Client Portal | (304) 201-7485 | ask@alpha-tech.us
 

Your Cloud, Your Way.

Slow Computer Driving You Crazy?

Slow PCs, screen freezes, error messages and things not working right in general are EXTREMELY frustrating. How about if your servers crash? How long will it take you to get your business back online? Will all your information be available to you?

We specialize in a variety of security solutions that have allowed many business owners and executives to sleep better at night knowing we have their back.

There’s no time like the present to start protecting your business assets. Call us at 304-201-7485 or Contact Us below.

Security Solutions.

There is no single way to secure a network. Threats evolve as rapidly as technology and keeping up is a full-time job. We apply best practices to all areas of your network, drastically reducing the likelihood of trojan horse intrusions, distributed denials of service (DDOS), crypto variants, malware, spyware and other attacks. You’ll never have to worry about anti-virus licenses and definitions — we’ll handle that. And our solutions won’t slow down your network.

We’ll protect your network against internal threats, whether they are accidental or malicious. We can lock down mobile devices, laptops and desktops against virus transmission, digital theft and sabotage. Apathy and forgetfulness are just as dangerous, so we can handle the frequently required security updates and patches. We even train your team to recognize and avoid threats.

Our network security and monitoring measures improve productivity by blocking access to sites that employees don’t need or that could be harmful. Your firewall can be as flexible as you need it. We provide content-filtering solutions that can control from desk to desk, employee to employee.

And because no security system is perfect, we’ll make sure all of your data is backed up so you can recover quickly if there is an incident.

Backup and Recovery

If the global pandemic has taught companies anything, it's that being ready when the unexpected happens can pay off. In the business context, this lesson is often truest when it comes to data storage and disaster recovery plans. Given that data and digitization are increasingly at the heart of companies' operations, protecting the information held in servers with flexible infrastructure such as storage virtualization is important for mitigating disruption and maintaining business continuity.

Physical on-site data storage is vulnerable to everything from natural disasters to national and local emergencies that prevent employees from entering business premises and accessing the information and tools they need. Depending on the severity of the disaster, data may not be accessible for several hours or several days—or, in a worst-case scenario, it may be destroyed altogether. The Acronis Cyber Protection Week 2020 survey found that while 43% of IT professionals reported losing data or devices, only 20% said they backed up to both the cloud and locally, meaning the data lost could be irretrievable.

Virtualizing storage can mitigate risk and protect day-to-day operations by putting a virtual protective layer around a data storage facility, storing, and backing up everything important in the cloud to be accessed when needed.

Storage virtualization, also known as software-defined storage, is a cloud-based system that decouples the physical hardware from its logical representation. Or as the Storage Networking Industry Association defines it: "The application of virtualization to storage services or devices for the purpose of aggregating functions or devices, hiding complexity, or adding new capabilities to lower level storage resources."

What this means is that data is located in a wide range of storage facilities, but it appears in a single storage system. Business data is, therefore, more protected because it is not located in one place where it could be compromised by a fire or another disaster, resulting in a (potentially permanent) loss of integral information. Additionally, as the system is virtualized and often connected to the cloud, employees can access it remotely.

A key benefit of software-defined storage is, of course, protecting an organization's core data by not piling it into one physical location but spreading it across several places. If disaster does strike, company data can be accessed remotely and seamlessly through the internet. However, there are other benefits as well.

According to a 2020 survey of 530 IT decision-makers in businesses across North America and Europe by IT community site Spiceworks, among emerging virtualization technologies, the most common is storage virtualization, with a 40% adoption rate. The research finds that more than 50% of businesses plan to use the technology and application virtualization by 2021. The reasons most cited for potential adoption are:

  • More flexibility with storage infrastructure (47%).
  • Improved manageability of storage (46%).
  • Improved storage performance (45%).

Software-defined storage can help the administrator perform backup tasks, archiving and recovery more easily and efficiently by doing it automatically and disguising the complexity of the storage network area, presenting it as one. It can minimize operating costs by reducing how many in-house servers are needed. This, in turn, means fewer people to look after and servers to manage.

It also offers flexibility. Under such a data storage and recovery system, information that is particularly valuable or frequently accessed can be stored in high-performance storage, while less frequently accessed data can be kept in less expensive storage. Furthermore, thanks to the cloud, transitioning from working in the office to working from home is seamless, and there are no limitations on data access. Collaboration can continue even if colleagues are not face-to-face. Additionally, a virtual storage system reduces the potential for data to get stuck in silos and not be easily shared.

Software-defined storage also offers scalability. New capacity can be added rapidly as business needs change. Furthermore, because virtualization is continually operating in the background, it can also reduce downtime during migration processes.

The ability to deliver 100% virtualization is here now. It can initially be an intimidating task, but some key things to consider when embarking on the journey include:

  • Thoroughly design and plan: This is paramount to understand the business's core needs and priorities, to identify and mitigate risks, and to understand and plan for the migration processes and necessary downtime. It's also important to understand existing applications and technical considerations. For this, companies can use scanning tools (among others) to capture information about current network metrics and operating systems.
  • Pick the right software management tools: These can help diagnose application problems, optimize performance, monitor the network and manage capacity for specific workloads in the virtual environment so companies can reap the full benefits of a virtualized network.
  • Prepare staff: Make sure team members understand the final vision and goal, are prepared for any disruption or downtime, and are trained to use the new system. Furthermore, senior management should be comfortable with and fully understand the risk-reward ratio of the migration.
  • Collaborate with the right technology partner: This is arguably the most important consideration—find a partner with a proven track record and strategy that can deliver solutions and provide expert support. Flexible business continuity solutions can help organizations of all sizes protect, strengthen, and recover their critical connections when needed


Alpha Managed Security Monitoring Service

Other managed detection and response (MDR) services simply notify you of attacks or suspicious events. Then it’s up to you to manage things from here.

With Alpha Managed Security Monitoring Service, your organization is backed by an elite team of threat hunters and response experts who take targeted actions on your behalf to neutralize even the most sophisticated threats.
With Ransomware becoming more and more prevalent you need peace of mind with your security strategy and simply being notified you’ve been hit isn’t enough.
The bad guys have already encrypted your data and begin demanding a ransom for you to possibly get your data back.
You may think your safe, but the most sophisticated enterprises have already been attacked:

  • Marriott - 5.2 million Guest Loyalty Records
  • Twitter – Attacker SE Employees
  • MGM – 142 million Guest Records Leaked
  • Magellan Health Ransomware & Data Breach - 365,000 patients

Alpha offers a gold and platinum version. You get to select what is best for your business needs.

Gold Platinum
Proactive monitoring and resolution x x
Protect servers and dt's from threats x x
Malware package x x
Proven ransomware protection package x x
Allows for monitoring of an endpoint x x
Allows for detection and response x x
Includes isolation and cleaning of device x
Annual Vulnerability Scan x
Advanced Threat Hunting using EDR Tools x
O365 subscribers weekly audit log review x
Trusted Security Advisor x

Security FAQs

  1. Patching Software
    When recent ransomware attacks have been analyzed, most of the system flaws that the bad actors used were known vulnerabilities that have patches available for months or even years. By keeping all network devices up to date with the supplied vendor patches, we remove weaknesses attackers use to increase the chances of a successful attack.

    How Alpha Can Help: Alpha’s Managed PC service uses a tool called Automate to push available patches to desktops on a defined schedule.

  2. Train Users
    Security Awareness Training is a training program that teaches users to identify and avoid phishing emails that are used to start most ransomware attacks. Security Awareness training also periodically tests users on their ability to identify simulated phishing emails, which helps a company understand who might need additional training. By training the users, organizations benefit by adding a layer of defense that impacts the attack at the source.

    How Alpha Can Help:
    Alpha can create and maintain a Security Awareness Program using KnowBe4. KnowBe4 delivers proven results.

  3. Use Proven Anti-Malware Agents / Follow Up on Alerts
    Not all antivirus/anti-malware programs (agent) are created equally and if the agent does not evolve with the threats, the agent becomes a liability, in that it provides a false sense of protection (this is a case of: You Get What You Paid For). Some companies also fail to follow up on alerts the agents provide, which could have acted like an early warning that an attack was underway.

    How Alpha Can Help:
    Alpha offers both managed and unmanaged Sophos Intercept X with EDR. EDR - Endpoint Detection and Response - is a feature set that allows IT teams to understand and security events on a computer. It helps to answer what happened, when it happened, and possibly why it happened. EDR is a feature most cyber insurance questionnaires inquire about as part of their underwriting process and if present could factor into more favorable insurance rates.

  4. Backup Data
    While the concept of data backups is universally accepted, how it is put into practice by companies varies widely. Some companies rely on manual backups which generally are not completed with consistency. Some set up their backup systems but failed to review the system to ensure backups are being completed successfully. Regardless of the backup system put into place, backups should follow the 3-2-1 rule: 3 copies of the data, stored on two separate storage systems, and one copy is stored offline and uses administration credentials that are shared with the devices being backed up.

    How Alpha Can Help:
    Alpha offers a robust backup solution and is essential to recovery from a ransomware event. Management includes weekly verification that backups are running and can schedule test restores of data at the customer’s request. The backup solution also uses separate credentials so malware cannot jump to the backup servers using learned customer credentials.

  5. Use Multifactor Authentication (MFA)
    Username and Password combinations are how most systems are protected from unauthorized access. Unfortunately, users tend to pick passwords that are easily guessed or reuse passwords on more than one system. What is needed is an additional mechanism presented to users to “prove” their identity. This is where Multifactor Authentication helps, or MFA for short. Just like when you log into your bank account online, MFA uses another way of communicating, such as a text message or a smart device application, to help prove the identity of a user. This helps protect high valued and critical systems such as administrator accounts, VPN accounts, and email accounts password guessing or using passwords disclosed from other breaches.

    How Alpha Can Help:
    Alpha offers unmanaged and managed MFA solutions using Duo. Duo can help the customer protect public-facing services such as O365 as well as local admin accounts, VPN access, and many other services.