Cybersecurity and Retail Should Always Go Together

Retail cybersecurity is a critical concern for every business in the retail industry, which is why cybersecurity and retail should always go together. Retailers are prime targets for cyberattacks due to the valuable customer data they collect, which usually includes personally identifiable information (PII) and credit card numbers. Retailers can handle large volumes of customer data, which becomes an attractive target for cybercriminals seeking to profit from selling it on the dark web.

Recent statistics from various sources suggest that more than 24% of cyberattacks specifically target retailers, making it one of the most heavily targeted industries. Roughly one third of retailers cite cybersecurity concerns as their primary obstacle in transitioning to e-commerce, with cost and technology barriers coming close behind.

For the bad guys, however, it is all about the money. Almost all retail cyberattacks are driven by financial motives. When consumer data is compromised, most of the information exposed consists of payment information and personally identifiable data which can fetch a good price on the dark web.

Retail cybersecurity threats occur because the environment tends to have a lot of elements. The hybrid nature of many retail businesses introduces additional risk, where brick-and-mortar stores are combined with e-commerce platforms and services.

NFC (Near Field Communications) vulnerabilities exist in some payment systems, and many Point of Sale (POS) systems still do not use point-to-point encryption for their communications. Even if communication streams are encrypted, it makes little difference if the software has known vulnerabilities or if insecure plugins or add-ons are being used.

Cloud-based storage and mobile apps increase the presence of stored data online, which increasingly leads to new threat vectors like cloud-based botnets and more.

The key is for businesses to prioritize security and invest in platforms and solutions that will help protect customer and business data. Critical in this effort is the implementation of IT best practices in regularly updating operating system and application software, limiting the access users have for installing or modifying software on their devices, and always monitoring the systems for vulnerabilities.

Like cybersecurity and retailers, Noobeh and secure IT go together. We help retail and other businesses proactively address cybersecurity challenges so they can protect both their business and their customers. Noobeh cloud services helps retailers secure their business servers and systems, delivering scalable, high availability and highly agile solutions that keep business and finance operations running.

Noobeh provides services for Microsoft 365 and Microsoft Azure platform and deploys solutions for manufacturing, inventory management, multi-channel commerce, EDI, financial and more. Get together with Noobeh and find out how we can help your business operate more securely and with better, more agile and resilient IT.

jm bunny feetMake Sense?

J

Prey or Empowered? Small Businesses and IT Security

Now more than ever, small businesses need to be vigilant with their information technology security. Small businesses may not be the big fish in the sea, but there are plenty of them out there to catch. Small businesses tend to make the best targets because they often fail to perform security audits, they may not be willing to invest in the resources needed to protect themselves, and they frequently don’t even carry the right insurance coverages. To hackers, small businesses are easy prey.

“Don’t think you are too small to be affected,” says Erik Knight, the founder and CEO of SimpleWAN. “Every place you have an employee or office is a potential entry point. Take it seriously; if you have something worth taking, a hacker will try to take it.”

https://www.forbes.com/…

There are a few things every business can do to improve the security and privacy of their data. It isn’t an option any longer; these are essential elements in an overall security strategy that can make the difference between staying in business and not.

Use strong passwords, not easy-to-guess words, phrases or sequences (1234 is not a strong password). Passwords should be unique, more than 8 characters in length, and have a mix of numbers, letters, and special characters.

Keep software updated. Whether it is the operating system on your computer or the software you use to write letters, having up-to-date software matters. Developers don’t just upgrade software to fix bugs or introduce new features; software often gets updated because of security issues or vulnerabilities.

Keep networks and connected devices secure to make sure that the computers and connections aren’t introducing weaknesses into your system. Not only are password controls and software updates needed, but firewall security and good anti-virus/anti-malware solutions are also a must. Keeping an eye on the server matters, but the connecting points and end points are where many vulnerabilities exist.

Set up two-factor or multi-factor authentication to further secure logins. 2FA and MFA is like having ID besides just your driver’s license to prove you are who you say you are. Your password, like your DL, is just one factor; you need one more thing to prove your identity for 2FA, like a code from your phone or maybe your fingerprint. The point is that there should be more than just a username and password to access important data.

Restrict use of personal email or social media on work devices. This gets a little trickier with smaller businesses, as many don’t or can’t support providing users with all company-owned devices. There are tradeoffs to allowing users to bring their own devices (byod) versus using company-owned devices. When mobile devices are part of the mix along with desktop and portable computers, it becomes even more complicated and the risk potential increases.

Use encryption for data in transit and data at rest. Encryption is like scrambling the data and then unscrambling it when you access it. In transit, data may be encrypted by a VPN so that it is protected over the wire (in motion) as it is sent and received on the network. RDP is also encrypted, but this remote access method’s main purpose is to keep the data from leaving the server in the first place. At rest, like when it is sitting on a hard drive or other storage location, data can also be encrypted. To open the file or file system, you need a key to decrypt it.

Keep all data backed up and create a way to rapidly recover your server and systems in the event of failure or compromise. Backups are great right up until you find they are as damaged or unrecoverable as your main system, so make sure to have a policy of testing your backups periodically. There are many ways to back up and protect your data, including external drives and cloud storage. If data gets lost or corrupted, you want to be able to restore it from a backup. Regularly audit your backup and data security practices to help identify weaknesses that make the business vulnerable.

Educating employees on the importance of cyber security is among the most important steps a business can take to protect itself. Keeping passwords secure and secret, knowing how to spot a phishing email and what to do and not do with it, not clicking on suspicious links in emails, not sharing personal or confidential information online, and what to do in the event of a breach are all things that should be regularly discussed with workers and supported by written policies.

Managed Azure cloud servers from Noobeh help you keep your business information more secure. Our services demand high levels of security and privacy, and we help our customers keep their data and systems safer and more secure by handling some of the requirements for them.

  1. Strong password policies and MFA is our standard setup, and software updates and patching are part of the service.
  2. Working on the cloud server keeps data on the server and not traversing the network or downloading to individual PCs, so information stays secure and separate from whatever a user runs on their local devices.
  3. Data on the Azure virtual machines is encrypted at rest, and additional encryption is available to add more layers of protection. Data in motion is encrypted, but very little data actually traverses the wire.
  4. Servers and data are backed up regularly with snapshots and file level backups, allowing for simple file restores as well as comprehensive system recovery.

For small businesses, Noobeh has the solution for creating a more secure and better protected IT environment where applications and data can be available to those who need them without compromising the investments already made in training and process development. Moving software and data to a private cloud server allows companies to continue using the software they rely on, just in a better way. Instead of being easy prey to hackers, our customers benefit from higher levels of IT administration, management and protection that empowers them to work the way they need to – any time, anywhere.

jm bunny feetMake Sense?

J

ZERO TRUST – Every Email is Suspect

Electronic mail has become a standard for communications around the globe. Email can contain not just text, but can deliver documents, photos and videos and other media. Email allows people to contact others at any time and respond on their own schedule. Where previous methods of communicating with someone far away were expensive and time-consuming, email allows people to stay in touch no matter where they are as long as they can connect to the internet.

Yet email is not a fully secure communication medium, and a lot of people are just now figuring out just how vulnerable they may be. What was once considered a trusted means of communication has now become something to be suspicious of. For most users today, it is best to approach emails with a high degree of suspicion (zero trust), especially if they ask for personal information or contain links or attachments.

With email, someone could intercept the messages or even store messages without your knowledge or control. The smallest human error can have ripple effects that turn into waves of trouble because messages cannot usually be taken back. And then there are the threat actors, of which there are too many and they are far too clever.

Phishing has become a highly popular method of cyber-attack, probably because it works so well. It involves tricking people into giving away sensitive information like credit card numbers, social security numbers, and passwords. Phishing is fueling (phueling?) opportunities for malware infections and identity theft which can lead to financial loss, reputation damage and more. Any information an attacker can gain helps them get even more information and go deeper into the organization.

Protecting against phishing attacks requires vigilance and following best practices such as using strong and complex passwords, and two-factor or multi-factor authentication (MFA). Also, it is crucial that users avoid clicking on links in emails, and everyone should verify the email authenticity before responding, especially if sensitive information is involved.

To check the identity of the sender, mouse over (put your cursor over) the email address and it may show you the actual sender address. While the email may say the message came from somebody you know, you may find that the actual sender address is an obscure email address you don’t recognize.

Mouse over links in the email but don’t click on them. When you hover your cursor over the link, it may show you the actual url the link goes to. Like with email addresses, links can be named something other than the actual url. If it is a url or website name you recognize and trust, then type the url into your browser instead of clicking on the link, just in case.

Use multiple channels for communication. This means you should not just communicate with co-workers and others using email. It is always a good idea to have some other form of trusted means of communicating with someone, such as via telephone or a messaging application. When you receive an email requesting sensitive information or an email with file attachments, you should communicate with the sender on one of your other communication channels to verify the authenticity of the email or attachment.

Never ask the sender to verify their identity over the same channel as the original communication. If it is a hacker, you’ve just verified to them that they reached their target.

jm bunny feetMake Sense?

J

When a Business Outgrows QuickBooks Enterprise

Small and midsized businesses use QuickBooks software to manage finance and operations. Since growing past 90% market share in 2008, Intuit QuickBooks proved over the years that businesses adopt accounting and finance software if it is affordable and easy to use. While Intuit’s focus today may be on gaining market share with the web-browser-based QuickBooks Online edition, QuickBooks Desktop Enterprise continues to serve the needs of companies requiring more robust functionality than QuickBooks Desktop Pro/Premier or QuickBooks Online editions offer.

Over the years the QuickBooks product line has grown to support larger businesses, with the Enterprise edition scaling to 40 users and boasting a load of features that fully support operational processes. Inventory management, order processing workflows, construction management, and other features give encouragement to businesses needing support for more complex processes. QuickBooks Enterprise allows the flow-through of product use knowledge, stored data and integration with other business solutions to be seamless and consistent when moving up from QuickBooks Desktop Pro or Premier editions.

When a business finds that it may be outgrowing the capabilities of QuickBooks, it does not necessarily have to abandon the product line in lieu of a larger framework such as with alternative ERP systems. While the larger web-based systems may boast greater capabilities, they often come with much greater cost of service and implementation.

For businesses invested in QuickBooks Enterprise, it makes sense to look at alternative technical or platform solutions to address certain operational needs rather than shifting to different finance and operations software. The cost and complexity of an entirely new ERP software implementation is often more burdensome and costly than is needed to meet the real business demand. Also, the value found in business data can be lost when converting from one solution to another, and the cost of change is often so burdensome that many businesses simply abandon their projects if they even get started.

When using QuickBooks, at times it is the platform — the local network, computers and server — that is not geared to handle more users, processes and applications working with QuickBooks and a more robust and agile situation is required. Businesses should also explore integrations or extensions that can address the functional requirements, supporting advanced and complex workflows with greater agility while retaining the full value of the historic data.

Some challenges with QuickBooks may indicate a business needs a more robust and scalable solution, but that does not necessarily indicate that the business has truly outgrown QuickBooks. Instead, it may be a situation best handled by extending QuickBooks through application integration with a more robust subsystem to address specific business needs, to add scalability, and to build on the existing history and business intelligence previously developed in the enterprise.

Large transaction volume, extensive inventory management, or performance issues can easily create the impression that a business has outgrown QuickBooks Enterprise. In most cases, these conditions are overcome by extending QuickBooks with solutions geared specifically to handle the complexities and volume of heavy inventory management processes. These solutions not only address the in-depth functionality required, but also tend to utilize more agile and robust database structures that can scale far beyond the capacity of any QuickBooks edition alone.

Some businesses wishing to provide more advanced reporting and analytics, along with delivering realtime insights, may initially consider QuickBooks reporting to be insufficient for their needs. Yet there are integrations available which make QuickBooks financial and operations data as accessible and usable as the most robust enterprise applications. Satisfying the need for highly customized reporting and analytics far beyond QuickBooks standard reporting, these solutions create visibility and give meaning to QuickBooks data in ways that cannot be accomplished within the application alone.

Mendelson Consulting understands how businesses can outgrow the core functionality of QuickBooks and provides the tools and solutions to address growth in practical ways that do not diminish the value of data, training and operational intelligence that has been so costly for the business to acquire. We help businesses expand their capabilities and improve efficiency without losing their investment in QuickBooks, addressing the needs of growing and complex businesses without forcing the change to more extensive and expensive solutions.

jm bunny feetMake Sense?

J

Upgrade from Small Business to Enterprise-Class IT on Azure

It can be a challenge to forecast when a small business will outgrow their current information technology or platform. Many businesses have complex needs which require enterprise approaches and don’t fit squarely into the SMB box.  Yet every business might need to consider upgrading their technology or platform when they experience certain signs or reach specific milestones that indicate their existing technology infrastructure and tools are no longer meeting their needs. The business’s growth trajectory, operational needs, industry requirements, and budget considerations will all play heavily in the decision to upgrade to Azure platform and enterprise-class information technology.

As a business expands and diversifies its operations, it will require more complex IT solutions to handle various processes, departments, and locations. Expansion generally comes with added complexity in operations, processes, and data management, so growing businesses need platforms with advanced features and integrations that can handle the increased complexity.

When a small business experiences significant growth in terms of customers, employees, or revenue, the existing technology might struggle to keep up with the increased demand. When the current technology causes performance bottlenecks, slow response times, or downtime that impacts business operations and customer experience, it’s a sign that the business might need more robust and scalable software or platforms. Virtualized platforms (Noobeh prefers Microsoft Azure) can provide the scalability and resources needed to accommodate growth and can provide the necessary security features and tools to meet compliance requirements.

If business operations are mission-critical and any downtime would result in substantial losses, upgrading to the Azure platform and implementing the available redundancy and high availability features can ensure business continuity.

If the business is expanding its operations to multiple locations or serving a global customer base, it might need technology solutions that can support distributed teams, communication, and data access from various locations. By its nature, the Azure platform is cloud and not tied to a location, enabling users to collaborate, communicate and work from virtually anywhere.

If the business needs to analyze large volumes of data for strategic decision-making, Azure’s enterprise-level platform supports advanced analytics and reporting. Microsoft Azure database as a service, Power BI and other solutions provide businesses with the robust and powerful tools they need to develop the data warehouses and reporting systems that create a competitive advantage.

It is important to carefully assess the business’s current state, future goals, budget constraints, and technology requirements before deciding to upgrade technology. There may be several suitable upgrade paths that could be followed, the best path for the business is the one that allows for future change. While moving to a cloud platform might come with upfront costs, a more agile and capable system can offer long-term cost efficiency by reducing the need for frequent technology upgrades while providing the affordable scalability the business needs.

Connecting with Noobeh’s cloud services team is the best next step for small businesses looking to improve their IT platforms and operations. Migrating beyond local networks and servers, Noobeh helps businesses upgrade to enterprise-class infrastructure, applications and services which support expanding and changing operations.

jm bunny feetMake Sense?

J

Preparing Your Business for Exploding Growth

Preparing for exploding growth in a business requires careful planning and strategic decision-making. To develop the information necessary to support these activities, businesses must implement their processes and systems to properly collect the data required. Unfortunately, many organizations fail to develop the systems which will support increased activity and business growth, only recognizing after the fact that the process support and the data they need isn’t there. To prevent being caught off guard with more business demand and not enough organization to support it, follow these recommendations to set the business up for success over the long run.

Set clear goals and adjust as required. You need to know what the business purpose is… the objective you hope to achieve with all this activity. Establish SMART goals – specific, measurable, achievable, relevant, and time-bound. With a set of smart goals and a well-defined objective, the business has a clear direction and a guide to assist in decision-making.

Build infrastructure that is scalable. If the business infrastructure can’t handle increased demand, the business can’t grow effectively. Scalable information technology and software systems, robust production capabilities with adequate human resource availability, and increased efficiency in supply chains will help the business meet increasing demand, while improved reporting and business intelligence helps to anticipate potential bottlenecks, allowing for plans to be developed to address them.

Make sure finance and accounting are set for growth. Strengthen overall financial management and review your financial processes to ensure they can accommodate growth. Implementing the right systems and software is necessary to not just optimize production and operations, but to provide a foundation for establishing sound accounting and financial practices which will help the business secure funding and manage cash flow effectively. A good way to evaluate your preparedness for growth is to prepare financial forecasts and stress tests to gauge your business’s financial resilience under various growth scenarios.

Streamline operations and automate where it makes sense. Evaluation of businesses processes is an ongoing task if your business is to continuously work to improve efficiency and effectiveness. Where opportunities for optimization and improvement exist, consider using automation and technology solutions to help streamline operations and reduce manual effort while remaining focused on enhancing customer experience and satisfaction through streamlined processes and improved service delivery.

Plan for Risk and Contingencies. You should try to identify potential risks and challenges associated with rapid growth, such as increased competition, supply chain disruptions, or changes in customer preferences. Develop contingency plans to mitigate these risks and ensure continuity of the business and operation. It may even make sense to consider diversifying your revenue streams to reduce dependency on a single market or product.

Monitor, adjust and adapt as needed. Key performance indicators (KPIs) should be regularly monitored, as should market trends, to stay informed about your business’s progress and to stay on top of industry developments. Use data analytics and reporting tools to gain insights and make data-driven decisions instead of operating on emotion. The business that plans for growth must remain agile and adaptable, adjusting strategies and operations as needed to accommodate changes in demand as they occur.

Preparation for rapid growth requires a proactive approach and continuous evaluation of your business’s readiness. Regularly reassess your strategies, make necessary adjustments, and stay focused on delivering value to customers as you scale.

Mendelson Consulting and the Noobeh cloud services teams are advisors and consultants with expertise in scaling businesses, and can provide valuable insights, guidance, and support throughout the growth process and beyond.

jm bunny feetMake Sense?

J