BlackCSI Blog

BlackCSI has been serving the Pennsylvania area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Font size: +

BlackCSI Launches SaaS Alerting Technology to Manage Common Business Applications

large_logo

“We’re excited to deploy this technology because it empowers our customers to immediately be notified of any issues so that they can be rectified, immediately,” said Ruthann Black, President of BlackCSI. We’ve all heard about the acceleration of ransomware attacks in the news lately, the real problem behind any breach, is not knowing the extent of the breach for a long period of time. With this technology, our customers will know instantaneously if a breach has been attempted as we thwart attacks on their behalf.”

While technologies like G Suite, Salesforce, Slack, Dropbox, Office 365 or Box have become ubiquitous in the modern workplace, they unfortunately expose networks to certain vulnerabilities which can be prevented. While BlackCSI’s particular technology monitors and alerts SMBs on up to 35 different types of cyberattack methods, many businesses are undereducated as to the 6 most common attacks.

1. Brute Force Attacks - this is when cybercriminals use automation and scripts to guess passwords. Typical brute force attacks make a few hundred guesses every second which take advantage of simple passwords which use common expressions like 'user123' or ‘password1,’ and can be cracked in minutes.

2. Logins From Unauthorized Countries - these types of breaches can be spotted through various indicators such as: a VPN connection from an unknown device or anonymous proxy, an abnormal amount of data uploaded during a VPN session, an increase of company-related data files accessed, multi-factor authentication (MFA) from a new device, or too many failed VPN logins.

3. Outdated File Shares From OneDrive/Google Drive/Dropbox/Etc. (Orphaned Links) - these occur when attackers overtake expired, stale, and invalid external links on credible websites, portals, or applications so that they can repurpose them for fraudulent activities.

4. Data Exfiltration - this is when any malicious actor targets, copies, and transfers sensitive data outside out of a company’s network, which can often be used to extract a ransom or be offered to a competitor for a bribe.

5. Confidential Files Viewed - when businesses are immediately notified as to which users are accessing confidential. A telltale sign that a cyber attacker is poking around in a network that they shouldn’t be meddling in, is when confidential files are being viewed frequently.

6. Security Group and Policy Changes - this is often a means to make it easier for a hacker to break in and cause a deeper extent of damage to a business or organization, yet SaaS alert technology can be configured to send off an alert to ensure that the company is in control of any changes being made to the security group.

“While there are many more types of attacks which can be rectified with various levels of complexity, these SaaS alerts can add a much-needed layer of security for any organization,” added Ms. Black. “However, as cybercriminals continue to innovate, so must the technology that we leverage to protect our customers.”

Latest News & Events

Leading MTSP Improves Communication Among Region’s Businesses HARRISBURG, PA – July 28 2022 - BlackCSI a leading managed technology services provider (MTSP), recently announced that the company is proactively integrating business phone syst...

Latest Blog

Businesses today need to have a robust and secure wireless network, but building one isn’t always that easy. Since there are a lot of machines that use your business’ Wi-Fi—from core machines that are essential to your business’ productivit...

Contact Us

Learn more about what BlackCSI
can do for your business.

(717) 620-3042

BlackCSI
507 N. York Street
Mechanicsburg, Pennsylvania 17055