Mitigate Data Breach Risks with Small Security Steps for Remote Servers

September 18th, 2014 by turbosupport No comments »

With increasing stories about data breaches making the headlines on a near daily basis, the topic of security has become more important than ever. According to a report issued by the Ponemon Institute and IBM, the average cost of data breaches around the world increased by 15 percent during the last year. Each compromised record translated to a cost of $145, translating to a total cost of $3.5 million per company for each data related breach. The most common causes of many of these breaches involved malicious code and sustained probes.

Another element that many of these data breaches seem to have in common is that even a small, simple action, such as applying a security update or requiring two-factor authentication for remote access could have prevented the attacks.

Criminal attacks are now a growing concern among most organizations. In order to prevent such attacks, organizations that use remote-access tools must ensure those tools are secured through the two of two-factor authentication. Simply put, if you are not defending your front line with two-factor authentication, hackers will find it to be much easier to brute-force passwords. Among the most recent breaches was the Heartbleed attack. In those attacks, implementing a Heartbleed fix could potentially have thwarted a breach. Insider threats are also a serious issue today. While the most obvious protections could prevent the loss of data, those measures are often the ones that are overlooked the most.

The subject of security is one that we have been reviewing with customers for many years. Among the most common mistakes that many organizations make is providing unlimited and unmonitored access to system administrators. This, unfortunately, sets the stage for trouble later on. In many instances, admins use hosted remote access tools such as Gotomypc or LogMeIn. If these admins were required to use a centralized remote access tool such as RHUB remote support servers, an audit activity trail would be captured. In addition, the scope of access would also be limited, thus reducing possible threats. Additionally, by requiring two-factor authentication to remote access tools, you can ensure that your employees are not able to utilize another individual’s credentials in order to gain access to different systems.

It should be noted that this would not prevent an admin from utilizing a rogue remote access tool in order to gain access to your network or even from physically logging into a system. Nevertheless, by blocking unauthorized remote access tools from your network and implementing the right physical security practices, you can significantly reduce such risks.

In all instances, successful security should be multi-layered. Those layers must often be comprised of a series of small steps. While on the surface those steps may seem unimportant, the grand sum total can help to mitigate risks and protect your organization from data breaches and hackers.

Are you interested in obtaining improved remote security for your networks? If so, contact us at 866-758-0984 or email us at sales@rhubcom.com.

  • Share/Save/Bookmark

RHUB Remote Support Servers Changing the World

September 17th, 2014 by turbosupport No comments »

Have you heard of what is known as the butterfly effect?

As crazy as it might sound, according to the concept, a seemingly insignificant action can have a massive impact. For instance, Chaos theory supposes that the slight motion of a butterfly flapping its wings can set off a chain of weather events that can ultimately result in a major weather event thousands of miles away.

While it might seem improbable, Chaos theory is actually based on the atmosphere’s instability. The fact remains that even small actions can have serious consequences.

At RHUB, we are keenly aware of this theory and wholeheartedly believe that even small changes can result in significant positive impacts. Each new feature that we introduce is measured carefully. We take the time to study each potential impact. Some of the simplest features we offer at RHUB, such as assisting customers in getting into RHUB sessions quicker, can have a tremendous financial impact.

Although a few minutes might not sound much in the grand scheme of things, it can have a serious impact. Consider the ripple effect for a moment. Suppose every employee who requests technical assistance being able to get back to work even a couple of minutes faster by receiving expert technical support. Not only that, but receiving the support needed more easily. This is precisely why our team at RHUB spends so much time in considering each aspect of every product. We are committed to ensuring that our technical support is as robust and effective as possible. While one feature might only save a few minutes, when all of our features are used in conjunction with one another, they can help to tremendously boost productivity. We take the time to do this because we understand the implications involved in presenting a state-of-the-art remote support experience.

One of the main reasons that we are the go-to choice is the fact that our product is built with security at its very core. We do not view security as merely a buzzword or the latest trend. We understand the risks and implications involved in security for a remote support appliance. This is precisely why we are not only the preferred choice but often the only choice for many high-risk industries, such as healthcare, national defense, and banking. Without the proper security, life as we know it can change dramatically in these industries.

Suppose that RHUB is used to bring a medical device back online. In this instance, this is not just any medical device but one that is need to save the life of a patient in that moment. That is not only affecting one individual, but also an entire family.

In today’s modern world, technology is not only a convenience; it is essential and touches every aspect of our lives. Whether it is a classroom full of students who depend upon computers for learning or it is a military platoon that is depending upon a network for strategic operations, technology can have a tremendous impact on our lives.

According to the six degrees of separation theory, we are only six degrees away from everything. Suppose that a student in a classroom with RHUB technology learns one thing that inspires a passion for medicine. That student goes on to become a surgeon who utilizes RHUB to access medical records that ultimately saves the life of a young child. That child grows up to become an intelligence operative. Several years later, that intelligence operative uses a secure RHUB channel to connect to vital data regarding a terrorist attack. The attack is thwarted and hundreds of lives are saved, including the life of a child who will one day grow up and find a cure for cancer that will save millions of lives. It all started with the best remote support solution in the world.

Contact us today to learn more about RHUB Remote Support Solutions at 866-758-0984 or visit our website http://www.rhubcom.com.

  • Share/Save/Bookmark

RHUB Web Conferencing Servers Gives you Complete Control Over Pausing Meetings

September 16th, 2014 by turbomeeting No comments »

The importance of actually being able to see your audience when presenting cannot be emphasized enough. When you are not able to see your audience, there is often a tendency to continue talking when you are not able to see the expressions of your audience and take visual cues. Even though it is a virtual meeting, you are still communicating in a non-verbal manner. When you are not able to see your audience and take advantage of those visual cues, one thing that you can do is to make a point to pause occasionally. Such pauses provide your attendees with the opportunity to take in the information you have just provided as well as ask a question.

Pausing your desktop screen sharing is also a good option. Screen sharing gives you the ability to collaborate with colleagues on a variety of different documents regardless of any differences that might exist between installed software and operating systems. For instance, with screen sharing, you can take advantage of the option to demonstrate an action within an application, share the contents of a document, or share a presentation that you already have running on your own computer. You can also opt to pause the item that you are currently sharing with screen sharing. Using annotation tools, you can then draw or annotate on the shared item.

One of the great features of this is that any actions you take in the shared region of your screen will be visible to the participants of your meeting. This makes it possible for viewers to follow along with the progress you make on your screen.

You have three options for sharing your screen:

Desktop
As previously mentioned, when you share all of your desktop, your attendees are able to see everything that occurs on your screen, such as all visible applications and windows. This option is often preferred when you are using several windows or applications in your demonstration. It also works well when there are multiple areas that you wish to share which are layered on top of one another. With this option, you can pause a shared desktop and then note or annotate everything that is visible.

Application
The application option gives you the opportunity to choose from a list of applications that are currently running on your computer. Your attendees will only be able to see the applications that you select. You can use this option when you wish to demonstrate functionality or if you want to share documents that can be opened in multiple applications.

Window
The window option allows you to choose from a list of windows that are currently open on your computer. As with the application option, only those windows that you choose will be visible to your participants. This is a good option to use when you want to annotate or share only the information that appears in one or more windows.

RHUB Web Conferencing servers give you the opportunity to share only what you wish to show your attendees. For example, if you need to do something during a meeting that you do not want seen or shared, you can simply pause the meeting.

By default, your desktop is not shown to attendees when you start a meeting. You will know that your screen is being shown when you see the green icon. In order to pause your screen, all you need to do is click the pause button. The pause button will convert to a play button and you will see the word Paused to indicate that the meeting has been paused.


Icon indicating active application sharing


Icon indicating that application sharing is paused

Would you like to learn more about how you can share information and pause online meetings? To learn more about the many features of the RHUB Web Conferencing Servers, gives us a call at 866-758-0984 or email us at sales@rhubcom.com. We would be pleased to schedule a demo.

  • Share/Save/Bookmark

5 Steps for increasing Web Collaboration Security for Healthcare Providers

September 11th, 2014 by turbomeeting No comments »

Securing any enterprise is no small feat. This task becomes even more significant when it involves a healthcare organization. With the rapidly expanding use of web apps and collaboration tools in healthcare, coupled with the ongoing challenge of protecting patient data, it’s no wonder that healthcare institutions are now taking extreme measures to ensure that security breaches don’t occur within their organizations.

Read more: http://www.beckershospitalreview.com/healthcare-information-technology/5-steps-for-increasing-web-collaboration-security-for-healthcare-providers.html

  • Share/Save/Bookmark

Deploy On Premise RHUB Remote Support Servers to Improve Remote Support Security

September 1st, 2014 by turbosupport No comments »

When it comes to working online, you can never be too safe. For quite some time, Internet specialists have been calling attention to the fact that numerous devices are exposed online, including surveillance cameras, medical devices, home monitoring systems, and more. Recently, a survey was conducted to identify computers with remote access software but with no password for security. Within just one hour, tens of thousands of computers were identified.

That is certainly a frightening prospect and serves to underscore the importance of ensuring that your remote support is completely secure. Once a prospective hacker gains access to your network, there are virtually no limits to the damage that can ensue. The recent spate of data breaches reported in the news, including breaches related to payment information from point-of-sale systems demonstrates just how serious this situation can be.

The question is what can you do to practice safe remote support computing? The solution is as simple as using RHUB remote support servers.

RHUB remote support servers assist in ensuring the remote access of your computers is secure while working from behind your computer’s firewall. As a result, you are able to view and take control of unattended desktops, servers, and even point-of-sale returns all within the convenience of real time and from any platform. Furthermore, you can do so with the knowledge that your system is protected by unparalleled security.

In considering how you can make your remote support more secure, it is important to remember that your security is only as strong as your weakest point. Unfortunately, remote support servers provide little in terms of access security. Additionally, remote support servers provide access to anyone who possesses a session ID and password. Such security can be compromised far too easily. All it takes is for the wrong person to read an email, gain access to someone’s calendar or use one of the many password cracking modules readily available. At that point, security is compromised and all of your confidential data could be vulnerable to an attack by a hacker. It can happen that quickly and that easily.

By comparison, RHUB remote support servers provide the opportunity to establish a virtual VPN between attendees and the host. Consequently, this limits the scope of the session’s attendance to only internal locations and addresses or specified external IP addresses. It should be noted that such policies are specifically designed to work alongside your internal security servers, including routers, firewalls, and other types of security devices that your organization may opt to use.

Ultimately, RHUB remote support servers offer the best possible security by restricting attendance to authorized attendees and locations. This works to prevent your systems and networks from hacker attacks. You gain the ability to work efficiently and with complete confident that your system is completely protected.

Take advantage of the opportunity to secure your networks and computers by utilizing RHUB remote support servers. To obtain more information, contact us at 866-758-0984 or email us at sales@rhubcom.com

  • Share/Save/Bookmark