Profile cover photo
Profile photo
Continuous Networks
Continuous Networks's posts

Post is pinned.Post has attachment
Our Monthly Content Digest - June Edition

Don’t be a Statistic- Protect Your Data (

Did you know that two thirds of companies have not #protected their #data? The Global Development Survey has been released and it shows that 31% of companies have no formal cyber security policy.

Secure Business Conversations with These 5 Tips (

The #startup environment is face-paced and exciting. Or at least, it can be! For many start-ups, phrases like "bootstrap", "nimble" and "ramen for dinner" are fairly common. But just because you're on a budget doesn't mean you have to be foolhardy!

Exploring a DDoS Attack (

A distributed denial-of-service attack, or #DDoS as it is commonly referred to, can severely impact your website, and if you run an online business - your revenue. Put simply a DDoS attack is an attempt to force a server into an error state by overloading it with requests from many computers around the world.

Mind The Gap (

A new report has found that there is a #serious #gap between the expectations of #tech users and what #IT departments can deliver.

When it Comes to Cyber Security Advice: Who Can You Trust? (

Would you trust a random #stranger on the street to perform open heart surgery on you? Hopefully you wouldn’t; unless that person is a well qualified surgeon.

Decoding Encryption (

There is a lot of #jargon surrounding cyber security. Sometimes, it's harder to decide who is working faster; hackers coming up with new ways to intercept sensitive data, or technology pro's coming up with new confusing acronyms.

Top Attributes of a Cloud Service Partner (

At #ContinuousNetworks, we talk a lot about how we become partners of our clients, and not just vendors. This is an important distinction.

It's World Backup Day! (

There's a reason we chose the photo below for #WorldBackupDay, as it shows the progression of how the process of technology backup has evolved over a relatively short period of time.

Spend But Don't Break the Bank on Cloud Computing (

There is an interesting difference between #enterprise businesses and their SMB counter-parts. Actually, there's more than one difference, but specifically what we're talking about today is budgets.

Design Trends in 2017 for Websites (

If you're #rebranding your website this year, or just starting a new website there are some things you should keep at the front of your mind. Namely, design. The worst first impression a company can leave on a first-time visitor to a website is being obsolete.

The Pentagon Is Hiring Hackers To Improve Data Security (

The #Pentagon is eager to ensure that its data defenses are protected by adopting a practice that is not totally unheard of, but unusual. They are hiring hackers to test them.

The New "Rules" of Cloud Computing (

We're no strangers to the idea that #cloudcomputing is revolutionizing the business landscape as we know it, but in practice and in terms of how businesses are viewed by their employees.

Cyber Attacks Still Business' #1 Fear (

If you're not paying attention to the #security measures in place at your business, and you still assume you're "too little to be noticed" you haven't been paying attention.

Post has attachment
How long can you avoid a cyberattack? (

If you've ever spent any time in #LasVegas you might understand the saying that on a long enough timeline, the house always wins. Games of chance are just that, chance. Statistically, the odds are in the house's favor when it comes to winning your money (or their money back, in some cases).

While the digital landscape is nothing like Las Vegas, the concept of statistics and odds are still working against most business owners.

What do we mean by that?

The cybercrime industry is booming, we're not trying to be doom and gloom when we say that. It's just the truth. Businesses that are heavily invested in digital will need to have security protocols in place in event of a worst-case scenario. Security analysts suggest doing this sooner than later, because the odds are stacked heavily in favor of hackers gaining access to sensitive data over a long enough timeline.

We discussed some of the potential threats looming out there in a recent blog post. You can check out more through the link above.

If you're ready to start being proactive about your online network security, get in touch with us for a consultation: (

#technology #business #cybersecurity

Post has attachment
Continuous' June Newsletter (

Around the #Continuous complex, we do our best to keep clients updated on the latest happenings in the technology space. We've built our business around providing seamless IT solutions for businesses of any size, so it made sense for us to dedicate time each month to current events in technology.

As we head into July, we wanted to call attention to our June Newsletter which was full of valuable (and interesting) information. Here's a brief clip from this month's offering:

How To Keep Your Employees From Leaking Confidential Information

Sure, those employees might know that clicking on links or opening attachments in strange emails can cause issues. But things have become pretty sophisticated; cybercriminals can make it look like someone in your office is sending the email, even if the content looks funny. It only takes a click to compromise the system. It also only takes a click to Google a funny-looking link or ask IT about a weird download you don’t recognize.

Click on the link above, you can easily print out the newsletter and take it all in during a lunch break! If you have any questions about specific services that may be able to help you from Continuous, click here to schedule a consultation: (

Post has attachment
Girl Scouts Taking on Cyber Crime (

Delicious #cookies are just one type of community service that the Girl Scouts of America are involved with! Next might be helping bust the next big cyber criminal outfit!

Cyber criminals better keep on their toes because Girl Scouts are soon going to be able to earn badges in cyber security! It would appear that Girl Scouts are focusing their efforts on developing skills for their members to combat cyber crime.

For those who are not aware, Girl Scouts sew badges onto their sashes for various skills they have acquired. From September 2018 Girl Scouts will be able to sew the first of the 18 new cyber security badges onto their sashes. The new cyber security program has been developed between Girl Scouts USA and the security company Palo Alto Networks.

The program hopes to reach 1.8 million Girl Scouts between kindergarten and sixth grade.

The Huffington Post discussed the news about Girl Scouts and their upcoming training in cyber security in a recent article:

The move to instill “a valuable 21st century skill set” in girls best known for cookie sales is also aimed at eliminating barriers to cyber security employment, such as gender and geography, said Sylvia Acevedo, the CEO of the Girl Scouts of the USA.

Women remain vastly underrepresented in the cyber security industry, holding just 11 percent of jobs globally, according to a recent study by (ISC)2, an international nonprofit focused on cyber security.

Click the link to read the full article all about the next generation of cyber crime fighters.

#GirlScouts #cybercrime #technews

Post has attachment
Would You Pay $1 Million to Recover Your Data? (

In was big news last week when South Korean #web #host has paid $1 million to recover their customers data! The web hosting company Nayana was hit by the ransomware attack, dubbed Erebus and as a result, 3,400 of their customers websites were *held for ransom.

In an attempt to recover their customers data, Nayana entered negotiations after an initial ransom demand of $4.4 million was made. After undergoing negotiations an agreed upon price of $1 million was reached, to be made in three installments via the digital currency, bitcoin.

Here is more about the story as discussed on The Whir:

According to a report by Ars Technica, Nayana is working to recover the data from 153 Linux servers, but warned customers it would take time.

Security best practices recommend victims not pay ransom, but often times companies will do so under the radar as to not admit publicly that their network was insecure. If a company pays a ransom, there is no guarantee that they will get their data back or that the hackers will not strike again.

Click the link above to read the full article.

This story should make you stop and think. Would you pay $1 million in the hopes of retrieving lost data? Regardless of the "would" aspect of that question, many small businesses simply could not.

A much better solution is to hire a quality network security partner and ensure your backup and data recovery protocols are in place. Spend a little now, save a lot later on.

It makes sense to us, and we hope it does for you as well!

Find out more about the affordable ways that we can help protect your data: (

#technews #technology #hackers #ransomware

Post has attachment
5.5 Million Devices Still Vulnerable to WannaCry (

Do you remember the #WannaCry ransomware attack that affected devices all over the world last month? We certainly do, and if you were one of the devices affected, you're likely still feeling the burn.

The WannaCry ransomware affected tens of thousands of devices around the world. It also served as a huge wake-up call to companies to make sure that proper cyber security is installed on their computers and data.

Despite all the puns surrounding the name of this attack, there is nothing funny about ransomware.

However, it would seem that not everyone has learned from the WannaCry attacks. Two new reports have found that 5.5 million devices are still open and vulnerable to WannaCry! So why are these devices all operating with ports that are open to WannaCry? Data Center Knowledge reported on why:

Of the devices running with guest access enabled, Matherly said 90 percent were running Samba, the Linux file-sharing application that enables Linux servers to interface with Windows’ clients. In both Windows and Samba, guest access is disabled by default, meaning admins have intentionally enabled the feature. Half of those were located on the network of Etisalat, a UAE-based ISP that operates in 17 countries across Asia, the Middle East and Africa, which Matherly sees as good news, but only because they’re confined to a single network.

Click the link above to read the full article.

If this post has made you rethink your cyber security situation, it is not too late to protect your data! For businesses operating in the New Jersey area we can help to install network security software that will act as the first line of defense to protect your data: (

Post has attachment
IT Jargon Translation! (

Let's be honest, we're all #busy people who rely on technology to get our jobs done more quickly, but don't always need to understand WHY it works, it just needs to work.

The set it and forget it mentality is precisely one of the reasons our clients trust and appreciate Continuous Networks as their IT services provider.

Open dialogue is critical because we understand that a collaborative environment achieves the greatest success. Our team is easy to work with and easy to approach. Our solutions are easily adaptable, easy to understand and continuously available.

We've been passionately involved in the technology industry for over 20 years and have brought that expertise to our diverse set of clients. We understand that businesses of any size can benefit from IT support here and there but nobody yet has preferred the "tech jargon" that can often be associated with this kind of work.

We promise when you get in touch with our team, your solution will be communicated clearly, concisely and with compassion no matter what level of expertise you're coming from!

Read more about our philosophy about IT support, and check out some of the ways we can help your company's IT run more smoothly. Just follow the link above.

#wemakeITpersonal #funny #NJ #ITsupport

image credit reddit user halforzen

Post has attachment
Britain Blames North Korea for WannaCry Attack (

After the #WannaCry ransomware incident, the fingers of blame are looking to be pointed, and it appears that North Korea may be the source of the WannaCry ransomware attack that hit the British National Health Services (NHS) in May.

British security officials have stated that they believe that North Korea was responsible for the cyber attack last month that not only affected the NHS but also many other organisations around the world.

This week security officials from the National Cyber Security Center revealed to the BBC that they believe that it was Lazarus, the North Korean hacking group who were responsible for the cyber attacks.

Here is more information about the May ransomware attacks as reported by News 18:

In May, ransomware called WannaCry swept across the world, locking computers and demanding payment for them to be unlocked. The NHS in the UK was particularly badly hit.

The ransomware did not target Britain or the NHS specifically, and may well have been a money-making scheme that got out of control, particularly since the hackers do not appear to have retrieved any of the ransom money as yet.

We'll continue to provide updates about this story, interesting to see that Britain is accusing Lazarus of being responsible for the WannaCry attack.

Click the link above to read the full article: (

#cybersecurity #worldnews #technews

Post has attachment
Are You Prepared for A Business 'Worst Case Scenario?' (

Not to be so #gloomy on a Monday, but as the saying goes, "An ounce of prevention is worth a pound of cure" and this is exponentially true in business technology.

Is your business prepared for the worst case scenario of massive data loss? Picture this, your business is going well and your IT department is backing up your server data to a tape at the end of each week. One day a fire rips through your office destroying all of your computers.

Once the new office is established the latest backup tape is used to restore all of the customer data onto the server.

Suddenly an error message appears.

If you're working with just a single backup system, a failed hard drive could cost you everything.

Does this sound like the worst case scenario to you? Well, it should. Especially when you hear that according to the National Archives and Records Administration 9 out of 10 US businesses file for bankruptcy in the wake of large-scale data loss.

So how can you protect your data?

The Cloud: Making Data Protection Less Expensive and More Reliable

By using an outside provider of cloud services, you can configure an automatic real-time backup that automatically synchronizes the contents of your crucial computers with remote servers over the internet. By implementing this one simple solution, you're automatically protecting your business against any disaster that can occur within the office.

Click the link above to read the full post about data backup and disaster recovery on our blog and the services that we offer to New York and New Jersey businesses: (

#datarecovery #backup #businesstips

Post has attachment
IT Mistakes Cost British Airways $102 Million (

There are levels of #IT #support issues that a business may encounter on a daily basis. The website going down for a few hours can be detrimental to a few users, a ransomware attack may cost time and energy to re-format all the computers and re-install from cloud data storage (you have cloud data backup's right?)

These are all fairly common issues that happen on a daily basis. However, British Airways learned the hard way just how much human error could impact their bottom line. We posted a story several days ago discussing the outage that caused thousands of passengers to be stranded.

Today, a follow-up article from Bloomberg discussed the financial impact of the outage for the company.

British Airways owner IAG SA said a power outage that led to the cancellation of hundreds of flights last month probably cost it about 80 million pounds ($102 million) in lost revenue and the expense of accommodating, re-booking and compensating thousands of passengers.

At least 75,000 travelers found themselves grounded over three days from May 27 as the U.K. carrier’s information-technology systems crashed. Walsh has said previously that the meltdown seems to have happened after an engineer disconnected a power supply at a data center near London Heathrow airport, causing a surge that resulted in major damage when it was reconnected.

Click the link above to read more.

#technews #BritishAirways #datacenter
Wait while more posts are being loaded