Tucson Dinner Meeting
October 12, 2017
@radisson Suites Speedway

Project SAFE "best OF" Contest Winners & Guest Speaker Bert Ratia.

Bert Ratia of LeeShanok Network Solutions will be presenting on "IT Security for the Common Worker." It's packed with useful tips we can all use every day to recognize, deflect, and protect.

Click HERE for more Info

Cisco Connect Phoenix

Tuesday, September 19, 2017
8:00 a.m. – 4:00 p.m.
Arizona Biltmore
2400 E Missouri Ave
Phoenix, AZ 85016

Join us for a free Cisco tech event! Don’t miss out on your opportunity for free, in-depth technical sessions designed to help you drive improved business outcomes through digital transformation.

  • Customize your day with multiple technical session tracks
  • Network and learn in-person with local experts who are leading the industry in digital transformation
  • No other event offers the same best-in-class education, training and networking focused on the challenges and issues that matter most to you!

Technical Sessions

Enterprise Networks Track

  • Evolution of the Enterprise Network: The Cisco Digital Network Architecture
  • The Catalyst 9000 Switch Family - An Architectural View
  • SD-WAN and Branch of the Future
  • Meraki Full Stack: Simplicity Driving Simple IT

Security Track

  • NGFW Protecting the Edge Including Firepower 2100
  • Ransomware Defense with Cisco Advanced Threat Solutions
  • Umbrella (OpenDNS) / CloudLock
  • Talos Insights

Data Center Track

  • DevOps for Infrastructure Teams - Containerize IT
  • Digital Transformation Starts with Cisco ASAP Data Center
  • Deep Dive on Cisco Security in ACI
  • Next Generation UCS: Cloud Powered Intelligence

Collaboration Track

  • Cisco Collaboration Updates: CSR 12, Video Endpoints and Jabber
  • Spark Board - Hybrid Services - Integrating Cloud with On Premise Systems
  • Powerful Collaboration the Easy Way with Spark: Real world Application
  • Integrations
  • Connected Digital Experience for Customer Care

Layers of Security

IT Security today is like an onion with concentric layers of protection, where each layer must be compromised to get to the center. The military calls this "deep defense", as multiple defensive layers work together to deflect or slow down an attack.

Next generation firewalls remain your first line of defense with monitoring, content filtering, intrusion prevention, and 2 factor VPN access. Active Directory and Group Policy enforce consistent rights management that enables employees to work with the data they need, but protects the data they don't need. Modern cloud and client/server apps encrypt data in transit. Antivirus software and operating system patches protect both servers and end-user devices. Organizational policies, procedures and backups protect against and respond to threats.

We recommend:

  1. Design and periodically review IT security strategy with certified specialists.

  2. Cisco Meraki or ASA 5506X Next Gen Firewall, with annual subscription for content filtering and intrusion prevention.

  3. Dashboard managed end-point protection software on company-owned PCs, tablets and smart phones.

  4. LeeShanok's Managed IT or Hosted plans, where we design role-based access to your network and data, and enforce it through Active Directory and Group Policy.

  5. SSL VPN two-factor authenticated remote access to network.

  6. Modern supported operating systems patched with the latest security updates.

  7. VoIP and Video over IP communications need to be encrypted and secured too.

  8. Local and cloud backup of servers and data repositories that can spin up quickly following disaster.

  9. Physically locking server rooms, and automatic screen locking of PCs and phones.

Layered IT Security is not a "set and forget" exercise. Contact us for a complimentary review of your situation and professionally designed security that will protect your most valuable assets: your ability to research, compute, communicate and contribute to your company's supply and value chains.

On June 27 the US Government became aware of new ransomware called Petya.

Similar to WannaCry, it didn't require any user involvement, but infected through operating system vulnerabilities. It's demand for ransom in exchange for decryption key was a hoax, as encryption of Master Boot Records cannot be undone. Infected drives became unreadable and computers became un-bootable and any ransom paid was lost.

Recommended prevention steps:
  1. Protect end-point Windows devices with antivirus/antimalware software from respected providers (we recommend Trend Micro). Make sure subscriptions haven't expired. Central purchasing and administration allows for consistent protection and alert handling.
  2. Apply operating system and device patches (especially MS17-010) and updates to both Servers and end-user computers. It's true that updates occasionally cause problems. But vulnerabilities in unpatched systems increase over time.
  3. Apply updates to web browsers, Adobe Reader and Flash, Java, and other software regularly.
  4. Back up servers and file shares regularly, and periodically validate whether backups were effective. The date, time, and status should be reviewed for success. Try to extract several folders and files from backup sets. Ideally, disaster recovery and business continuity solutions are in place that synchronize continuously and can spin-up a server identical to the moment it failed. LeeShanok offers BDR and BC solutions that are effective and affordable.
  5. Make sure end users store data files on Shared Drives so they are included in backups.
  6. Protect end-user computers with active firewall software.
  7. Periodically review your network firewall. Businesses need a modern commercial grade device. Those with business centers or wifi for guests need filtering of malicious and illegal content, and traffic shaping. We recommend Cisco Meraki and Cisco ASA with FirePower. Make sure firmware updates are current.
  8. Host a security policy meeting for employees and satellite offices. Partner with LeeShanok's team as you prepare. To help you, we offer a 45 minute presentation called "IT Security for the Common Worker", also available via webinar.
  9. Many of these checklist items are managed by LeeShanok as part of our Managed IT and Hosted service plans.

Feel free to contact us to discuss your situation.

We all love social media, but in the era of Facebook, Twitter, Tumbler, LinkedIn, and Instagram, do you really know what information you have floating around on the Internet? Attackers in today's digital age are incredibly clever. Just because you consider something innocuous information, doesn't mean a hacker can't leverage it to their benefit.

As you saw in the video, something as simple as where you went to college can give an attacker an air of credibility. Don't think you'd fall for that? Let's look at another example. Have you publicly posted the names of your kids? What about where they go to school? Both of these are common tidbits of information that can be found on social media. Now what if somebody called saying they're from your child's school, and they're refreshing their records. Would you give them your cell number? Email? Home address? What if they told you one of your kids had an accident and you needed to come pick them up; could they get you to leave your office unattended?

Now, anecdotes like these are not meant to leave you cowering in fear. However, it's important to note that even information that may seem unimportant to you can be a treasure trove to an attacker


Don't overshare on social media! The less the world knows, the less can be used against you.

Look at email addresses closely to make sure they are from who you think they're from. Just because it has privileged information in it does not automatically make it authentic.

Call back. If someone wants information over the phone, or has called and asked you to do something, call them back. Just because they sound official doesn't mean they are! Use a number you already have for the school/ company/ partner you are talking to. Then you know you're dialing the real thing.

Change login information often! Social media is a prime target for hackers. Change your passwords on a regular basis, and make sure to use something complex.

We will be presenting all these 2ps and a plethora more in our upcoming "Security Lunch & Learn" so stay tuned for more information on that event coming up in March!