954-866-1600    Get SUPPORT

Evolution Networks Blog

Evolution Networks has been serving the South Florida area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

TOP 4 HOA Cyber Liabilities and 7 Steps to Reduce your HOAs Cyber Attack Risk


The battle against cyber assault is ongoing. The technological capabilities of cybercriminals are growing at an accelerated pace. The scenario of almost unlimited threat capabilities, coupled with exploitable vulnerabilities, makes cyber insurance essential for community associations.”

Top 4 HOA Cyber Liabilities

  • A community association that stores “personally identifiable information” (PII; e.g., owner addresses, social security numbers, credit card or banking information).
  • Disruption of normal operations during a cyber attack.
  • Downtime and recovery resulting from a cyber attack, malware, or ransomware.
  • Board members using their personal contact systems to send email & maintain email lists.

Top 4 HOA Cyber Liabilities

  • Develop a response plan.
  • Obtain security software that is end-point and has constant malware definition updates.
  • Limit access to sensitive information.
  • Protect personal identifiable information.
  • Learn about social media privacy risks.
  • Use strong complex passwords.
  • Have at least 3 different sources of data recovery points

If you believe because you are a small management firm or community association you’ll fly under the radar, you are sadly mistaken. Cybercriminals particularly enjoy going after small entities because the small management firms & community associations are ripe for the picking. The cybercriminal’s risk of being caught is very small. 

Cyber Crime Is Not Going Away

When choosing a way to manage this ongoing problem, you should look to outsource your IT services to  a Managed Services provider or IT Solutions provider who has the resources and technology in place to protect your community association and your homeowners.

If you feel that your HOA could use a little more attention when it comes to Cyber Security, we're here to help.  Let's schedule some time to discuss.  Evolution Networks

Continue reading

Got hacked recently? You will probably get hacked again within the next year.


Businesses might feel that if they're targeted by cyber criminals once, it won't happen again - but analysis of incidents shows that more often than not, attackers come back looking for more.

Businesses that suffer a successful cyberattack are extremely likely to be targeted by cyber criminals again – even if they've taken all the correct steps in the aftermath of the initial attack.

The Crowdstrike Services Cyber Front Lines report uses analysis of real-world cases where the cybersecurity company has been brought in to help combat cyberattacks and it reveals that in over two-thirds of of cases where there were outside intrusions onto the network, cyber criminals will attempt to break into the same network within one year.

According to Crowdstrike, 68% of companies encountered another "sophisticated intrusion attempt" within 12 months – although in each of these cases, the second attack was prevented from compromising or otherwise gaining access to the network.

While organizations might feel that if they're hit by a cyberattack once – whether that's malwareransomwarebusiness email compromisephishing or something else – then they won't be targeted again, if anything it's the opposite that's true.

Cyber criminals come back probably because they are hoping that an organisation has not learned the lessons of the first attack and has perhaps even left the same vulnerabilities in place that allowed the initial cyber attackers to breach the network.

"It is tempting to think of intrusions as a lightning strike – a blinding flash that is unlikely to strike the same place twice. Unfortunately, intrusion attempts are rarely a one-time event," said the report.

"Organizations that do not take the opportunity to apply lessons learned and to better prepare for their next encounter with an adversary may well suffer attacks that result in additional data loss, ransom demands, extortion or other monetary losses requiring costly legal fees, response services and perhaps even future business interruption," the paper added.

It's recommended that in the aftermath of a breach – once the network is secured with timely security updates, stronger passwords and multi-factor authentication – that organisations take the opportunity to learn from the incident and remain vigilant about what they can do to prevent future attacks and even plan how they'd react to another incident.

One way of doing this is to regularly perform penetration testing to find out where the vulnerabilities are on the network and if defenders can detect the intrusions, particularly when it comes to new kinds of attack or vulnerability.

"Holistic coordination and continued vigilance are key in detecting and stopping sophisticated intrusions," said Shawn Henry, chief security officer and president of CrowdStrike Services.

"Because of this, we're seeing a necessary shift from one-off emergency engagements to continuous monitoring and response. This will better enable incident response teams to help customers drastically reduce the average time to detect, investigate and remediate," he added.

Source: ZDNET

Evolution Networks can help you secure your business and keep your data safe.  Get in touch with us today to see how. 

Continue reading

6 Tips to stay safe from Scammers during the Holidays


The National Cyber Security Centre (NCSC) is urging people to be careful when shopping online in the run up to Christmas as cyber criminals step up campaigns to steal money, credit card information and more during the busiest time of year for retailers.

Last year's Christmas shopping period, from November 2019 to January 2020, saw cyber criminals make off with a total of $13.5 million as a result of online shopping fraud – averaging out at $775 per incident across 17,405 cases reported by the National Fraud Intelligence Bureau.

And with even more people expected to be doing their Christmas shopping online this year because of ongoing coronavirus restrictions, the NCSC, alongside the Home Office, the Cabinet Office and the Department for Digital, Culture, Media and Sport (DCMS), has launched a 'Cyber Aware' campaign.

The campaign lists six things to help protect shoppers against phishing emails, malware and other malicious cyber activity – and provides information on how to set up these additional protections: 

  1. Use a strong and separate password for your email
  2. Create strong passwords using three random words
  3. Save your passwords in your browser
  4. Turn on two-factor authentication (2FA)
  5. Update your devices and apps
  6. Back up your data

By following this advice, people can not only better protect themselves from falling victim to cyberattacks, additional security on their devices can also provide better protection against cyber criminals attempting to exploit the phones and laptops people use while working from home to gain access to a corporate network.

Organisations can also play a role in helping their employees stay safe online by providing services including two-factor authentication and cloud-based backups.

"Technology will play an essential role over the festive period, with more people shopping online than ever before. Scammers stole millions from internet shoppers last Christmas – but by following our advice, you can protect yourself from the majority of their crimes," said Lindy Cameron, chief executive of the NCSC.

The Cyber Aware campaign is being supported by organisations including Microsoft, Vodafone, BT, ASOS, Barclays and Citizens Advice.

"If you are shopping online this year, spend the time you would have spent wrapping up warm to head out to the shops on checking your online security. If it feels suspicious or unusual it may well be," said Sian John, chief security adviser at Microsoft UK.

Credit & Source: By Danny Palmer | December 4, 2020 -- 10:46 GMT (02:46 PST) | Topic: Security ZDNET

Keep your Business and Networks safe from #cyberattackers.  Get in touch with us at Evolution Networks today for a no cost, network vulnerability assessment. 

Continue reading

Cybercrime’s Evolution and the Potential Blockchain Shield

Cybercrime’s Evolution and the Potential Blockchain Shield

Cybercrime has morphed over the past decade or so. With unbreakable encryption making breaking directly into a network all but impossible, phishing, Distributed Denial of Service (DDoS) attacks, and other methods of indirect hacking have become en vogue. As a result, software companies are looking in some strange places to find building blocks for intrusion mitigation. One interesting emerging technology being used for this purpose is blockchain.

Continue reading