AllConnected Blog

Perch Security MDR
AllConnected News
Brennan Smith

AllConnected Develops MDR Service with Perch Partnership

AllConnected will partner with Perch Security, a 24×7 co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC) and comprehensive SIEM (Security Incident and Event Management) service.

AllConnected MDR will be able to detect breaches sooner, enabling engineers to respond and remediate quickly.

Read More »
CPA
Managed Services
Brennan Smith

Simplify Compliance of New Security Requirement for CPA License

Now for 2020, the FTC Safeguards Rule requires every tax professional, whether you are a partner in a large firm or a sole practitioner, and every Authorized IRS e-File Provider, to create and enact security plans to protect client data.

The new IRS Form W-12: Paid Preparer Tax Identification Number (PTIN) for Application and Renewal now includes a legal requirement for data protection:

Read More »
Security Services
Mariah Prendergast

Secure and Stabilize the #WFH experience for the Long Term

Your employees need executive leadership whether you’re in-office, on-the-road, or working-from-home. As you adapt to the new business environment and implement effective WFH communication, consider how a comprehensive WFH solution will drive productivity and satisfaction.

Read More »
Multi-factor authentication: something you know, something you are, something you have
AllConnected News
Mariah Prendergast

How Secure Is Your Multi-Factor Authentication?

If today’s cybercriminal obtains your login credentials, he can change your account settings, steal sensitive personal or company data, send out phishing emails as you, and possibly access additional accounts within your organization.

Criminals can attempt this “malicious account takeover” through:

Hacking: Automated scripts run through various password combinations (AKA, brute force attack) to discover the correct access.
Phishing and Spear Phishing: Highly targeted emails from seemingly credible sources trick users into to revealing personal information.
Social Engineering: Researching online databases and social media to data mine potential password information based on your name, location, phone number, or names of family members, etc.
Botnets: Bots from multiple IP addresses perform high-volume username and password hacks to take over a number of accounts while staying unnoticed.
Credential Stuffing: Stolen or leaked credentials are tested against multiple websites in the hope that the victim uses the same password for everything.
In order to prevent the above, connecting to your network and critical applications has developed from a simple password into a process of multi-factor authentication (MFA).

Read More »