Get Unparalleled Managed IT Support when you Partner with BCS Voice & Data Solutions in Virginia Beach. Read our Latest IT Support Related Blog Posts

Passkeys could improve the way you work


Back in May, we heard there would soon be a successor to the password – the Passkey.

Now, we’re hearing that Apple will start rolling out Passkeys in the next few months in iOS 16. And we’re excited.

Though it’s caused a bit of confusion. Apple is going to great lengths to market the Passkey, and understandably, people have assumed that it’s a feature exclusive to Apple.

That’s not the case.

In fact, Passkeys will be used in a joint effort to boost online security by Apple, Microsoft and Google. The reason Apple is promoting this new feature so hard is to get the message out there.

Microsoft and Google are also keen to spread the word so that people understand how Passkeys work.

The more people take advantage of Passkeys, the safer our businesses are online.

Passkeys – otherwise known as FIDO authentication – work by letting you log into an app or website with just your username and your pre-authenticated device, most probably your phone.

Your device generates a cryptographic token, which makes the second part of a cryptographic key pair. When the pair matches, you’re allowed access to the app or website.

What that means in practice is when you’re logging in, you just use your phone to prove its really you. You’ll just unlock it using your face, fingerprint or PIN.

So long as your phone is within Bluetooth range of your computer it will work.

And without needing a password… bliss…

It’s a far more secure way to access apps and keep your accounts safe from cyber criminals. You never see your cryptographic token, so it takes away a lot of the danger of having your login credentials stolen.

Cyber criminals will be unable to use their normal tactics – such phishing emails, brute force attacks, or key loggers – to steal your credentials.

They’ll need your physical device, making remote hacking much less likely.

If you use Windows Hello, you’ll see that Passkeys are already supported. And it won’t be long until all three tech giants roll out support across their entire product range.

Before then, if you’d like any help or advice on keeping your apps and accounts safer, just give us a call.

See if your email has been stolen

Find out if your business is being targeted by hackers.

Using this tool you can see if your e-mail or phone number has been compromised.

Make sure to enter your mobile number in international format, such as 14841234567.

This is powered by Have I Been Pwned.

If your data has been compromised, it’s possible cyber criminals have used it to attempt to access your systems.

Please contact a cyber security specialist immediately. We can help.

Read this to avoid phishing scams

Phishing scams are one of the biggest security threats to your business right now.

A massive 83% of organisations said they suffered successful attacks last year. And with just under a third of phishing emails being opened, the chances that someone in your business will be fooled are high.

But to make matters more difficult, cyber criminals have borrowed a technique from ransomware groups that is designed to panic people into taking action and giving away their login details.

This new kind of phishing attack begins like most others.

You get an email alerting you to potentially suspicious activity on your account. It might say someone is trying to login from a different location or device and the attempt has been blocked.

You’re then asked to click a link to verify your email address and password.

That’s worrying enough, right?

But what makes this phishing attack even more dangerous, is the countdown timer that appears on screen.

Typically, it’s set at one hour, and you’re asked to confirm your details before the countdown ends, otherwise your account will be deleted.

Yes, deleted! That catches a lot of people’s attention.

This is a powerful manipulation tactic designed to scare people into taking immediate action – and think later.

In reality, if that countdown hits zero nothing will happen. But watching the seconds count down can give you a sense of urgency that makes you forget to check whether an email is the real deal or not.

The page you’re entering your details on is fake. Criminals will steal your details and login to your real account. That’s a major problem you don’t ever want your business to face.

You’ll be at risk of data theft, financial loss, or malware, as well as potentially putting other accounts at risk (if you’ve reused your password).

Your login details may even be sold on the dark web, giving other cyber criminals the opportunity to break into your account.

Here are some basic phishing protections for you and your team.

Look at the email address the email was sent from. Make sure the spelling and grammar are both correct, and hover over links to see what website address they are trying to send you to.

If you think you’ve fallen for this kind of scam, it’s important you change your login details immediately. Don’t click a link in an email – type in the website address in your browser.

We’d also recommend using a password manager. This is software that creates long and strong random passwords that are impossible to guess for every account you have.

It will store these passwords for you. And autofill login boxes to save you time (yes, password managers detect when they’re being asked to fill in details on a different page, such as a fake phishing page).

Share this article with your whole team right now. And if anyone ever clicks a link they’re not sure about, ask us how to keep your business safe.

Ways to reduce security threats for remote employees


Remote and hybrid working is now normal for a lot of people.

But a recent survey has found that, despite it being more than two years since many of us were forced to work from home, too many businesses still don’t have the right cyber security measures in place for those away from the office.

The survey was originally intended to learn about spending plans from now into next year. However, the results highlighted just how few businesses have the right cyber security protections.

And it’s a worry.

Since the beginning of the pandemic, cyber security incidents – like malware, ransomware, and data breaches – have risen sharply. Cyber criminals began by taking advantage of the panic, and have since developed increasingly sophisticated tactics.

It’s costing businesses around the world billions, plus causing excessive downtime.

While the survey did show that around two thirds of businesses have good web security measures in place, like malware filters, some of the results were more disappointing.

Just 50% of companies have cloud-based cyber security systems in place right now (another 15% are exploring their options).

Cloud security gives businesses multiple layers of protection across their network and infrastructure that helps to keep data better protected against breaches or attacks.

Not only is it a good defense, but it also identifies threats before they become an issue.

The survey also highlighted that 10% of businesses plan to implement access management, which ensures only the right people can access the right systems.

A further 9% intend to prioritize VPNs (Virtual Private Networks) to allow secure network access for remote workers.

They’re also looking at zero-trust solutions where your network assumes every device or connection is a threat, until proven otherwise.

Of course, our advice is that you should already have these security solutions in place – especially if you have remote or hybrid workers.

If not, this is something to act on quickly. All you need to do is pick up the phone or send us an email. We can help.

Published with permission from Your Tech Updates.

How the chip shortage affects your business


For the past couple of years, the tech world has been struggling with a huge shortage of chips.

But it’s not just tech businesses that are feeling the impact.

So many of the things we use every day contain a chip. Laptops and desktops, sure. But also household appliances, even our cars. It’s hard to find an electric device without a chip.

This shortage has the potential to disrupt our modern lives.

Did you know, it’s been ongoing since 2020 (ah, that year really was a gift, wasn’t it)?

It started during the pandemic as production fell while demand went up.

Other events since have made it worse, including extreme weather, the Ukraine war and a factory fire.

We’re told that increasing chip production isn’t easy. It can take years to build a new factory because of the unique production demands.

Of course, all of this is someone else’s problem. Let’s make it real to you – what does this actually mean for your business?

Essentially it means you need to plan ahead more.

Some of the technology you need to run your business may be in short supply.

As an example, getting large numbers of the same laptop might be difficult, compared to getting just 2 or 3.

And some of the essential devices you rarely think about as they’re in the background, such as network switches, are currently much harder to get.

As you push your business towards increased growth it means planning ahead more than ever before.

Industry experts expect the shortage to last into next year… and it could be even longer.

Would you like to run your growth plans by us, so we can advise what might need to be ordered, when? Get in touch.

Keeping Your Wireless Network Secure

Wireless networking means the improved access and availability of data, leading to an overall increase in your team’s productivity. Unfortunately, it doesn’t come without cost. When a wireless network is installed, there are added security risks that come along with it. It’s important to understand and take the appropriate steps to safeguard your data and infrastructure. As your network-integration partner, BCS takes security seriously, guiding you in keeping your wireless network secure. Here are a few wireless networking security basics to start with:

Change default settings.
With a new wireless network, we recommend creating unique usernames and passwords, just as in your personal life. Change the default router network name and password promptly. Often, the default router name contains information about the type of router you have, which hackers use to access network passwords. To further protect your data, make it a habit to update passwords regularly. 

Limit access to authorized users. Keep your wireless network safe by only allowing employees or other approved individuals access. Give visitors and the public a guest wireless network to prevent them from infecting your network with a virus. Consider limiting your wireless signal strength as well, setting it to cover only the areas that need access to your network.

Utilize wireless encryption. Wireless encryption secures your data by requiring users to authenticate themselves when connecting to your network. Multiple encryption protocols are available, so be sure to choose one that works with your router and provides the level of protection you need.

Don’t overlook physical security. Keeping the hardware and equipment of your system safe is just as important as protecting your wireless data. Place all network equipment, including routers, access points, adapters and range extenders out of sight and secured from the public and visitors. For extra security, lock equipment in a cabinet or consider video surveillance options.

As a full service wireless networking provider, BCS provides uncompromised security of your data and infrastructure. Call us at (800) 365-8067 to learn how we can assist you with your wireless networking needs. 

Common Cybersecurity Myths Busted

It’s easy to say “it won’t happen to us,” but cybersecurity is something that every business, large or small, needs to take seriously. It’s easy to underestimate cyber dangers if you believe certain myths that surround them. So, let’s take a look at some cybersecurity lore and why it isn’t always correct. 

Myth: We’re too small; no one will hack us. 

Small does not mean safe. No matter what it’s size, your company is a target for hackers. In fact, many hackers will purposely search for small businesses, correctly betting that they don’t have a secure network in place. Unfortunately, small does mean your company is hurt more significantly. As reported in Forbes, the average cost of an attack is more than $200,000!  That puts 60 percent of small companies out of business within six months of a cyberattack.

Myth: Anti-virus software and a firewall is enough security.

Cybercriminals are increasingly sophisticated. That makes it important to have multi-layered security protecting your data. In addition to the traditional end-point security of firewalls and anti-virus software, consider other measures like two-factor authentication, data monitoring and encryption software. While there is no perfect cybersecurity solution, make it your goal to have systems in place that allow for a quick reaction and comprehensive damage control.

Myth: You know right away if your computer is infected.

Gone are the days when slow loading times and non-stop pop-up ads were the obvious indicators of a virus. Today’s malware is stealthy and  hard to detect as hackers control webcams, access sensitive information or use an infected computer to attack other targets.

Myth: Cybersecurity is a technology issue only.

While your IT department or contractor plays a large role in keeping your data safe, employee education is critical when it comes to cybersecurity. Employees, rather than technology, are the most common entry point for hackers. Make sure internal cybersecurity training occurs at least once a year and covers topics such as phishing scams, password best practices and the ins and outs of wireless networks. 

 BCS Voice & Data Solutions works with its customers to provide guidance and support for implementing the most up-to-date cybersecurity practices. Call us today at (757) 497-3100 to discuss how we can assist you in creating a cybersecurity plan that is right for you. 

Build Better Client Relationships With Tech

February is the month of love! If you’re looking for ways to improve the relationship between your business and clients, take the seasonal opportunity to do so! Show clients and partners that you appreciate them with new technologies that improve their experience with your company.

Wondering how BCS can help? Here are some easily integratable tools that quickly show your clients how much you care:

1. Free WiFi

The need for visitors to connect is unavoidable. Granting unlimited access to everyone can introduce security issues, so many companies don’t offer up their private connection.

Unfortunately, that creates a negative experience for the visitor. That’s why you should consider establishing a convenient guest WiFi, instead. A dedicated guest network lets visitors quickly connect with a simple password and no red tape. It’s a thoughtful and appreciated convenience that all clients and guests will enjoy, and it protects your business systems.

2. Professional Conference Calling

Do you have regular in-person meetings with  customers? Whether they come to you or you go to them, someone adds minutes and sometimes hours onto their workday just getting to the meeting. One easy way to streamline communication with clients and improve your overall relationship is to integrate video conferencing. Professional video conferencing, like our StarLeaf technology, allows you and your client to get that face-to-face contact without the burden of travel, something your everyone will thank you for.

3. Eliminate Wait Times

Being able to talk with a real person when you need help is an important demand for clients and customers across all industries. If your phone system is too complicated or employees can’t connect quickly, communication falls apart. Show your clients that you understand their needs. Upgrading to a seamless and easy to use business phone system with BCS.

BCS Voice and Data is here to make you and your clients happier! Call us at (800) 365-8067 to learn how we can eliminate the barriers to building great relationships and set your business apart.

Achieve Active Growth with BCS Voice and Data

What are your business goals for 2020? If you’re like most companies, they likely involve expansion. Whether growth for your company means a larger physical space, more employees or increased sales flowing into your processes one thing is for sure–you need backend systems ready to handle more volume in place before you start scaling. 

That’s where BCS Voice and Data comes in. We are an amazing partner for growing companies. Not only because we know what’s needed to allow for easy growth, we know scalability too, so you don’t outgrow a new solution quickly. If you’re on the path to bigger and better this year, here are some ways BCS Voice and Data can help: 

Virtualization: 

For any business seeking growth in 2020, new tech will keep you competitive, especially when it comes to Virtualization. Our virtualization services allow you to keep up with adding more employees and contractors as you scale, by increasing the speed of your data sharing and allowing everyone to have the access they need, when they need it. All while keeping costs manageable and data safe.  

Improved Communication Systems: 

One thing is for sure in this day and age–customer service is key. Don’t expect to grow if you can’t communicate well with your customers, clients or partners. If you plan to increase communication with clients or remote employees, ask about our telephone and video conferencing system options. Our options are easy to use with no interruptions and best of all, your entire team can be easily reached. Customers have high expectations for good, consistent and reliable communication, no matter what industry.

Structured Cabling: 

Structured Cabling is an underrated but extremely important consideration in any physical space. If your network suffers from aging infrastructure or lacks organization, it will show as you grow. Position your company for growth by having our engineers and systems specialists create an organized framework that is easy to configure as your business expands, meaning you’ll be able to adapt quickly, without ongoing additional investments.

BCS Voice and Data not only makes the growth of your company easier, we create the systems that encourage expansion. Call us at (800) 365-8067 to learn how we can help you achieve your business goals this year.

Your Next Decade of Conference Calling

Don’t you sometimes wish that conference calls were… easy? We get it! With most providers, telephone conferencing is a horrible experience. Lines are dropped, important people can’t dial in and there’s static or an echo coming through that no one knows how to stop. We’ve all been there.

That’s exactly what the experts at BCS know how to fix.

With our technology and experience, conference calls may just become the easiest part of the day. Make this the year to finally create a clear, crisp and easy-to-use environment for clients, prospects and employees.

The BCS Voice and Data team creates individualized solutions for our clients, especially when it comes to phone and video conferencing. For some companies, the solution is as simple as replacing an aging phone system with a cloud-based phone system and newer, more robust hardware. Other clients, particularly those with high call volumes or a variety of geographic locations to connect with, benefit from a fully remodeled and re-outfitted conference room. Still other clients are in need of high-quality video-conferencing solutions. The type that beat consumer-grade video calling technology in terms of ease, image clarity, call quality and integration with the cloud. Then again, some clients need all of the above!

Whatever your needs, we know that selecting the right business telephone and conferencing systems is a daunting task. We’ve helped thousands of clients and find consistent questions and functions that need to be addressed with all, no matter what size the business. Take a look at our guide to choosing the right system for your business for guidance.

Want to make conference calls less stressful and more collaborative for you and your business this year? BCS can help you find the perfect solution and dominate your business’ technology in 2020. Give us a call today at (757) 497-3100 or contact us online.