Last week, we had the pleasure of attending the Strictly Business expo where our own Dave Hansen was interviewed about the risk that hacking poses to Cedar Valley businesses. Read the article here!
ACES News and Info
Hack attack: The problem is getting worse, and everyone can fight back (ACES featured in Waterloo Courier Article)
Did that get your attention? Imagine hearing that on your next check-up with your Physician. How would you react to that?
"Get it out of me! And keep it out!" or something along those lines would be a common response I assume.
Isn't it interesting how the terms we in the IT world such as "Drive-by Download" or "Brute Force Attack" to describe potentially major problems in your technology somehow have a much greater impact when you apply them to our personal well-being. These terms are intentionally threatening but often brushed off when we use them to talk about your technology because, hey, you can always fix the machine or in extreme cases just get a new one, right?
It is that disconnect that leads us to treat our information as replaceable when, in reality it is not, at least without potentially severe cost or consequence.
Why not be proactive in managing your critical business information in the same way you manage your health? Maybe you haven't yet joined a cross-fit class or began "enjoying" spinach smoothies instead of cheeseburgers for lunch, but you still take a vitamin in the morning, get a flu shot each year or wash your hands regularly to avoid getting sick, right?
Great health requires ongoing attention and action to remain in good fitness, regardless of whether it applies to your body or your computer network. Taking this approach to keeping your information systems healthy and safe has one distinct advantage over managing your personal health; you can partner with someone to do it for you. Try getting your personal trainer to run a few miles on the treadmill for your benefit.
So before you hear that you have become a victim of an "SQL Injection" or a "Backdoor Trojan" (yikes), allow us to perform a network security assessment to uncover any potential security holes before an opportunistic hacker discovers them.
If you choose to work with us to help keep your network healthy and your information secure, great, it is why we are here. If not, at least you can lay your head on your pillow at night knowing that you are have the proper preventative measures in place for your technology to keep your business in great shape.
Region’s Leader in Unified Communications Educates Customers on the Evolution of Malicious Threats
CEDAR FALLS, IA — DATE — ACES, a leading provider of unified communications, announced today that the company has launched an awareness campaign on recent advancements in cyber security. As technology has become even more central to business operations, hackers have grown in proficiency and are posing several new threats to business owners. ACES, is actively engaged in alerting customers of these new methods by which hackers are attacking businesses.
Cyber-attacks, such as malware, have become one of the biggest threats on an organization’s network because of the speed by which these attacks evolve. Cyber security has become one of the fastest changing technologies in response, and is constantly vying to remain a step ahead of the threats that face most organizations. While business owners were previously able to avoid most threats by purchasing a strong firewall, hackers have continued to evolve their methods and simply put, a firewall doesn’t offer any sufficient level of protection anymore. As technology continues to move forward, the threats facing organizations have become much more sophisticated, brazen and bold.
One such common tactic used by hackers is the coordination of simultaneous attacks to overwhelm any server, LAN (local area network), or other critical endpoint on the network. Essentially, this overwhelms the endpoint and creates openings for hackers to attack the network during the overload period. Every endpoint is vulnerable to these types of attacks, and hackers can circumvent firewalls through any mobile device or tablet, unless the organization has a Unified Threat Management System that automatically evolves with and is designed to thwart these types of attacks.
“Hackers have a malicious goal of accessing and misusing proprietary company data for financial gain,” stated Phil Kenealy, President/Owner of ACES. “One of the best practices that we recommend is triple layered infrastructure protection,” added Kenealy. “This means establishing a layer of security at the edge of the network, another security layer at the desktop and a final layer of security at the LAN. This exponentially reduces the risks facing any enterprise because of the redundant nature of multiple levels of protection. This simple step can save companies thousands of dollars and unnecessary downtime.”
Another challenge facing organizations, as it relates to cyber security, is when employees access unauthorized sites and are phished for login credentials, making the network instantly vulnerable. “Through our guidance and technology we help our customers control access to certain web sites and automatically prevent employees from interacting with sites that pose security risks to the network,” commented Mr. Kenealy. “The technology is configured to automatically detect malicious sites and shutdown the threat before any interaction begins.”
ACES has established a cyber-security division and is helping companies understand and implement a Unified Threat Management System. During the company’s initial stages of customer outreach, they’ve found that most customers are completely exposed to threats. “The question business owners must ask themselves is if they truly believe that a static solution can combat a dynamic problem?” said Kenealy. “In other words, if your firewall hasn’t evolved in the past several years, how can you expect it to keep pace with the evolution of hackers? And more importantly, where do you think that leaves your company data and customers’ sensitive information?”
ACES has been the go-to leader for safe, secure, and efficient IT network solutions of leading organizations in the Cedar Valley for more than 20 years. ACES was founded in Waterloo, Iowa, in 1994 by Mike Place to provide computer and network support for organizations in the Cedar Valley. In 2002, Phil Kenealy purchased ACES and merged his company, Computer Pros, Inc., of Waverly, Iowa, with ACES to form the innovative leader in computer and network services company in Northeast Iowa.
In 2004 the business moved to Cedar Falls to take advantage of the resources of a world-class data center. Today a significant portion of the company revenue is derived from managed IT services. We deploy enterprise-level methodologies and tools to provide technical expertise, manpower and IT management for our clients.
ACES is a best-in-class, value-added reseller of network infrastructure providing commercial clients with LAN and WAN connectivity solutions, Voice over IP (VoIP), security, remote access, Internet access, and hosted services. Our expertise in these advanced technologies equip us to serve customers in varied industries, such as local and county government, manufacturing, non-profit organizations, and education. Many of our customers have multiple locations and need secure WAN connectivity and communications capabilities between work centers.
New Partnership Provides Customers with Unparalleled Value.
ACES is a leader in the unified communications industry. In 2013, the company partnered with Technology Assurance Group (TAG) to expand service to the Iowa market. Through our Membership with TAG, an international association of unified communications companies serving more than 130 marketplaces across the United States and Canada, ACES truly has the ability to deliver a national support solution. Our National Help Desk can dispatch onsite engineers in as little as four hours to almost anywhere in the United States. Each service center is under direct contract with ACES. We never make use of third-party service centers, so we maintain control of the project or service ticket. You get centralized management and consistent service every time.
As a premier Member of TAG, ACES is positioned as the leader in unified communications providing advanced solutions to the marketplace. We have met rigorous annual qualifications through required company and employee training programs to become a TAG Member. This unique relationship enables us to adopt cutting edge best business practices, deliver innovative programs, and partner with elite technology manufacturers and application service providers. As a result of this exclusive Membership, ACES is the most competitive company in the industry. We have a greater capacity to increase our customer’s profitability, enhance employee productivity, and provide sustainable competitive advantages. “With TAG’s support,” says Kenealy, “I am confident that we’ve reached a new level of performance and technical expertise. We are proud to provide an essential service to help businesses focus on what they do best. We look forward to learning more about your company." To learn more about TAG please visit www.tagnational.com.
For more information on ACES call (319) 266-9800, visit www.acesiowa.com, or email email@example.com
© 2016 ACES. All Rights Reserved.