www.soundshore.nethubfssoundshore-siteheader-img-2

The Next Level Network Blog

IT Management, Security, Compliance for Regulated Firms

Eric Benda, CEO


Recent Posts

Announcing a Free Tool to Walk You Through the Steps to Business Continuity and Disaster Recovery

Jun 25, 2019 9:00:00 AM / by Eric Benda, CEO posted in Disaster Recovery, Business Continuity, DATTO

0 Comments

"The Ultimate Disaster Recovery Checklist" Offers a Rational Response to a Stressful Experience

We recently launched a free eBook on planning for business continuity and disaster recovery. Again in collaboration with our Disaster Recovery as a Service (DRaaS) solutions partner, DATTO, we’re announcing part two, "The Ultimate Disaster Recovery Checklist." Even if you have a plan in place, or are working on one, when disaster strikes, great stress is placed on the entire organization. It helps to have a handy tool like this checklist to help organize a rational response to what could be a chaotic and disarming experience.

Read More

Cyber Attacks on IoT Devices Are Rising

Jun 14, 2019 12:07:28 PM / by Eric Benda, CEO posted in cyber security, Soundshore Technology Group, IoT Cyber Attacks, SecureRF

0 Comments

Why More Secure Smart Devices Are Critical to Network Security

In recent years, there’s been a lot of attention on the Internet of Things (IoT). The IoT is revolutionizing many aspects of modern life, but it is also enabling unprecedented cyberattacks on IoT devices. It’s critical for businesses to understand how and why these attacks work, as well as why they must seek more secure smart devices to protect office network security. This is especially true of regulated industries including financial services and healthcare that are adopting IoT technologies to better serve their clients and patients. They must also deal with the downside.

According to its Wikipedia definition, IoT is the extension of Internet connectivity into physical devices and everyday objects. These devices can then communicate and interact with others over the Internet, and they can be remotely monitored and controlled. It’s easy to imagine how bad actors could exploit these factors to breach a smart home security system or to spy on an office conference room via a smart TV.

Read More

The BYOD Dilemma: Corporate Security vs Employee Privacy

Jun 7, 2019 3:16:29 PM / by Eric Benda, CEO posted in MaaS360, ManageEngine, BYOD, CYOD, COPE, corporate security, employee privacy

0 Comments

BYOD Issues Driving Changes to Device Management Strategy

Over a number of years, the practice of Bring Your Own Device (BYOD) has become commonplace in companies of all sizes. Employees have been granted permission to let their personal devices double for work – phones, tablets and laptops. BYOD evolved out of employee discontent with having to carry two phones or with finding themselves needing emails or files at home that were on an office computer. Companies began adopt BYOD policies. But those decisions are having unanticipated impacts. In today’s tense cyber security environment, pure and simple, BYOD makes it impossible to maintain a secure network. Mobile device management (MDM) software has been developed in an effort to secure company data on private devices. However, MDM can compromise user privacy. So, we end up needing ways to balance corporate security and employee privacy.

Read More

Announcing a Free eBook of Critical Importance to Your Company: 4 Business Continuity Planning Essentials

Jun 4, 2019 1:32:24 PM / by Eric Benda, CEO posted in Business Continuity Plan, Disaster Recover

0 Comments

Disaster Can Strike Any Company. What to Consider for Your Disaster Recovery Plan

It blows us away how many companies totally ignore the need for a business continuity and disaster recovery plan. We all like to hope for the best and chances are our companies will never experience a disaster that impedes our operations, shuts down our ability to do business for days or weeks on end, or harms our employees and our customers. But these days, chances are better that they will.

Read More

Does the EU’s GDPR Affect US Data Privacy and Cyber Security Compliance Strategy?

May 8, 2019 2:21:06 PM / by Eric Benda, CEO posted in Compliance, cyber security, data privacy

0 Comments

Yes, Especially Regulated Industries. And US Regulations Are Coming. Prepare.

Read More

Cyber Security Services: Do You Need A Data Hostage Negotiator?

Apr 8, 2019 9:00:00 AM / by Eric Benda, CEO posted in cyber security, cybersecurity

0 Comments

Get Our Complimentary Guide to Freeing Your Files in a Ransom Ware Attack – And Avoiding One

According to a recent report from Datto, a leading provider of cyber security services and solutions to managed service providers (MSPs) like us, ransomware attacks are continuing to grow like wildfire and are expected to continue increasing at a rapid clip. These costly cyber security attacks tie up your data until you pay a ransom to the hacker. It’s not just the ransom money, but also the downtime and loss of productivity that make this a threat to avoid or manage efficiently.

Read More

Building Cyber Security Training Programs for Employees

Mar 5, 2019 9:00:00 AM / by Eric Benda, CEO posted in Compliance, cyber security, training

0 Comments

Critical for IT Network Security and Regulatory Compliance

This post will outline how to build effective cyber security training programs for employees. Here’s why it’s important for you to read on and then take action if you haven’t already done so:

Read More

Cyber Security Plan Step 1: IT Inventory Management

Feb 7, 2019 12:21:34 PM / by Eric Benda, CEO posted in cyber security

0 Comments

Identify and Manage All Hardware and Software on Your Network

As we’ve been discussing, protecting your IT network from online threats requires a cyber security plan. Arguably, the first step in that plan is to identify and inventory all of the hardware and software on the network. This is critical to IT inventory management -- an ongoing, multi-step effort to make sure every element of the network has up-to-date protection against vulnerabilities. It is considered a best practice for regulated entities. This post will outline key issues of inventory management beginning with why it’s so important.

Read More

Software Patch Management Best Practices: A Key Part of Your Cyber Security Program

Jan 4, 2019 2:18:01 PM / by Eric Benda, CEO posted in cyber security

0 Comments

Security Updates Must Go Beyond Your Operating System to 3rd Party Software, Apps

Many of our clients are regulated entities in financial services and healthcare. In our ongoing concern for their cyber security in the face of increasing and evolving threats from individual and nation state bad actors, patching security vulnerabilities in software and applications is an integral part of every cyber security program we implement. Because many companies believe that their Microsoft and Apple security updates have them covered, this post shares some additional software patch management best practices.

Read More

Encrypted Email Services: Know What You're Getting

Dec 19, 2018 8:55:00 AM / by Eric Benda, CEO posted in Email encryption

0 Comments

The ‘Encryption Myth’ May Open Regulated Businesses to Added Security and Compliance Risk

This post is motivated by the growing number of inquiries we’re receiving from clients about whether they should be using one of the cloud-based email encryption services available today from companies including Citrix, Sharefile, Smarsh, AppRiver and others. Many of our clients are in regulated industries -- financial services and healthcare.

Read More