LeapFrog IT Services
August 2, 2017: digital guardian

“The top information security concerns for financial services organizations include…”

1. Training, training and more training for your staff.

  • Social engineering is rampant right now. Make sure your team knows what to look out for so that they do not mistakenly process transactions or disclose sensitive information to scammers.
  • Documented and practiced secure processes that define how transactions requests and orders are placed.

2. Data Classification – organizations must know where all the sensitive information is stored so that proper controls can be implemented to protect it from falling into the wrong hands.

3. Encryption – stolen laptops and mobile devices account for many sensitive information breaches. Devices with proper encryption reduce the risk of data falling into the wrong hands.

4. Active Monitoring and Management – Having the proper polices and controls designed is good progress, but monitoring for breaches and infractions of policy is required to mitigate potential intrusions or breaches. Timely response to any breach or intrusion attempt is paramount.

Trey Hawkins was co-founder and CTO of Virtex Networks, Inc., one of the nation’s first IT infrastructure service providers, when it was acquired by Leapfrog IT Services in 2001. Prior to founding Virtex, Trey ran Computer Associates’ enterprise software training center in Atlanta, where he honed his expertise in implementing and supporting enterprise management technology used by Fortune 500 companies.


June 28, 2017: hypepotamus

Here’s What Hackers Want — And How to Make it Hard For Them

Here are five things hackers do and some easy ways to thwart them:

1. Hijack your transactions
If you discuss pending transactions over email, a hacker can get in the middle of your discussion. There are many cases where a hacker gets into an email system and redirects the message so the hacker can pretend to be the other party, continuing the transaction negotiations. When the deal closes and it’s time to wire the payment, guess whose account the money is deposited in? Not the party who’s been impersonated, that’s for sure.

2. Hijack your servers
Firewalls for your servers may not be the most exciting technology, but if yours aren’t up to snuff, the FBI just might show up at your door. Hackers use unprotected servers to launch cyber attacks and store the data they stole from other hacks. And if your servers are used in the commission of a crime, you’ll have to kiss them goodbye for a while: the FBI will need them to make their case. Even the most skilled lawyers will likely have a tough time getting them back for you anytime soon.

3. Sabotage your business
Competition can be ruthless. Payback can be brutal. Hackers use stolen information to interfere with business operations, take down websites, delete and change files, sell files to competitors, embarrass people, run wage disinformation campaigns — there’s no telling how many creative ways your information can be used against you. Hackers will be able to think of a lot more ways than you can — that’s their day job.

4. Sabotage your business from the inside
The last thing you want to think about is one of your own attacking you. But it happens all the time. Recently, a company was getting ready for a round of layoffs, and a network engineer found out that he would be on the chopping block. He deleted all of the configurations on all of the routers, leaving the company’s entire communications infrastructure crippled. Unfortunate insider attacks can happen when companies fail to take proper controls to secure email.

5. Leak or publish information
You may not be running for elected office, but you probably still don’t want your emails or internal information spread far and wide — or held hostage for ransom, especially if you’re in the middle of a merger, funding round, or a crisis. Whether the hackers’ intent is showing off their hacking abilities, trying to influence decisions or public opinion, shaming, whistleblowing, or disseminating confidential information, it’s still your information. And while reputable journalists publish information considered to be for the public good, not-so-reputable people do it for clicks.

Why small businesses are most vulnerable to hackers

Does your business have fewer than 100 employees? Then you are very attractive to hackers! This is because you probably haven’t taken steps to protect yourself in the same way that larger companies have. If it’s your habit to store passwords in one place or not have a password policy at all, this is like chum to the hacker sharks. And this can be devastating to startups and small businesses.

Keep in mind that even if you think it’s unlikely any of the above scenarios would play out for your business, you still have a fiduciary (and ethical) responsibility to prevent access to what hackers want — information that could harm someone else or steal from them. Depending on the situation, you could even have some degree of liability.

Free and cheap practices that can boost your security exponentially

The good news? You don’t need to go out and buy fancy firewalls. You can make your company (or home) more secure by implementing a few basic practices and using things you already have:

Set up password expiration policies: Set a reminder to change your passwords every quarter or so.
Set up a password lockout: Use lockout features to prevent account access after too many wrong password attempts.

Set permissions for files: Use a “need-to-know” policy, especially amongst temporary and contract employees — it’s not rude, it’s smart.

Encrypt hard drives: Enable encryption on each operating system (Windows 10, Mac)

Use multi-factor authentication and biometrics if you can: Extra levels of security send hackers packing.

Trey Hawkins was co-founder and CTO of Virtex Networks, Inc., one of the nation’s first IT infrastructure service providers, when it was acquired by Leapfrog IT Services in 2001. Prior to founding Virtex, Trey ran Computer Associates’ enterprise software training center in Atlanta, where he honed his expertise in implementing and supporting enterprise management technology used by Fortune 500 companies.


June 13, 2017: Metro Atlanta CEO

Leapfrog Services Provides Scale and Expertise During Active M&A Period

Staff Report From Metro Atlanta CEO

Leapfrog Services, an IT leader in Atlanta, was selected by Cousins Properties, an Atlanta-based REIT, to ensure all technology services were properly maintained and managed during Cousins’ recent merger with Parkway Properties. The merger and related spin-off of the companies’ combined Houston-based assets, resulted in a myriad of IT needs and challenges, including the takeover of 19 new locations.

Leapfrog has years of success supporting companies during mergers, acquisitions and divestitures with a strong understanding of the regulatory environment for these types of deals and executing on information technology appropriately.

“Our goal for every client engagement is to ensure the IT operations are supporting the business operations” says Emmett “Trey” Hawkins, CTO of Leapfrog. “For a large-scale merger like Cousins and Parkway, the details can be extremely stressful, with timing and precision of data integration a crucial factor. Our partnership with the Cousins team involved elements of security, storage, and management of multiple locations.”

The full remit for Leapfrog included the set-up of a private cloud, data migration, network integration and multiple disaster recovery elements.

“Leveraging an outside IT partner like Leapfrog enabled us to scale up and down dependent on the business needs at the time,” said Brandon Van Orden, SVP, CIO of Cousins Properties. “Because of Leapfrog’s understanding in this kind of environment and excellence in service, we were able to service the needs of our internal and external customers during this period with the confidence that we were using best-in-class IT practices.”


June 4, 2017: 11 Alive – Executive Profiles

Leapfrog CEO Claire ‘Yum’ Arnold is our executive profile.

She got her start in business development at Coca-Cola before taking the leap into entrepreneurship.

After acquiring a wholesale distribution company, Arnold would grow it into one of Georgia’s largest privately held companies.

Now she’s applying her skills to make Atlanta based Leapfrog a premiere IT service.

Watch Video


March 22, 2017:

Leapfrog Services Partners on the Largest Expansion in Zoo Atlanta History

Atlanta-based IT Provider strengthens partnership with Zoo Atlanta

Zoo Atlanta, one of the top zoological destinations in the country, is about to get even better. Following a successful $42.5 million capital campaign, Zoo Atlanta will soon launch the Grand New View project, an expansion that will create a one-of-a-kind event space overlooking an all-new African savanna for elephants, giraffes and more.

Key to the Zoo experience is technology. New and developing technology at the Zoo include a streamlined ticket purchasing system, interactive experiences and information kiosks, and the popular live PandaCam hosted by Animal Planet L!VE. Zoo Atlanta is partnering with Leapfrog Services, one of the top IT service providers in the region, to ensure excellence in all key aspects of information technology.

Zoo Atlanta and Leapfrog have a long-standing relationship, which the zoo credits with Leapfrog’s responsiveness and extraordinary customer service. In addition, both companies have a long history of giving back to the community — Leapfrog provides all non-profit clients with a substantial discount.

“Leapfrog is more than a partner, they are an extension of our Information Technology Team,” says Pam Taylor, Zoo Atlanta Chief Administrative Officer/Chief Financial Officer. “When we have an issue we need help on, our team says ‘just Frog it.’ We’re thrilled to partner with Leapfrog to advance the experience for our visitors.”

In 2016, Zoo Atlanta had nearly one million visitors. As they approach efforts to appeal to a variety of generations, interactive technology, both at the Zoo and through their various digital channels, is crucial.

“Zoo Atlanta is such an important part of our city’s culture,” says Claire “Yum” Arnold, Leapfrog CEO. “We treasure our long-term partnership with the Zoo, and we’re honored and excited to work with their amazing team to advance the technical needs for this next phase.”

About Leapfrog Services
Leapfrog provides expert-level managed IT services to more than 120 businesses and nonprofits worldwide. We leaped onto the scene in 1998 to fulfill a critical need we saw in the business community — technological expertise that enhances business operations without getting in the way. Our approach delivers Optimized IT services that are faster, safer, better managed and more reliable. All with a smile and no geek speak! For more information, visit leapfrogservices.com.

About Zoo Atlanta
Viewed as one of the finest zoological institutions in the U.S. and a proud accredited member of the Association of Zoos and Aquariums (AZA), Zoo Atlanta has a mission to inspire value and preservation of wildlife through a unique mix of education and outdoor family experiences. From well-known native wildlife to critically endangered species on the brink of extinction, the Zoo offers memorable close encounters with more than 1,000 animals from around the world. The Zoo’s newest destination, Scaly Slimy Spectacular: The Amphibian and Reptile Experience, featuring more than 70 species in a 111,000 square-foot complex, opened in 2015 and is the world’s first LEED Gold-certified reptile and amphibian exhibit. Zoo highlights include giant pandas, including Ya Lun and Xi Lun, a set of twins born to Lun Lun on September 3; North America’s largest zoological population of great apes; and a global center of excellence for the care and study of reptiles and amphibians. Up-close-and-personal animal experiences include behind-the-scenes Wild Encounters with African elephants, Aldabra giant tortoises and giant pandas. Zoo Atlanta is open daily with the exceptions of Thanksgiving and Christmas Day. Keeper talks, interactive wildlife shows, education programs and special events run year-round. For more information, visit zooatlanta.org.

Media Contact
Jennifer Babbit Bodner
jennifer@babbitbodner.com
404.729.6576


November 30, 2016: ReadITQuick

Security Strategy for 2017

Adjusting your IT security strategy to match your risks from external threats is something you should definitely do every year. The bad guys keep coming up with new ways to hack and attack, so updating your security should be a top priority. Here are four areas of cybersecurity to review so that you can budget for any needed improvements.


November 21, 2016: ReadITQuick

Network Strategy in 2017

As the New Year is fast approaching, nearly everyone seems to be in budget planning mode. IT spending is a fundamental piece of the budget planning puzzle. Here are helpful tips and tricks to help you make the most of your 2017 IT budget:


October 11, 2016: Digital Guardian

Cyber Security Investments: Experts Discuss Detection vs. Prevention

Detection or prevention? 36 security pros and IT experts share their top recommendations for prioritizing security investments.
Meet Our Panel of Security Pros and IT Experts: (click here to meet Trey Hawkins from Leapfrog Services)


October 2016: Flarrio

Cloud Security: 23 predictions you need to know #tech2016

“We will continue to see organizations building private clouds, which offer more control and security than public cloud services. Having complete ownership of your cloud is the most secure option.”
Trey Hawkins, Leapfrog Services


Send this to a friend