Making the Move to Office 365? We can help!

Office 365 acts as a robust email solution that can be significantly beneficial to your organization. In which case, migrating your current email can require some planning.

Determine how many mailboxes will need to be moved over. This will give us an idea of which devices need to have office 365 setup and how much time it will take. While Exchange migrations can be simple, a POP/IMAP migration may require manually uploading through Outlook to the new accounts.

The next step is logging into the DNS host to make the make the necessary changes. After this is complete the email should be routed to Office 365 instead of the old email. The transfer from your old mail system to Office 365 can take time to complete. It is usually estimated within a few hours or days to make the transition.

Once the email migration is complete it is also important to setup features and settings appropriately. This includes setting up signatures, auto-complete history in Outlook and adjusting settings. Finally, other devices, such as phones can be setup and automatically configured to sync with Office 365 settings.

Are you looking to migrate to Office 365? Kitsap Networking Services offers Office 365 Migration solutions for businesses. Please give us a call at (360)-516-6741 for your information technology needs.

Running Low on Hard Drive Space — What Can I Do?

 

If you received a warning in Windows about getting low disk space there are a couple of things you can do to free storage.

The first method is to remove unneeded files from your computer. Do you have downloads or installation files that are no longer being used? Programs that are never used? Deleting those files can help regain the lost storage.

If you have tried the first method and did not find any unneeded files that you can delete then you can also access the Windows Temporary folder and delete unneeded .cab files. The TEMP folder is located within the Windows OS folder. Files located in the TEMP folder can be removed manually or by using the Disk Cleanup Tool. Be aware, removing .cab files can corrupt your operating system. It is advisable to consult with your IT department before removing these files.

Finally, if you have tried these steps and have no found any files that can be removed you can run a disk usage statistics viewer. WinDirStat is a free tool that displays data usage in a graphical interface.

For technical services concerning hard drives please contact Kitsap Networking Services at (360)-633-0530.

HIPAA Compliance? No problem!

HIPAA, otherwise known as Health Insurance Portability and Accountability Act, is the standard to which patient data is kept protected. If you are an organization that deals with protected health data then it may require for physical, network and process security measures to be established.

Covered entities and business associates, which consist of health plans, health care clearinghouses and health care providers who transmit health data, require to ensure all data is kept confidential. Protected health information that includes names, addresses, phone numbers, medical records should follow HIPAA compliance.

In order to be HIPAA Compliant an organization must address the following components: Self-Audits, Security Risk Assessments, Remediation Plans, Policies, Procedures, Employee Training, Documententation, Technical Safeguards, Physical Safeguards, and Adminstrative Safeguards.

Is your organization HIPAA Compliant? At Kitsap Networking Services we offer HIPAA compliance services that are suitable to your organizations needs. Contact us at (360)-516-6741 for detailed information on how you can setup your organization to be HIPAA Compliant.

Password Storage? Keep your Credentials Safe!

Are you someone who places sticky notes as a reminder of your login information? Doing so can be a huge security breach. In this guide we will explore the different options to password storage and how you can effectively manage your device’s private information.

Write down your passwords and store in a private location: The simplest method is to write down your password in a notebook and store it in a confidential location that cannot be accessed by the public. Safe storage for passwords can include a safe, and lockable file cabinets.

Use a password manager: A password manager offers the flexibility to store your credentials across a wide variety of devices with ease. With so many passwords to remember, a password manager offers the simplicity of storing multiple passwords in a single location.

Leave it with your IT department: Passwords are integral to your IT department. Most IT departments use software to store private or important password information. Such software use encryption to ensure that the data stored is secured and out of reach from hackers. Leaving your password with your IT department is a great way to ensure your password is in safe hands.

Contact Kitsap Networking Services at (360)-516-6741 for more information on our password storage services and how we can integrate password storage to your organization.

Traveling for Work? Setup a VPN for Remote-Access!

Are you working from home but need access to your company files located on a network? A remote-access VPN connection allows a user to connect with a remote computer network. This allows a user to securely access the network from a separate computer without having to be at the location. The VPN, otherwise known as a virtual private server, extends the private network across a public network and enables a user to transfer data throughout the network as if they were directory connected to that network. Worried about security? A VPN tunnel ensures that the transfer of data is encrypted. Therefore any applications running in the VPN network are properly secured within a private network.

Some examples of uses for a VPN include:
Accessing a business/home network while traveling: A VPN allows a user to access a network from a public network onto a private network. In the case you are traveling and need access to important data located on your office computer, a remote-access VPN can allow you to log in to your office network and access your device.

Hiding your activity from your local network or ISP: A VPN acts as a proxy that can cover your internet footsteps. The way it does this is by redirecting your internet traffic, hiding your computer when it is making contact with a webstie.

Transfering files onto a network: On the road and need to transfer files from your laptop onto a network? A VPN connection allows you to connect to your office network to access files or transfer data.

Interested in setting up a VPN at your home or business? Contact Kitsap Networking at (360)-516-6741 for more information.

Fraudulent emails? Beware of Phishing Attacks!

Have you received an email that has a questionable origin? Suspicious emails that are fraudulent use phishing techniques in order to gain access to confidential information or install malicious software.

How do you prevent a phishing attack from infecting your computer? An email from a friend or colleague may come from a hacked account. If you recieve a questionable email it is best to contact the sender directly in order to ensure the validity of the email. It is best practice to never send sensitive information through email. It is also important to not respond directly to a suspicious email until it has been confirmed that it is from a valid source.

If you have recieved a fradulent email from a hacked account or suspicious contact it is best practice to contact your IT company.

At Kitsap Networking we offer email services that can assist with preventing phishing attacks from infecting your devices. Contact Kitsap Networking Services at (360)-516-6741 in order to get more information.

Ransomware Attack Prevention: Backup Your Data!

 

What is your companies backup plan in case of a disaster? In recent events, reports have emerged that a type of malware, otherwise known as Ransomware, limits users from accessing their system or personal files. Ransomware typically spreads through phishing emails and spreads onto the network affecting multiple computers. Such a disaster can render a companies device useless and data unrecoverable. With a backup plan in place your company can ensure that your data is secured and easily recoverable.

Cloud backups are a great method to ensure your data is secured. A benefit to having a cloud backup is keeping your data off of your network and stored in a secure location. Hardware failure isn’t a problem in having a cloud backup and only requires internet connectivity in order to upload data from a network onto the cloud backup. In the case your companies data is compromised it can be readily recoverable through the cloud backup.

How about keeping a backup onsite? While a cloud backup may not always be a viable option you can always backup your data onsite using an external hard drive. An onsite method of protecting your data against ransomware is creating a backup plan with hard drive swaps. This means swapping the external backup hard drive on a weekly basis. Doing so can prevent the hard drive from being infected with malware, possible data loss and prevent backup data from being compromised. In which case, it also enables a higher level of data integrity and enforces an additional layer of protection.

 

Is your company data safe from Ransomware? Contact Kitsap Networking for a backup evaluation at (360)-516-6741.

Static IP vs Dynamic IP

An IP address is uniquely assigned to each device on the network. Much like a street address is used in order to determine where a package is going, an IP address determines where a packet is sent.

So how does an IP address work with a static and dynamic IP and how do they differ? When you add a computer to a network they are given each their own IP address to which they can be identified on the network.

If a device is assigned a static IP address, the address will not be changed. Often Web and FTP servers use a static IP address as it promotes a reliable method to reach an assigned host name. Some benefits of using a static IP address include faster download/upload speeds in comparison to dynamic IPs, and geolocation accuracy.

A dynamic IP address is automatically assigned by the network and usually changes. Benefits of using a dynamic IP include: Security, costs and fast networking configuration. Using a dynamic IP address can prove immensely beneficial where you have a large LAN network. In order to configure a dynamic IP automatically it requires a DHCP server to obtain your IP address. The DHCP configures the IP address automatically which overall saves on time by not having to configure each computer manually.

How can I check to see if I have a static or dynamic IP on Windows?

If you are on a PC, open the command prompt and type the command “ipconfig /all” without the quotations and hit enter. Next to the DHCP enabled there will be a “Yes” or “No” depending upon the static or dynamic IP configuration. A “Yes” means you are using a dynamic IP address and a “No” means you have a static IP address.

Having trouble with your network? Contact Kitsap Networking for many of our troubleshooting services at (360)-516-6741.

SSL for Secure Web Browsing

Phishing is one of the fastest growing threats on the internet and has become popular among hackers due to its effective method to get access to confidential user information. SSL, which stands for Secure Sockets Layer, is the standard base for implementing a secure and encrypted link between devices. The importance of SSL is that information you send on the internet is sent between computer to computer until it arrives to its destination server. SSL ensures that all data transferred between the web server and browser remains confidential. This popular method of encryption is used by millions of websites in order to protect online transactions.

How can you tell if a website SSL Certified?
Before giving your information to a website you should always check to make sure it is secure. A method of doing that is to check the SSL Certificate. If the url of a website begins with “https” instead of “http” then it means the site is using a secured SSL certificate.

For more information on SSL for secure web browsing please contact Kitsap Networking at (360)-516-6741.

Spotting a Suspicious Email

A cyber criminal can send fake emails that appear to be coming from someone you know. These suspicious emails that may look like they are from a valid sender are known as phishing expedition attacks. Victims from these so called “phishing expedition” attacks are tricked into giving out personal information or accessing malicious websites that can infect their devices.

So how do you prevent a phishing expedition attack? If you recieve a suspicious email requesting for important information you should always verify the message for authenticity. For best security practices, if the message appears to be suspicious you should give a call to that person to verify it was them who actually sent it. Banks or investment companies will never ask for sensitive information via email.

For more information on protecting yourself against suspicious emails and how to spot them vist kitsapnetworking.com/blog/. For our IT services please contact Kitsap Networking at (360)-516-6741.