Christopher JonesFounder & CEOChris is a demonstrated IT leader with well over a decade of experience in consulting, system design/administration, network security, and end user support. He founded Promethean IT in 2007, after serving with the U.S. Army. At Promethean, Chris has solved major small business IT challenges, including: leading the design and migration of services and servers during a huge office move for a public relations agency, helping a manufacturing firm transition to a cloud solution and cut costs by more than $150,000, and designing the IT services and infrastructure for a venture capital firm. Chris was a distinguished honor graduate at the U.S. Army Information Science School, holds a degree in philosophy from The New School, and also is an active Certified Information Systems Security Professional (CISSP). He is currently enrolled as a scholar in the Goldman Sachs 10K Small Businesses program and also knows where to find the best pizza in NYC (Giuseppina’s).
Dominic CataliotiDirector of EngineeringDominic has spent more than 15 years solving IT problems for the federal government, military, Fortune 500 companies, and small businesses. Dominic has extensive experience with virtualization and cloud technologies, including VMware, Citrix, Amazon Web Services, and Microsoft. He’s provided third-tier support for organizations with more than 25,000 users. Dominic has a long history of integrating technologies and adapting infrastructure to meet the demands of an ever-changing marketplace. Dominic is certified in Microsoft, Cisco, AWS, and Citrix. When he’s not working, Dominic is an avid traveler and photographer.
The Bubble Foundation
CRM Financial Management
Donadio & Olson
First Capital REIT
Hot Snakes Media
Lily Sarah Grace Fund
The Nation Institute
NeeD Financial Services
New York Production Alliance
O Positive Films
Washington Square Films
Site by Osk Studio
.@Google speeds up the internet's primary data transmission protocol by up to 14% ⇨ bit.ly/2wl1r49 https://t.co/dhOLljwvDL
.@Gartner_inc 's new cybersecurity framework CARTA stands for continuous adaptive risk & trust assessment ⇨… twitter.com/i/web/status/9…
.@Gartner_inc uses a new term CARTA, that stands for continuous adaptive risk & trust assessment ⇨… twitter.com/i/web/status/9…
.@VMware joins @Google to enable enterprise management of all chrome devices through one portal ⇨… twitter.com/i/web/status/9…
Identity thieves hack into cell phone accounts for virtual currency known as @bitcoin ⇨ nyti.ms/2wyD2I2 https://t.co/ntWpLFVB11
Evolving Cyber Threats and Securing Your BusinessWhile the aftermath of the WannaCry ransomware epidemic was sobering, it's not nearly as frightening as Petya. The world was introduced to one of the scariest information security threats to date on June 27, 2017, and within hours, analysts were aware of the virus that primarily targeted Ukraine was "something worse than ransomware." While organizations throughout Europe and worldwide were affected, the attack toppled a utility supplier, central bank and the airport in Ukraine.As a wiper virus, Petya was designed to serve some serious, lasting damage by permanently eliminating its victims' access to their critical systems and files. One affected U.S. organization, TNT Express/FedEx recently released a statement admitting a reasonable possibility that they would never restore access to affected systems or critical data targeted in the Petya attack.
Why Cybersecurity Matters More Post-PetyaThere's no question that ransomware attacks are among the greatest cybersecurity risks facing modern organizations. The U.S. FBI does not officially support paying ransoms in exchange for the release of encrypted data during a ransomware attack, but it has released commentary stating it "recognizes executives... will evaluate all options."While Petya malware masqueraded as a ransomware virus, it's classified as a wiper because its victims' data was not released. Microsoft's Matt Suiche has classified the attack as "fakesomeware," stating he believes it's designed to overwrite its victims' hard drives.
Security Incidents Are a Real and Costly Business RiskIn today's threat vector, a single click on a phishing email or unpatched vulnerability on a commodity server in a data center can leave an entire organization vulnerable to threats like Petya. With an ever-increasing number of endpoints on the average company network, cybersecurity risk management matters more than ever.With the average cost of a security incident now costing U.S. organizations over $4 million for cleanup, many firms cannot afford the compliance fines or loss of customer trust associated with a security breach. In an era where simply paying a costly ransom of hundreds of dollars in bitcoins may not guarantee the release of critical data, organizations need a plan to move forward with confidence.
Protecting Business Against Nefarious Security ThreatsWhile Petya is currently holding attention in the headlines as the scariest threat of the moment, today's entrepreneurs and leaders need to be aware that it's anyone's guess what new risks tomorrow could bring. Among information security leaders, 76 percent believe that risks are evolving too quickly for them to keep up. The same study revealed that some 85 percent of organizations report they are having trouble hiring the cybersecurity talent they need to protect against hackers.While technology-based methods of threat detection can offer some protection, they're certainly not foolproof. A new strain of malware is developed every 4.2 seconds in 2017. Many pattern-based types of threat detection, also known as signature-based threat detection, rely on historical threat data to identify attempted data breaches. While these are effective in the fight against well-established malware strains, they're not sufficient protection against newer strains.Fortunately, technology is getting smarter even as hackers work increasingly hard to develop new threats that fly under the radar. Organizations like Darktrace are integrating advanced artificial intelligence and machine learning tactics to provide smaller businesses with the software needed to identify new zero-day threats and previously unidentified malware strains.Defending against malware requires absolute attention to keeping all of a network's patches up to date and maintaining a complete inventory of IT assets. All too often, organizations fall vulnerable due to an incomplete knowledge of their endpoints and vulnerabilities in a printer, server or infrequently-used laptop. Off-site data backups may also lend protection against a nefarious wiper virus like Petya.
Comprehensive Security Risk Management MattersIn general, a comprehensive approach to information security risk management is likely the best method of protection in a quickly-evolving security threat vector. By drawing from the expertise of in-house and external cybersecurity experts to develop a layered security approach, firms can reign in the risk from cyber threats.In the age of ransomware and wiper viruses, an organization may need the support of expert cybersecurity consultants to stay protected. Learn about the Promethean IT difference and the benefits of agile, smart IT consulting in NYC.
We'll always help you find a better way!
.@LGUS has been hit with a ransomware attack that uses a specific coding that could signal another WannaCry attack… twitter.com/i/web/status/8…
Several HBO accounts were hacked late last night by a group called OurMine, but the breach did not last long ⇨… twitter.com/i/web/status/8…
Hacker creates organization to unmask child predators, & recruits other hackers to join him ⇨… twitter.com/i/web/status/8…
.@kevinmcgibben was listed on @CRN 's top 100 executives for the company @LogicMonitor for his strong leadership ⇨… twitter.com/i/web/status/8…
The best Anti-Virus protection may not be enough to secure your important data ⇨ bbc.in/2vXq32R https://t.co/JQkVCWgw8a
Three current and one former employee of @primefocustech were arrested for the @GameOfThrones leak ⇨… twitter.com/i/web/status/8…
.@ChromiumDev undergoes phishing attacks since mid-June, this week phishers obtained two more popular extensions ⇨… twitter.com/i/web/status/8…
Three solid ways to simplify your communication using @NetFortris x @fonalityau ⇨ bit.ly/2hYZN2h https://t.co/07ipHtbDX3
.@SlackHQ has enabled integration with multiple EMM platforms to offer security and policy management features ⇨… twitter.com/i/web/status/8…
Our partner @Egnyte was listed in @ZDNet 's top 3 cloud services that will help secure your business ⇨… twitter.com/i/web/status/8…
Hackers release personal data from the HBO show The Game Of Thrones and in return demand ransom ⇨… twitter.com/i/web/status/8…
Marcus Hutchins was arrested at the @defcon event for allegedly creating the Kronos Banking Malware ➩ bit.ly/2v2SnxM
Windows 10, Office 365 ProPlus & System Center Configuration Manager make twice-a-year release in this upcoming Sep… twitter.com/i/web/status/8…
Our partener, Darktrace has been named @WSJ 's Top 25 Companies To Watch list! ➩ bit.ly/2tfaAGX https://t.co/XQyZhv9Puy
.@PCMag gives Egnyte Cloud File Server top marks for their storage platform #proudpartner bit.ly/2kO05cR
Our partner for behavior-based threat intelligence and cybersecurity @Darktrace was featured in IT World:… twitter.com/i/web/status/8…
Android Nougat is coming soon! Well...it depends on your device. See the link for more on the Version 7.0 release: bit.ly/2gj0Wxp
We'll help you find a better way!
Our favorite client email reply of the year, "Old switches get stitches & end up in ditches." #itsupport #networking #managedservices
Thanks to the IEEE, Cat 5e & Cat 6 received an upgrade. bit.ly/2dGTNbz Capable of 2.5 and 5 Gbps respectively...no rewiring req'd.
Blackberry has given up on making its own devices. Former phone producer turns its eye exclusively to software. slate.me/2dadLsm
If you're a business using Dropbox (bbc.in/2c4MxVF) it's time to consider other options. Contact us for a free consultation. #EFSS
Linux turns 25 today! To the open source platform that launched Redhat and Ubuntu (among others), we give thanks. bit.ly/2bQjjaI