Our Locations

Be Informed. Be Smart. Be Sure.
New York (NY) | Phone: (212) 741-6400
Westchester (WC) | Phone: (914) 674-4500
New Jersey (NJ) | Phone:(866) 785-8475
Upstate, NY | Phone: (845) 255-8900
LI, Brooklyn & Queens | Phone: (718) 994-9199
Connecticut (CT) | Phone: (203) 445-7006
Greater Philadelphia, Delaware Valley: (800)-552-2207

Working Hours

Monday - Friday 7:00AM-6:00PM
Saturday - Sunday CLOSED
Top
 

Mobile Print Assessment

28,000 printers were hacked. ATO had something to say about it.

A recent experiment from the folks at CyberNews showed just how easy it could be to infiltrate your home or office printer. We have all heard and understand the importance of utilizing proper antivirus, anti-malware, and VPNs to protect our devices – But what about our printer? Printers? Yes, PRINTERS!

The full scope of this experiment was massive – With 27,944 printers being targeted by the Security Team at CyberNews. The details on how these sneaky hackers were able to accomplish this tall task can be found HERE. And while that information seems interesting, the real story comes from how your business can take measures to make sure you are not caught in the crosshairs of a hacker who is looking for more than an experiment.

Regional Sales Manager, Jim Blenderman, sat down and explained how Atlantic, Tomorrow’s Office would ensure that we always put our best effort forward to prevent this from happening to your business.

With Atlantic’s holistic approach, our organization would put you in a position where all possible cyber threats, financial exposure from outdated technology, and areas of opportunity to make your employees productive are all brought to your attention for a strategic discussion. In this particular case, Atlantic would conduct a security assessment on your environment to uncover possible threats just like the printers in this article. Because so many printers are left with open ports, this poses a security risk to your organization where things like financial information and customer information could wind up on the market for the highest bidder. In addition, ransomware or corporate espionage could also take place. Atlantic would make sure that your attack surface is minimized, and only mission-critical apps and services have access to your printers. There could also be a hard drive on the printers themselves that contain sensitive information. We would put protocols in place that would provide for either wiping this information or regularly changing the hard drive. These recommendations, along with many others, would be delivered in a collaborative discussion where Atlantic and your executive team work together on the business’ goals.

Jim Blenderman, Regional Sales Manager – ATO

The security of your network, data, and office equipment is paramount and can lead to tremendous downtime and financial loss if you ever fall victim to a cyber-attack. As Jim explains, Atlantic takes a holistic approach when assessing our clients’ needs in regards to Managed Services. Whether it be Managed Print, Document Management, Managed IT, or Managed Security, our team takes a detailed look at your process and builds a comprehensive plan to optimize your efficiencies and cost savings.

As we have shifted to a more remote or hybrid setting in the workplace, the risk of a security breach is more and more prevalent. Our home networks are not built under the same scrutiny and precaution as the offices which we vacated months ago. As we begin to shift back to a normal schedule, many companies are opting to remain in some remote capacity. This brings a new need for additional security and hardware that can help to keep employees productive and efficient throughout their day.

As the needs and overall trends of the modern office change, so will the opportunity for hackers and cybercriminals. Atlantic is poised to provide top-level Managed Services with the same holistic approach that will protect our clients across all aspects of their business.

See how your business stacks up and CLICK HERE to complete our assessment and have an Atlantic Representative build your plan TODAY!

Why Employees Are Your Biggest Security Threat

It happens in almost every office, almost every day – people open emails from unknown senders, or they click on a mysterious link, or print out sensitive info and leave it sitting in the printer tray. While these types of actions are pretty common, they leave your network and business vulnerable.

Every business needs IT security to keep their networks, users and data safe. Email filtering, firewalls, making sure software is updated and printers are secure are all important security measures. However, even with the newest and best software and network monitoring in place, the biggest threat to your IT security is actually your employees.

Chances are they are not malicious or would do anything to hurt your company intentionally. Still, the fact is, human error is among the top causes of many business cyberattacks.

Here are the top ways your employees may be making your company vulnerable.

Phishing and Link Scams

Phishing scams are designed to trick your employees into providing valuable information. Often, it’s an email that appears to be from a legitimate source asking for confidential information. Or, they may be prompted to download a piece of software that is malicious. Train your team to recognize the signs, and never click on a link, or download a file from an unconfirmed source.

Social Engineering Attacks

The goal of a social engineering attempt is to get people to break normal security procedures. For example, a criminal might pretend to be a co-worker in need of access to a secure file. To prevent these types of attacks, make sure you have clear security procedures in place and never second-guess them.

Unrestrained Web Browsing

The Internet is a necessary resource, but it can also be dangerous. Many browsers come with features to protect users from dangerous websites or ads, but the risk is still there. With web filtering, your employees can be blocked from visiting known malicious websites.

Inadequate or Breached Passwords

Teach your employees password best practices. Include the basics like how to create a secure password, why they should never write passwords down, and the importance of changing them frequently. A password tool and Multi-Factor Authentication can store them safely, make sure they’re not forgotten and validate the employee is who they say they are when they attempt to login.

Here at Atlantic we believe employee awareness training is one of the most effective ways to protect your business from malicious actors and prevent possible breaches. We can identify your team’s vulnerabilities with our exclusive stack of assessment tools including our Ransomware Simulator Tool, Email Exposure Check, USB Security Test and more!

Contact us today and ask us about our cyber awareness training solutions for your team.

 

 

 

 

Top Advantages of Software as a Service

As more business services make their way online and operate with more efficiency and resiliency, companies are turning to innovative solutions to meet their unique needs. Software as a Service (SaaS) is a distribution model the features applications hosted by a provider and delivered online.

SaaS provides an interesting alternative to the standard purchase/license/install model, where you must install applications on your server and configure it. Instead, the applications reside on an external server on the cloud and are accessed via the Internet. It works much like a rental. Your organization has the authorization to use it for a period of time and you pay only for the software that you are using.

Here are five advantages of the SaaS delivery model.

  1. You’ll Benefit Faster – SaaS differs from traditional software models because your software is installed, configured, and ready to go. As a result, any new software you choose to integrate is immediately available, current, and always updated automatically. Just log in and you’re in business!
  1. Lower Cost – SaaS can provide cost savings. Because it resides in a shared, or multi-tenant environment, a license is lower in cost than the traditional model. Along with lower costs for use, maintenance costs are lower as well.
  1. Scalability  – Because SaaS lives in the cloud, it’s easily scalable and can integrate with other SaaS offerings. You’ll never need to buy another server or software license, and you can easily scale up (or down) as your needs change.
  1. Automatic Upgrades – With SaaS, it falls on your provider to upgrade their offerings as upgrades and security updates become available. The costs are much lower than the traditional model where you’re forced to purchase an upgrade package, or license, and install it, or pay for specialized services to get your environment upgraded.
  1. Freedom and Mobility – Mobility is by far the biggest benefit you’ll enjoy with Software as a Service. As COVID-19 has affected all of our operations, it’s become crystal clear how powerful mobility truly is. With SaaS and an Internet connection, your team can access the software tools and data they need to function from anywhere. No need to install software, or access a VPN.

Here at Atlantic we offer our clients a complete IT solution including over 500 certified business and productivity applications with these benefits:

  • No additional hardware costs
  • No initial setup costs
  • Pay only for what you use
  • Easily scale services up or down as needed
  • Automatic upgrades and security updates
  • Cross-device compatibility
  • Access from anywhere with an Internet connection
  • Dynamic storage that grows with you
  • Server maintenance, software maintenance
  • SSAE 16 SOC II Security

Hit the ground running with an Atlantic, Tomorrow’s Office solution with customized software at a fraction of the upfront cost.

Ready to learn more? Give your Atlantic representative a call today and let us show you all of the benefits our complete IT solution can offer your business.

 

We’re changing our look!

We are excited to announce the unveiling of our NEW LOGO DESIGN!

In the coming weeks, you will begin to see more and more of our new look as we roll out more media and content.

The new logo represents the evolution of Atlantic as we drive forward and continue to deliver the highest level of service. This new design embodies our mission of helping our customers leverage technology solutions to securely streamline, simplify and automate your workflow and operations.

Read more about the “Why” behind the creation of the new logo

Check out some examples of how we plan to put the new design to use!

6 Email Security Best Practices for Today’s Businesses

Email is the most common method for staying in touch and conducting business in today’s connected world. That means email security is a primary concern. If your emails are intercepted or compromised, it can result in serious consequences for your business.

The good news is that today, by taking a few steps and setting security standards, it’s possible to prevent the most serious email security circumstances.

Here are six email security best practices to help keep your business safe.

  1. User Awareness Training – Educating and training employees at every level of the organization to identify malicious emails and the tactics used in email by criminals is critical. User awareness training is also one of the easiest and most cost-effective solutions for avoiding sensitive information/credentials leakage and preventing clicks on infected files/links that can infect your network with ransomware.
  2. Use SSL Protected Email Servers – Secure Socket Layer protection allows you to safely communicate with your server using enhanced encryption security. It uses two “keys” – one public, one private. Both are used to unencrypt emails and only the recipient has access to the private key. If your email is intercepted, it is unreadable without the private key.
  3. Use Enterprise-Level Spam Filters – Spam can be malicious. It’s often the delivery method of choice for phishing schemes, and accidentally downloading malicious software from a seemingly reputable source can put your entire network and business at risk. Enterprise-level spam filtering can keep dangerous emails out of your inbox, eliminating the risk.
  4. Close and Forward Ex-Employee Email Accounts – Closing their email account when an employee leaves ensures that they no longer have access to your business. Forwarding their emails to their replacement ensures business continuity.
  5. Don’t Use Outlook to Send Mass Emails – Use third-party platforms like Constant Contact or MailChimp for sending mass emails. If you use your Outlook account, mass emails will likely be flagged as spam, which can get you shut down by your email provider.
  6. Protect Passwords – Not all breaches happen online. It can be as simple as having an unprotected laptop stolen. Require employees to password-protect mobile devices to keep them secure. This adds an additional layer of protection preventing access to email, contacts, and data. Implementing basic multi-factor authentication can significantly reduce the risks associated with unauthorized access and compromise of user email accounts, administrator accounts and corporate email systems.  As email has become one of the most critical business services and the #1 source for breaches, validating user access and preventing unauthorized access should be a top priority.

Today, it’s critical to protect your employees, customers, and data from security threats. By implementing these email best practices, you can safely mitigate risk and protect your company from attack.

 

 

What is Endpoint Security?

Today, organizations of every size are at risk from hackers, and malicious or accidental threats from inside their organizations. Network and data security are key. Endpoint security, considered cyber security’s frontline, is often the first place businesses look at to secure their organization.

In this post, we’ll define endpoint security, its importance, and how it works.

Defining Endpoint Security

Endpoint security is… “the practice of securing endpoints, or entry points of end-user devices like desktops, laptops, tablets, and smartphones from being compromised by malicious actors and campaigns.”

Endpoint systems protect these devices (or endpoints) on a network from various security threats. As the rate and sophistication of these threats have evolved and grown, so has the need for more advanced solutions. Today, endpoint security systems are designed to detect, analyze, and neutralize attacks in progress rapidly.

Why It’s Important

With the rise of BYOD and IoT-enabled smart devices like voice controlled digital assistants, businesses must deal with an ever-increasing number, and types, of endpoints. Add the recent explosion in remote work, and you can understand the complexity of the challenge.

Today’s threat landscape is more complex as hackers come up with new ways to gain access, steal information, and manipulate employee actions at a rapid rate. Add the cost of relocating assets and the reputational costs of a large-scale breach, and you can understand the urgency for endpoint security solutions.

How Endpoint Security Works

Endpoint security safeguards data and workflows associated with individual devices on your network, examining files as they enter your network. Modern Endpoint Protection Platforms (EPPs) harness the power of the cloud to hold a growing database of threat information freeing your network from keeping these databases up to date.

An EPP provides a centralized console allowing IT teams to control security on networked devices remotely. While an endpoint solution may include antivirus, anti-malware, and web filtering, it differs from traditional security because it happens in real-time across multiple endpoints, bandwidths, and geographic regions.

Want to learn more about Atlantic’s cloud-based Endpoint Security Solutions? Let us show you how our EPP is faster and significantly more effective than traditional solutions freeing you to focus on what’s important… growing your business!

 

 

Business “Must-Haves” For 2021

COVID-19 has changed business and the global economy in ways we could have never anticipated. The pandemic has forced us to consider a different future as we reset our businesses, not only because of the coronavirus but because technological advances demand it!

Here are our four, top business “must-haves” as we enter the new year!

The Cloud

Today, data is king and its effective management and security are critical to business operations. Data enables people to do their jobs effectively and COVID-19 has shown us all that businesses need platforms that allow data to be easily and safely accessed and shared. 

The process begins with digitization and workflow automation. And in a world where the new normal is increasingly dynamic, the cloud is the key. A recent IDC study determined that cloud adoption is set to rise 15-20% within the next six months.

Digital Transformation

A Forbes article from 2019 suggested that 70% of organizations had a digital transformation strategy in place. Then 2020 arrived and it became apparent that this was optimistic, especially as companies struggled to pivot to remote work. In 2021 digital transformation should be considered a key corporate objective.

Rethinking Management 

Technology is important, but as remote work becomes commonplace and increasingly dynamic, how we define performance has to change. Moving toward an “outcome-oriented” management style will enable employees to achieve results in ways that are personally effective for them. 2021 will show that having the right technology is only part of the challenge; engagement, corporate culture, and how we lead will be paramount to support business success.

Be Smart About Technology and Partnerships

Choosing the right partner to work with is critical to leveraging the expertise you need to excel. When businesses partner with a technology expert they can quickly capitalize on current trends to be prepared for whatever the future may hold.

Are you ready for the challenges you’ll face in 2021? Call today, and let us show you how we can help you navigate the new normal. 

Five IT Lessons We Learned in 2020

COVID-19 caught us all off guard as we faced many IT scenarios that we just hadn’t planned for, or ever thought we’d face! The good news is that in the past several months, we’ve all had time to adjust to the new normal. As we march towards 2021 now is the time to put practices in place for the long-term.

Here are five things we learned in 2020 that businesses should adopt (if they haven’t already) for a successful new year!

1. Supply the Right Tools

As more employees are working remotely, it is important to provide the tools they need to succeed. If this wasn’t in the budget in 2020, be sure to plan for it in 2021. Devices should have up-to-date security and software in place. Cloud-based applications allow your team to access the software they need to do their job easily, from anywhere. A permanent switch to the cloud should be a key consideration in 2021.

2. Establish Acceptable Use Policies

This is a best practice that was often overlooked in 2020 – employers should have employees sign an acceptable use policy. These legal documents stipulate rules and regulations for accessing companies’ IT networks – like email and internet, and the use of company equipment. AUPs reduce liability and protect important company data.

3. Beef Up Cybersecurity

With the almost overnight shift to remote work in 2020, security was put on the backburner as the focus was on connectivity first. 2021 is the time to put remote security at the top of your to do list. Whenever possible, set up a virtual private network (VPN) to create a secure path between the user’s computer and office servers. Use encryption to prevent cybercriminals from intercepting data and deciphering it. Implement other security measures like multi-factor authorization, home router security, and advanced threat detection and prevention.

4. Optimize Virtual Collaboration

In 2020 we learned just how important connection and engagement are to building and maintaining a happy, productive team. A remote work environment can limit face-to-face meetings so it’s important to offer employees more ways to collaborate and connect virtually.

5. Train Your Team to Recognize Threats

Employees can be directly responsible for your business becoming a victim of ransomware, a phishing attempt, or data breaches even though they didn’t mean to. Verizon’s 2020 Data Breach Investigations Report found that some of the top malware vectors in data breaches were due to employee error from clicking on infected email links, unknowingly downloading malware and clicking on malicious email attachments. In 2021 it will be critical to train your team to recognize potential threats and warning signs before making a mistake that could put you out of business!

2020 has been the most challenging year ever for most of us. One silver lining is that there is a push toward new technologies and solutions that are transforming the way we’ll all do business now, and into the future.

Are you ready for the challenges of 2021? We can help! Contact us today and let us show our solutions that can help your business thrive in the new year!

Five Reasons to Outsource Your IT

For many businesses, staying on top of the fast-evolving world of technology, and having the support needed to keep up, is a challenge. Not only does IT include technology and network functions, but cybersecurity, cloud hosting, printing, device management, remote support and disaster recovery need to be considered too. 

Keeping on top of it can be overwhelming for businesses of all sizes. Partnering with a Managed IT Services provider can give you the service you need and benefits you may not expect.

Here are five reasons to outsource your IT:

  1. Cost – Outsourcing your IT means you’ll have better control of costs. Working with a Managed IT provider gives you predictable monthly expenses, and the ability to leverage their vendor relationships to cut costs.
  2. Expertise – Managed IT providers are industry experts. They are current on all the latest trends, practices, and technology and bring this expertise to your business. As technology and cyber threats evolve, it’s difficult for an in-house team to stay current.
  3. 24/7 Support – When you’re working late on that presentation, and your server goes down, what do you do? With Managed IT you have 24/7 access to the help you need when you need it. In fact, thanks to proactive management provided by a Managed IT provider there’s a good chance you won’t have to deal with issues like this in the first place.
  4. Scalability – When you partner with a Managed IT provider, you can easily scale coverage up or down to meet your IT needs. Scalability helps you conserve resources and better control costs.
  5. Compliance – Staying on top of compliance regulations can be challenging, especially if your business is in a high-compliance industry like healthcare, legal, or financial services. Managed IT can help shift the burden of compliance and ensure that your technology systems meet the threshold for national and international regulations. 

However, the biggest benefit you’ll enjoy with Managed IT is peace of mind knowing that your IT worries are off of your plate. Partnering with a Managed IT Services provider allows you the freedom to do what you do best – focus on your core business needs.

Want to learn more? Give us a call today and ask us about an IT assessment. Let us show you the benefits of an Atlantic, Tomorrow’s Office Managed IT solution for your business.

What is Ransomware?

Of all the malicious software out there, none is more insidious than ransomware. In this post, we’ll define ransomware, look at ways you can fall victim, and how to best prevent an attack.

What is Ransomware?

Ransomware is a type of malware. It has the ability to lock and encrypt a victim’s computer or device data, and then demands payment to restore access.

The earliest versions of ransomware were first developed in the late 1980s. The authors demanded payment via snail mail. Today, they demand payment be sent via cryptocurrency like bitcoin or credit card.

Ransomware Delivery Methods

Cybercriminals use several different delivery methods that may seem harmless but can easily lure you into becoming a victim. These include:

• Malspam: This is one of the most common methods used today. Typically, ransomware is delivered via an unsolicited email. The email might include compromised attachments, like a Word document or PDF. It can also contain links to infected websites. It uses social engineering to convince recipients to open attachments or click on links that appear legitimate.

• Malvertising: This method uses online advertising to distribute ransomware, often with little or no user interaction required. While browsing on a site, you can be automatically directed to a malicious or compromised server without even clicking on an ad. An exploit kit, a toolkit used to exploit security holes, evaluates your system for vulnerabilities and then can deploy all types of malware, most commonly ransomware.

Why You Should Worry

At its worst, ransomware could ruin your business. Being locked out of your own data, even for a single day, can be financially devastating. Imagine if it lasted a week or a month. What would happen? Even if you recover, buyers might become wary of giving their information to a company perceived as insecure or at risk. 

And it isn’t just large organizations at risk. Cybercriminals often target smaller businesses simply because they might not have the resources to implement extensive security. Despite many businesses feeling that they’re too small to be targeted, even a small ransom of a few hundred dollars is still profitable for cybercriminals.

Preventing an Attack

First, if an attack or ransomware threats happens to you, report it to the FBI at www.ic3.gov.

Here are some tips to protect yourself and your business.

• Educate yourself and your employees about ransomware.

• Regularly back-up your data and keep a copy safe offline.

• Install and regularly update antivirus protection.

• Make sure you keep all systems and programs current and up to date.

• Beware of any links or attachments – when in doubt, don’t open them.

Ransomware is challenging to avoid. However, taking these proactive steps can help minimize your risk of falling victim. 

If you’d like to learn more, call your Atlantic rep and ask about our Managed Security Solutions for businesses just like yours. We have the expertise to keep your data and business protected.