Network Support Programs

NETWORK SUPPORT PROGRAMS

Does your business need help with IT? Consider RemoteNet:

  • Knowledgeable, friendly helpdesk
  • Super fast response times
  • The best engineers
  • Affordable rates for small businesses
  • Proactive monitoring and maintenance

Learn More »

Cloud Computing

CLOUD COMPUTING

Ready to move your business to the cloud? Tired of dealing with crashing servers, constant maintenance, power outages, backups, viruses, etc? Direct iT is your one stop cloud provider:

  • Hosted mail solutions including Office 365™ and Google Apps™
  • Virtualize your servers and desktops into the cloud
  • Cloud-based backup
  • Cloud-based disaster recovery     Learn More »
Social Media Websites

SOCIAL MEDIA WEBSITES

Ready to jumpstart your marketing into the social media age?  Our blog-based websites will let you connect with current and potential customers like never before!

  • Blog-based site lets you easily post relevant news and articles
  • Connect with Facebook, Twitter, and LinkedIn
  • Professional-looking templates get you up and running very quickly

Learn More »

My Efact: Paperless Office

MY EFACT PAPERLESS OFFICE

Ready to go paperless?  My Efact: Paperless Office is our cloud-based paperless office document management and scanning system.  Features include:

  • Scan and access documents from anywhere
  • Secure encrypted email for regulatory compliance
  • Unlimited users and scanners
  • Full DVD backup of your files mailed to you every 3 months
  • Free telephone support and training      Learn More »
Hosted Email: Office 365

HOSTED EMAIL: OFFICE 365

Direct iT is an authorized reseller of Office 365™, Microsoft's new cloud-based email hosting system. Office 365™ brings you the features of Microsoft Exchange without the headaches of hosting your own.  Features include:

  • Share calendars with your co-workers
  • Outlook Web Access lets you access mail from anywhere
  • Outlook 2007™ and Outlook 2010™ support
  • 25GB mailbox - plenty of storage Watch a short video »

Direct IT Blog

  • What Direct iT Is Doing To Keep You Secure – Summer 2018 Update

    The hackers never stay still, and neither does the Direct iT security team. We’ve been hard at work working on new ways to improve security for our clients. Here are a few of our security initiatives this summer:

    • New Bluebox™ security features for our RemoteNet customers – we’ve been adding enhanced tools and services to better allow us to scan our customer networks for potential vulnerabilities, identify infected computers, and resolve security issues
    • Training our customers – we’ve been on the road visiting customers at their offices and at many different events and conferences, training them on the newest threats and ways to stay safe
    • Training our team — we’ve been ramping up our ongoing security training for all engineers; we also are going to be going to Las Vegas next week during the SecureWorld and Defcon security conferences, where we’ll be meeting with security experts and researchers on the cutting edge to stay on top of all the latest tools, techniques, and threats
    • New Direct iT Cloud Managed AV Features (powered by Symantec ) – we have been rolling out a number of new features designed to better detect behavior of zero-day exploits and ransomware
    • Improving our optional workstation update services
    • Improving security, encryption and monitoring for customer backups
    • Evaluating and testing new security products and services, including:
      • Sonicwall™ Capture Cloud, a system that uses artificial intelligence and the cloud to allow Sonicwall firewalls to detect and block brand-new exploits
      • Third Party Pentesting and Security Audit Services that allow third-parties to review our work and help identify vulnerabilities in our customers’ networks
      • SecureWorks™ MDR (Managed Detect and Respond), a combination intrusion detection and security event monitoring solution that also leverages a 24/7 security NOC that can respond in minutes when a security breach or severe risk is detected
      • Duo™ Security Two Factor Authentication(2FA) – a second step when you login that prevents hackers from being able to get in with just a stolen password
  • Another Major Shipping Company Hit By Ransomware

    Shanghai-based COSCO, the world’s fourth-largest shipping company, was hit by ransomware last week that resulted in their US website being taken down and their e-mail and other communication systems going offline. In order to avoid interruptions in normal shipping operations, COSCO instructed customers to contact them using temporary @yahoo.com email addresses during the shutdown. Leaked internal emails from COSCO show them informing employees to not open unknown emails or attachments.

     

    This incident reminds us of last summer, when Dutch shipping company A.P. Moller-Maersk was hit by a ransomware attack that left ships stuck in port and reportedly cost them upwards of $200 million in losses.  Maersk’s CEO reported that in order to resolve last year’s attack, his company had to reinstall over 4000 servers, 45,000 PCs, and 2500 applications over a 10 day period. It appears that COSCO’s losses were not as extreme – the attack’s impact was limited by their flexibility and ability to switch to temporary communication systems and the fact that the ransomware appears to have hit their US branch and not their primary Shanghai-based systems. However, it is a stark reminder that hackers are a serious risk at all sizes of companies, from small business to multi-billion-dollar multinationals.
    References:
    https://www.forbes.com/sites/leemathews/2018/07/26/another-shipping-giant-falls-victim-to-ransomware/#f9152a070d04
    https://www.bleepingcomputer.com/news/security/ransomware-infection-cripples-shipping-giant-coscos-american-network/

  • The Game Has Changed in CyberSecurity: The growing importance of managed workstation updates
    The Game Has Changed in CyberSecurity:
    The growing importance of managed workstation updates
    A global cyberattack last weekend used a Microsoft security hole to infect businesses and government agencies worldwide. Microsoft Windows Update is
    important but not enough….
    Workstation Updates – Now Available and Fully Managed from DIT
     Our fully managed program not only will update Microsoft, but over 50 other third party applications such as Adobe Reader, Adobe Flash, Java, Skype, Win Zip, web browsers update and more. This service is now available at a highly discounted rate of 15 minutes per desktop per month.
     For more details or to enroll in this program,
      Contact Direct iT

     

  • Direct iT at the DefCon 25 Security Conference
    Direct iT at the DefCon 25 Security Conference 

    Hackers and security researchers from all over the world descended on Caesar’s Palace in Las Vegas last weekend for the DefCon 25 security conference.  Direct iT’s security and compliance team was onsite to hear about the state of the art in network security, and hear from antivirus vendors, chip designers, penetration testers, as well as representatives from the FTC, the Department of Defense, the Navy, and many major security product companies.  There were a lot of hot topics under discussion about the role of security research in a world where hacking has been increasingly influential.
    A few of the hottest hacking topics included:
    • Microsoft’s WannaCry bug and related exploits –  Egyptian security researcher Saif El-Sherei demonstrated techniques for analyzing and reverse-engineering Microsoft patches to identify undisclosed security holes that those patches were addressing, and showed how he used this technique to also identify a new related undisclosed security hole.
    • Hardware-level security problems – a lot of new research was presented about the security implications of hardware bugs, including the SandSifter — a program for detecting and analyzing undocumented, hidden, or buggy instructions in x86 CPUs ( which was used to find bugs in Microsoft Azure virtual machines and in virtually all common CPUs).  This is a growing field within security research, based on the idea that no matter how secure our software is, that software has to run on hardware and if that hardware is not also secure we will still get hacked.   Other research was presented about how simple it is to produce counterfeit or backdoored hardware ( including relatively simple methods for implanting a hidden transmitter inside RSA 2-factor tokens, inside computer mice, and even for making counterfeit versions of special USB password-storing keys).
    • Cloud, SaaS, and hypervisor security –  there was a lot of focus on a new set of advanced tools for detecting and mitigating breaches that Microsoft is going to be giving free with Enterprise versions
    • Counterfeit and backdoored hardware hacks – there was a lot of discussion about how governments around the world place backdoors in computer and networking hardware, as well as how individuals also can exploit hardware.  One group of researchers presented a method for doing secure computation on insecure hardware.
    • IoT hacking – the takeaway from the IoT security part of the conference was not that hackers using advanced techniques could break into a few IoT devices — more that virtually all IoT devices are designed so insecurely that very standard, well-known security exploits are often all it takes to break into these devices.
    • Car hacking  – similar to the IoT findings, several groups presented research about car-related security hacks and also brought a few modern cars to the conference for hackers to analyze on-site.  What the research revealed was that car manufacturers are using out-of-date components to begin with and not doing any significant security hardening of car systems — for instance, modern Nissan and Infiniti cars were found to use a 10-year-old cellular chip that was used in the original iPhone, which has a number of well-known security exploits that can be used against the cars.  Similarly, radio researchers analyzed signals from Jeep wireless keys and found that anyone recording the radio signal from a Jeep key can easily clone that key.
    • Voting machine hacking – hackers at the conference took apart and analyzed several different types of common voting machine, quickly finding that many were based on Windows XP and were vulnerable to a number of common security exploits, including one that could be exploited over wireless.  In fact, it took less than an hour for them to break into one of the voting machines. 
  • Direct iT Meets White House Cybersecurity Coordinator

    DIT CEO David Javaheri with Rob Joyce

    Special Assistant to the President and White House Cybersecurity Coordinator Rob Joyce visited the Foley Hoag offices in Boston on 5/22/17. Joyce was in Massachusetts to speak about the President’s May 11 Executive Order on Cybersecurity and how IT and security companies can collaborate.

    Federal Government Focusing on Cybersecurity

    The meeting focused on a number of new initiatives including:
    1. CyberMA: Part of CyberUSA, CyberMA is a new threat sharing platform that allows security companies to securely share information about new threats with each other in order to collaborate (like the cyber-criminals do)
    2. Education: There was also a lot of focus on introducing cybersecurity as a career choice at all educational levels.
    3. Executive Order: Joyce explained the three primary points of the May 11 executive order — (1) securing the federal government, (2) securing corporate systems that are vital to our infrastructure, and (3) securing the global internet.   He also hinted that the President’s new office of innovation could potentially offer more resources for security in the future.

    Reference: http://thebronxlocksmith.com.

Direct IT

Sign up for a Free Network Audit

LIMITED TIME ONLY
For no charge, Direct iT will have one of our engineers audit your servers and network infrastructure.

Name (required)

Email (required)

Phone

Testimonials

We have worked with Direct IT for over 7 years and have always found them to be reliable, knowledgeable, super helpful and prompt. From the smallest problem with an MS product to moving and reinstalling our systems to new locations Direct IT delivers the finest IT service we could expect. It’s like having our own IT department. I can enthusiastically recommend Direct IT for any business like ours that requires swift, effective and reasonably priced IT services. — Michael P. Krone, Esq. Vice President

About Direct iT

Direct iT, Inc. is a New England based IT services firm offering products and services for small businesses in Greater Boston, New Hampshire, Rhode Island, and the rest of New England. Cloud, compliance, and document management services are also available worldwide. Many of our customers are along the Route 128 technology corridor.

Direct iT, Inc. Main Offices

39 Emerson Rd. Suite 215
Waltham, MA 02451
Sales: 781-890-4400
Support 781-890-1907
sales@directitcorp.com