers Ramsey’s playbook for creating work that matters; building a group of passionate, empowered team members; and winning the race with steady momentum that will roll over any obstacle.

20 bucks with lunch (it’s $49 at the Ramsey site with just a virtual sandwich).

Learn more and register here. Seriously, just do it.

Registration Closes October 20th. Can’t promise Dave will have a red beans and rice recipe, but here’s one.

Kirkham.IT is a proud sponsor.

Managed Malware Protection: Partnering with Strongarm

Managed Malware Protection: Partnering with Strongarm

Managed malware protection is part of our relentless commitment to protect our clients with state-of-the art services as your Managed Service Provider.

Wrapping proactive IT security around your business with Strongarm.

With the right technology, anything is possible. Without getting too deep into technology, here are some of the things that will be happening to protect you, your business and your employees and users.

  • managed malware protectionThe attackers are being watched. Whatever the attackers, they are being watched as they set themselves upon the internet. Be it phishing sites, hacking websites and adding exploits, or malware command and control, Strongarm is constantly watching. By aggregating data from technology partners and open sources and curating a set of their own data, Strongarm gets ahead of the attackers.
  • managed malware protectionBy monitoring outbound DNS requests and correlating this against aggregated intelligence, Strongarm stops your company’s systems from talking to malicious infrastructure. When a connection to a bad domain is identified trying to leave your network, the DNS resolver returns Strongarm’s blackhole address instead of the attacker’s. The victim system communicates with Strongarm instead of the attacker, effectively disarming the attack.
  • managed malware protectionStrongarm speaks to your users…and malware.  If your user clicks on a phishing link, they receive a shot of user education right where they would have been phished! This is a real win, as there’s nothing for you to do to respond. In the case of malware or ransomware, this doesn’t just block an infection and drop the connection. Strongarm “speaks malware,” meaning they can interrogate the infected host to gather valuable information, such as who the victims (machines) were and whether there is a “poison pill” to destroy it. This is what makes this managed malware protection different from all other DNS providers and security solutions: Turning the attack against itself to protect your business.
  • managed malware protectionStrongarm’s got your back.  When an attack is stopped, the work has just begun. As soon as an attack has been stopped, Strongarm begins triaging what’s happened. Using the their discussion feature, Strongarm will tell you what kind of an attack has happened, what the attacker’s goal was, and recommend how you can respond.Sometimes it’s simply having a conversation with a user. Sometimes it’s cleaning malware off of a workstation. Sometimes it’s verifying your systems are patched against the attack we stopped. Working together, we’ll keep your users safe.
  • managed malware protectionWhy DNS-Based Security Works. By watching DNS requests and not focusing on the network traffic, Strongarm is not blind to encrypted traffic, peer-peer traffic, and other tactics that hackers use to get past firewalls and antivirus. One of the benefits of Managed Service Provider care through Kirkham.IT is that we’re going to help find those nasty little bugs and other creatures and keep them picked out.

Managed malware protection and your Managed  Service Provider.

Kirkham.IT is a Managed Service Provider (MSP) providing services that remotely manage and provides IT infrastructure for their clients, tailored to reach each client’s objectives.

Meet Avatara, Our New Premier Cloud Provider

Kirkham.IT is proud to introduce our premier cloud service provider, Avatara Cloud.

This is a “pure-play” cloud solution that moves your entire network to the cloud for better security, reliability. and mobility. On the technical side, the solution is practically limitless, including the ability to use CAD in the cloud. Here is an overview video:

Your entire workforce becomes mobile, with the ability to work anywhere, anytime, on any device. Home, job site, office, ballpark – anywhere there is an internet connection and some sort of device to connect with, your business is at your fingertips. Here is a demo of the mobility:

Disaster recovery and backups are easy with Complete Cloud

Put an end to continuous desktop, server and other capital expenses.


Upcoming Webinar: CAD in the Cloud

Join us for our upcoming webinar with Avatara, our premier cloud provider, as we discuss how CAD works in the cloud as the perfect solution for engineers, architects and others who need the ultimate in mobility without sacrificing performance.

December 5, 2017
10:00 am Central Daylight Time

Here’s where you can sign up to join us for our upcoming webinar!

IT Business Continuity: Are you prepared for reality?

IT Business Continuity: Are you prepared for reality?

Business continuity the morning after the storm was a secondary concern to the owner being interviewed by the TV news crew.  ”This is a building…I don’t care so much. Nobody got hurt…” The havoc wreacked by this perfect storm, the worst case scenario, was devastating. The building was nearly destroyed. Employees and their families were shaken, but safe. Are you prepared for the reality associated with a disruptive event?

IT Business continuity begins before the perfect storm.

Now what? The sun is up and you don’t have many options. It’s got to be business as usual. Clients, customers, consumers and employees look to you for stability and security. Whether your business relates to finances, health, legal issues or other confidential and critical matters, business continuity planning allows your business to maintain or quickly resume  mission-critical functions following a disaster.

How have you protected your business?

Business continuity is no small matter. In fiscal 2015, the U.S. Small Business Administration provided 46,000 businesses and individuals with $2.8 billion in disaster loans.

business continuity, disaster recoveryNearly every business, whether to satisfy insurance requirements or regulations under which they function, has conducted a business impact analysis to predict the consequences of disruption of business. Protecting your business against disaster disruption, loss of IT data and the loss of business continuity, is a solid, proven business investment. The consequences of choosing not to make this investment could become a staggering cost to your own business; as well as to your clients’ and to their own customers’ businesses and lives. 

Backup Management is the basis of business continuity.

Business continuity  operates through your overall Backup Management Plan before, during and after an event wherein a proactive plan goes into action to avoid and mitigate risks associated with a disruptive event. What have you done to help your business get back into action after a disruptive event?

  • Data backup: Have you integrated your operating system, data and applications into virtual servers that allow your business to become completely site and device independent? Are you sure your computers keep running safely in redundant data centers?
  • Unlimited support: Have you provided your employees with 24/7 support anywhere, any time on any device so they can resume work and stay productive immediately after a disruptive event?
  • Security management: Do you have a strategic security plan that allows you and your employees the ability to authenticate their identity, manage passwords and access all software applications, systems and data anywhere, any time on any device?
  • IT infrastructure: Have you prepared for the total physical loss of every computer, server and other piece of IT equipment residing within the physical structures of your business? How will your data, your work and your computers be accessible?
  • Total mobility: Is everybody able to work off-site with an internet-enabled device, such as a laptop, smartphone or tablet. Can they connect with one another and clients from home or temporary offices?

Disaster Recovery on a personal level.

Business is about more than IT. It’s about people. After a natural disaster, you and your employees, along with your clients and customers, are facing personal recovery, too. Here are some ways you can help your employees manage their work and personal challenges:

  • Keep in contact: Once the weather or the threat has passed, the first thing you should do is attempt to contact your employees. If you can’t reach people right away, don’t jump to conclusions. They may not have phone service or may be attending to more urgent matters. Wait a reasonable amount of time before taking further action or contacting the authorities.
  • Allow your employees to work remotely: From downed power lines to icy roads, it may be too dangerous for your employees to return to the office. Be careful not to forget about these employees. Check in with them regularly to stay-up-to-date on their situation and see if there is anything you can do to help them get back to work.
  • Be flexible: In the weeks or even months following a natural disaster, your employees will likely be doing a lot of clean up and damage control at their homes. Be flexible about work hours and dress code. Allowing employees flexible work hours to take care of personal issues can help reduce their stress, so they can be more focused and productive.
  • Pay your employees: Requirements for paying employees depend on whether they’re exempt or non-exempt. Refer to Fair Labor Standards Act (FLSA) and be sure your policy is documented in the employee handbook.
  • Set up an employee assistance program (EAP): Sometimes the most difficult part of recovering from a disaster is finding help. An EAP is a third-party organization that contracts with your company and provides a variety of support programs for employees. Normally, EAPs are in place to help employees with work-related difficulties, but it can also help employees with personal struggles.

How does your business compare?

  • A Business Continuity Plan (BVP): A definition of potential risks, determining how those risks will affect operations, implementing safeguards and procedures designed to mitigate those risks, testing those procedures to ensure they work, and periodically reviewing the process to make sure that it is up to date. Investopedia
  • Disaster Recovery Plan: A documented process of procedures to recover and protect a business IT infrastructure in the event of a disaster and is increasingly associated with the recovery of information technology data, assets and facilities. Wikipedia

Your Managed Service Provider.

Kirkham.IT is a Managed Service Provider (MSP) providing specifically defined services that remotely manage and assumes responsibility for providing IT infrastructure and/or end user systems for their clients. Kirkham.IT proactively determines the services needed to meet client-specific goals, and provides these services and infrastructure under a subscription business model.

What is Total Cloud Solutions?

Want to receive our Newsletter? Let us know and we’ll add you to our mailing list.