Often labeled as a “gun guy”, it was only a matter of time before a firearms analogy made it from pen to paper.  So, what better material to draw from (the puns write themselves) than the famed Silver Bullet or the iconic Gatling Gun?!  Using Wikipedia as our trusty reference, the silver bullet is described this way: “In folklore, a bullet cast from silver is often one of the few weapons that are effective against a werewolf or witch. The term is also a metaphor for a simple, seemingly magical, solution to a difficult problem.”  We will borrow from the latter part and avoid the complications of debating the efficacy on werewolves and witches for now.  I will excuse you if you thought we were going Lone Ranger and Tonto with the silver bullet reference.

As for the Gatling gun, the image that comes to mind is the scene in The Outlaw Josey Wales where the gun is used to great effect.  Admittedly, any connection to an Eastwood western is the path of least resistance for how my brain is wired.  Inside family joke – I refer to myself along with my brother and sister-in-law collectively (and proudly) as “The Outlaws”, so trust me when I say Clint’s classics run deep with me.  Borrowing from Wikipedia once again, “The Gatling gun is a rapid-firing multiple-barrel firearm invented in 1861 by Richard Jordan Gatling. It is an early machine gun and a forerunner of the modern electric motor-driven rotary cannon.”  The modern implementation is best represented by the flying tank also known as the U.S. Air Force A-10 Thunderbolt II “Warthog” equipped with the 30 mm GAU-8/A Avenger rotary cannon aka BRRRTTTTT (from the sound it makes when fired).

Personal note: As someone who grew up as an Air Force “brat”, I had an up close view of the sacrifices our military men and women (and their families) make to secure our freedoms. I have great respect for our armed forces and consider it a privilege to have planted my family’s roots alongside our military community at Robins Air Force Base. Another honor was to have my first paying (summer) job working for tips at my Dad’s squadron snack bar on Davis–Monthan AFB (He was in EC-130s at the time). It was there that I was able to watch the A-10s fly around the Tucson desert sky, hence my bias for these beasts of the air.

With our firearms references intact, let us consider how our analogy applies to Security.  Many in business wrongly assume there is some solitary “seemingly magical” solution to information security…the silver bullet.  The problem is the silver bullet in security is as imaginary as the ever-elusive werewolf.  It simply does not exist!  To start with, we cannot manage security in a vacuum.  There are three business constraints that must be managed together – Confidentiality, Integrity, and Availability (aka the CIA model).  I often tell clients that I can make their network 100% secure and of course they look at me with a healthy bit of skepticism – even they don’t REALLY believe in a silver bullet it seems.  I simply say, “Let me unplug everything from the network and shut your computers down.”  This is followed quickly by, “VERY SECURE, right?!  But not very available.”  And that is about as close as we can get to a true silver bullet.  With that extreme shot down, what can be done?  Now we can discuss degrees of security, risk tolerance, accessibility and, ultimately, cost.

Instead of thinking about security as a single magical thing, we need to embrace the idea that an effective security strategy incorporates a variety of tools and processes.  We need a Gatling gun approach.  The industry term for this is Defense in Depth.  We must deploy multiple security mechanisms and controls that create a layered defense against the endless barrage of external threats.  These layers may include firewalls, intrusion prevention, endpoint detection and response, network segmentation, least privilege access, encryption, strong passwords, patch management, data recovery, breach awareness, and end-user training.  Unlike the silver bullet, if one system fails, another is in place to potentially stop the threat.  Consider end-user training, an often-forgotten security measure – if a user is trained to properly identify phishing email attacks and avoids clicking on the malicious link, the endpoint security or firewall never have to defend against the threat.  Even better, if there is anti-phishing security around the email service, the user never receives the email in the first place.

Is your organization overconfident in a single security product?  Are the security best practices and product features like reading Greek?  Not quite sure how to balance the C-I-A equation for your business?  Partner with a technology vendor who understands the nuances of security and has the experience to build an effective defense in depth strategy right sized for your business.  So, do silver bullets stop werewolves?  Maybe, maybe not.  Give me a Gatling gun, or better yet, an A-10 with its rotary cannon any day.  BRRRTTTTT!

–Charlie Waters, COO – Total Computer Solutions, Inc.

It was nearly a year ago now that we were forced to start working remotely in various ways due to the COVID-19 pandemic.  For TCS, as for most companies, good communication is critical to our success.  When we don’t communicate well as a team, our customers notice – and not in a good way!

Let’s face it, sometimes it simply isn’t feasible to call someone from your cellphone.  Other times, your communication is too sensitive to transmit over an insecure text messaging platform.  Since TCS works in highly regulated markets like health, finance, and government, it’s imperative that we communicate in a way that does not compromise sensitive customer information.

Fortunately, TCS had a communication platform in Microsoft Teams that would accommodate all the necessary forms of communication for TCS team members to stay in touch from anywhere.  Here are the five communication tools within Teams that enabled TCS to communicate securely from anywhere:

  1. Live Chat

Sometimes, we need to convey or share something with a teammate without all the unnecessary niceties of an email or face-to-face interaction.  Instead of this imaginary email: “Hey, Bill!  I hope you had a great weekend.  This morning, I was able to complete the document revisions.  Please look over them and let me know your thoughts.”  You can simply choose your desired recipient and type: “The document revisions you requested are completed.  Please let me know your thoughts.”  If you really want to trim the fat: “Document revisions are complete. Thoughts?”

Concerned that your chat message will be overlooked?  Whenever you send a chat message, Teams will give you an indicator whether it is delivered successfully and has been seen by the intended recipient.  If the recipient doesn’t have Teams open and active on any of their devices, Teams will send your recipient an email informing them they have a Teams chat awaiting their response.

Concerned about security?  Microsoft uses various types and applications of encryption to guard against data theft in Teams by default.  This applies to all data within Teams, including the Chat feature.  If there are further regulatory concerns about data security within Teams, additional layers and add-ons can be employed to guard further against data theft.  TCS can help you determine what level of encryption makes the most sense for your business and ensure you are protected at that level.

  1. Video Calls

Other times, you know a topic will require a lot of back-and-forth discussion.  In those scenarios, a Chat will be frustrating.  In a chat session, you can’t read facial expressions, voice tones, and other body language indicators.  Teams has you covered with a Video call option.  The pandemic has made us all aware of Zoom.  Teams has a similar function where individuals can join a Teams video call and interact seamlessly.

With the video call function, you can connect 2 or more teammates and interact as if you were in the same room. Naturally, there are some conditions that impact the quality of that video session.  You need a good, reliable Internet connection with enough bandwidth available to stream both video and audio.  Your network needs to be optimized to prioritize streaming traffic.  TCS can help you with those hurdles.  Once you have the right connection, Teams video can be a great way to conduct a group meeting and have everyone interact and contribute.

  1. Voice Calls

If you are on a mobile device and you are using Teams, you can simply click on the phone handset icon and create a temporary audio connection with that user.  Maybe you haven’t perfected your make-up for the day yet.  Maybe you’re on a limited bandwidth Internet connection in a cabin on the side of a mountain working remotely.  Either way, you need to communicate with someone securely and conveniently.  The Voice call function in Teams has you covered there.  Teams will even let you know if that person is available, away, or offline.

The Teams voice call is similar to a phone call.  If you are using Teams from your smartphone, it’s practically identical.  Teams gives you a secure platform to discuss business matters directly from your laptop, mic-enabled PC, or mobile device.

  1. Screen-sharing

Most of the time, we think of sharing our screen in Zoom meetings or other video calls.  Of course, if you are on a video call in Teams and need to share your screen with the rest of your team on the call, you have that capability within Teams.  Beyond that, if you just want to share your screen outside of a call environment, you can initiate a screenshare directly as well.

Some things to keep in mind when using the screenshare option:  When you share your screen, you have a couple of options.  You can (1) share the entire screen/monitor or (2) you can share a specific application.

Scenario 1: Employee or Client Training scenario – In a training scenario, you probably will be jumping back and forth between applications during the screenshare.  For instance, maybe you’re presenting the training in PowerPoint, but you want to demonstrate your instruction within the actual line-of-business application to the employee(s).  To accommodate the sharing of multiple applications in the session, you will choose to share the entire screen.

Scenario 2: Hosting a Webinar – If you are only going to be sharing information within one application, like a PowerPoint presentation for a webinar, then it’s best to share just that single application.  This protects your audience from seeing information not privy to them, should you inadvertently minimize the application you’re attempting to share.

Regardless, be careful when sharing screens to ensure that you aren’t sharing confidential information.

  1. Shared Documents

Teams also works with OneDrive to provide the ability to share documents and work on those documents simultaneously.  There are multiple ways to share documents in Teams.  You can share folders within each Team.  You can drag and drop files onto the Chat to send the file via the Chat interface.  Or you can Sync Teams folders in OneDrive and use those folders much like you would a shared network folder.

Conclusion:

Microsoft Teams provides a secure communications platform that can accommodate whatever scenario your team might encounter.  Just like any tool, Teams needs to be employed in a meaningful and constructive way.  Used properly, Teams can enhance your work-from-home communications and help keep your business communications on track, even when workers are remote.