S3 Offers High-Speed Internet with Award-Winning Exede Service
Top FCC ranking for delivering advertised speeds, and ViaSat-1 Guinness World Records title
make Exede an attractive choice for area residents
7/9/2014 – Central Florida residents now have access to Exede® by ViaSat, a high-speed satellite Internet service earning awards and recognition nationwide.
The 12 Mbps baseline download speed offered by Exede Internet is eight times faster than previous generation satellite services – and often significantly faster than average DSL service.
Powered by ViaSat-1 – officially recognized as the World’s Highest Capacity Communications Satellite with a Guinness World Records title – Exede service has moved into the mainstream of Internet options. A February 2013 FCC study based on performance tests reported that Exede Internet outperforms all other ISPs in delivering promised speeds to subscribers, with 90 percent of Exede subscribers receiving 140 percent or better of the advertised 12 Mbps download speed during peak periods.
Popular Science also named the innovative satellite system and Exede Internet as a Best of What’s New award winner for 2012.
S3 provides the award-winning service for Central Florida “As a local dealer serving this community for many years, I’m pleased to provide super-fast Internet to households that have never been able to get speeds like this in the past,”said Eric Stump, VP, of S3. “My customers are very pleased with the speed and reliability of Exede Internet, and we look forward to providing service to many more customers here in Central Florida.”
The consistently fast performance of the Exede satellite Internet service has helped ViaSat reach more than 285,000 subscribers on ViaSat-1 in its first year of operation. The total subscriber count across all ViaSat satellites has surpassed 500,000 for the first time. Subscribers also enjoy 100 percent U.S.-based customer support.
Approximately 40 percent of new Exede Internet subscribers are choosing the satellite service over other alternatives available to them, such as DSL, cable, and mobile wireless for fixed home use – a major shift from the previous generations of satellite Internet service, often considered a “last resort” for those with no other alternative.
About S3 (www.s3ind.com)
S3 Industry Corp provides High Speed broadband services, hosting services, cloud solution and IT managed services for the Central Florida region. Opened in the fall of 2011 S3 has become a premier provider of state of the art IT solutions and services. S3 has partnered with some of the top leading industry companies such as ViaSat, IBM, Cisco, Redhat, AVG and many others to provide Central Florida customers the service they deserve.
About Exede (www.exede.com)
Exede® Internet by ViaSat, Inc. delivers high-speed Internet to more than 285,000 subscribers across the U.S. Powered by ViaSat-1, the world’s highest-capacity satellite uses spot-beam technology to cover approximately 80 percent of the U.S. population. With download speeds up to 12 Mbps, Exede has transformed satellite Internet for households that previously had slow, inadequate Internet service. It is also proving to be a popular, competitive alternative to residential DSL and wireless Internet. In the FCC’s annual benchmarking report, Measuring Broadband America 2013, Exede led all Internet service providers in surpassing advertised speeds. ViaSat-1 earned a Guinness World Records® achievement as the highest-capacity communications satellite in the world at the time of its launch in October 2011. Popular Science also named the innovative satellite system and Exede Internet as a Best of What’s New Award Winner for 2012.
About ViaSat (www.viasat.com)
ViaSat delivers fast, secure communications, Internet, and network access to virtually any location for consumers, governments, enterprise, and the military. The company offers fixed and mobile satellite network services including Exede® by ViaSat, which features ViaSat-1, the world’s highest capacity satellite; service to more than 1,750 mobile platforms, including Yonder® Ku-band mobile Internet; satellite broadband networking systems; and network-centric military communication systems and cybersecurity products for the U.S. and allied governments. ViaSat also offers communication system design and a number of complementary products and technologies. Based in Carlsbad, California, ViaSat employs over 2,500 people in a number of locations worldwide for technology development, customer service, and network operations.
Net-Security.Org reported: Malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day, according to Panda Security.
Trojans are still the most abundant type of new malware, accounting for 71.85% of new samples created during Q1. Similarly, infections by Trojans were once again the most common type of infection over this period, representing 79.90% of all cases.
In the area of mobile devices, there have been increasing attacks on Android environments. Many of these involve subscribing users to premium-rate SMS services without their knowledge, both through Google Play as well as ads on Facebook, using WhatsApp as bait.
Along these lines, social networks are still a favorite stalking ground for cyber-criminals, The Syrian Electronic Army group, for example, compromised accounts on Twitter and Facebook, and tried to gain control of the facebook.com domain in an attack that was foiled in time by MarkMonitor.
During the first three months of the year we have witnessed some of the biggest data thefts since the creation of the Internet, and as expected, Cryptolocker, the malicious file-encrypting ransomware which demands a ransom to unblock files, has continued to claim victims.
"Over these months, levels of cyber-crime have continued to rise. In fact, we have witnessed some of the biggest data thefts since the creation of the Internet, with millions of users affected”, explains Luis Corrons.
So far in 2014, Trojans are still the malware most commonly used by cyber-criminals to infect users. According to data from PandaLabs, four out of five infections around the world were caused by Trojans, that’s 79.90% of the total. Viruses are in second place, accounting for 6.71% of infections, followed by worms, with a ratio of 6.06%.
Trojans also top the ranking of newly created malware, accounting for 71.85% of the total, followed by worms, at 12.25%, and viruses at 10.45%.
The global infection rate during the first three months of 2014 was 32.77%. China is once again the country with most infections, with a rate of 52.36%, followed by Turkey (43.59%) and Peru (42.14%). Although Spain is not in the top ten of this ranking, it is still above the global average with 33.57%.
European countries ranked high among the least infected countries, with the best figures coming from Sweden (21.03%), Norway (21.14%), Germany (24.18%) and Japan, which with a ratio of 24.21%, was the only non-European country in the top ten of this list.
Email viruses have been on the rise for some time now. Statistically we have seen an increase across all of our customers but the last month we have seen a huge increase with some of our customers. To decrease the likelihood of spammers and hackers getting your email address I always encourage our clients to use their business email for strictly business and use a Gmail or Yahoo account for filling out online forms, getting information or anything that requires you to give an email address. As simple and obvious as it seems a lot of folks are still making this mistake especially employees. Use a Gmail or Yahoo especially if it is to be used as a login requirement for a website.(NEVER USE YOUR BUSINESS EMAIL AS A LOGIN) I have horror stories of clients using their business email as a login and then using their same password that they use to login to their email as the password to login to the site. Just a tidbit of information to reduce amount of spam and the likelihood of a hacker getting your email and password.
SMB low hanging fruitBy Eric Stump VP S3 Industry Corp
Small to medium sized businesses are easy prey for hackers. In the past large corporations was the focus of hackers backed by organized crime organizations. Today’s fact is large corporations are now spending millions of dollars to protect their IT infrastructure leaving the focus now on small to medium-sized businesses. Like bank robber’s cyber criminals not only want to go where the money is but they also want to be sure that they can get it.
Small and medium-sized businesses are an easy target. There is a huge fallacy in the small to medium sized business infrastructure that they are too small to be a target to cyber criminals. If an attacker can get into your system, they can probably get money out of it one way or the other. Customer information along with employee information such as social security numbers, date of birth, addresses, e-mails, bank account information and tax information are all huge profit makers for cyber criminals.
Take a look at your own systems and evaluate how much personal identifiable information is on a human resources computer or better yet the accounting department. Even systems that don’t have any valuable information doesn’t put you in the clear 9 out of 10 times once a hacker gains access to your system they will be destructive in nature. We’ve seen several cases where breached systems were completely destroyed with unrecoverable information. We have also seen instances where systems were being utilized for clandestine cybercrimes. Malware and Bots can sit dormant for months waiting for the right moment to strike. Hackers can utilize your system resources to attack other computer systems. Cyber criminals can launch Denial of service attacks, SQL injections and data mining from your system slowing your network and system resources to a crawl.
How can you start protecting your IT infrastructure?
Lockdown your endpoints: That means securing every desktop, laptop, smart phone, or tablet that accesses your network. If they contain company data, that data needs to be encrypted – no exceptions.
Secure every connection: Remote access is the primary way attackers get into your network, so you need to closely monitor every log-in to make sure it's legit.
Check for compliance: If your business accepts credit cards, you'll need to follow the PCI-DSS standards or face the consequences. Even if you're in an unregulated industry, you may sell to a larger company that has strict security rules you must follow. If you are a healthcare facility, doctor’s office, accountant or any company that deals with customer information such as social security numbers you need to be HIPAA and HITECH compliant. Encrypt employee information on human resources computers or servers. Encrypt stored information on accountant’s computer or server containing credit card or banking information.
Penetration testing: Hire an IT security company they can perform penetration tests on your network and identify your weak spots.
System Access: Limit employee access to data and information, and limit authority to install software. Do not provide any one employee with access to all data systems. Employees should only be given access to the specific data systems that they need for their jobs, and should not be able to install any software without permission.
Passwords and authentication: Require employees to use unique passwords and change passwords every three months. Consider implementing multifactor authentication that requires additional information beyond a password to gain entry. Check with your vendors that handle sensitive data, especially financial institutions, to see if they offer multifactor authentication for your account
Backups: Regularly backup the data on all computers and servers. Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Backup data automatically if possible or at least weekly and store the copies either offsite or in the cloud.
Secure your Wi-Fi networks: If you have a Wi-Fi network for your workplace, make sure it is secure, encrypted, and hidden. To hide your Wi-Fi network, set up your wireless access point or router so it does not broadcast the network name, known as the Service Set Identifier (SSID). Password protect access to the router.
Anti-Virus: Install a robust business class Anti-Virus program or consider a SaaS (Software as a service) such as AVG CloudCare that can provide Anti-Virus, Content filtering, Anti-Spamware, Anti-Malware and Anti-rootkit on a pay as you go service.
Train your employees: All of the above will be useless if your employees are duped into opening the door for cyber crooks.