Business Continuity Plan
The COVID-19 virus is affecting our businesses, families, and loved ones. Since protecting your employees is as important as protecting your operation, we wanted to inform you that we have solutions that can help to reduce the risks and losses in your business.
We at ASI Group have activated our Business Continuity Plan to work from home, thus protecting our employees and their families, and at this moment we are 100% operational.
These are the Cloud Based Solutions from some of our partners, we currently use to support our operations and we can help you implement:
Kerauno: our Communication platform unifying our U.S., Panama and Costa Rica offices, and all our operational teams in the region.
Kerauno’s Unified Communications as a Service (UCaaS) delivers a more intuitive, flexible and powerful solution to get the most out of your business communications.
Now, you can integrate communications across devices, channels and teams through our robust feature set, including: visual call control, mobile softphone, collaboration tools, presence, contact center, workflow, chat, video integration and more.
Kerauno allows employees to take the phone from their desk and connect it to their home. In addition, it allows the installation of Softphone (phone based on software that works by connecting headphones to your computer) and Mobile APPs that can be downloaded to your Android phone or iPhone. Users can make and receive calls as if they were in the office. When dialing, the caller ID will show the company number, not the home or cell phone.
We have also assisted our partner Power Financial CU, who is located in Broward County, to allow their call center agents to work remotely utilizing the MaxMobile functionality of the Altigen system. Power Financial is making sure their teams stay safe while ensuring their members have access to their finances.
MS Office 365: All teams at ASI Group use Office 365 collaboration tools allowing them to stay connected remotely and work transparently and secure. Thanks to Office 365 we improve productivity and foster a culture of collaboration.
Office 365 is a cloud-based subscription service that brings together the best tools for the way people work today. By combining best-in-class apps like Word, PowerPoint, Excel and Outlook with powerful cloud services like OneDrive, SharePoint and Microsoft Teams, Office 365 lets anyone create and share anywhere on any device.
At ASI Group all our offices are protected by Cisco Meraki Security Solutions. this has allow us to protect our LAN and at the same time configure secure and reliable VPN connections to work remotely. and not only our developers stay connected to our Panama Data Center, all the management and monitoring of all servers is done remotely.
Every Meraki Security Appliance supports several features, like a stateful firewall and integrated Sourcefire intrusion prevention (IPS) engine, to keep networks secure. Threat definitions and filter lists are seamlessly updated, ensuring every site has bleeding-edge protection from the latest vulnerabilities and troublesome websites.
Seamlessly manage campus-wide WiFi deployments and distributed multi-site networks from a single pane-of-glass.
A word from our Partners...
Cybercriminals are now leveraging the global crisis to target businesses of all sizes by launching cyberattacks and phishing campaigns in order to exploit us at a potential time of weakness. There have been warnings issued by government agencies related to cybercriminals targeting businesses that are turning on remote access to their systems in order to help with business continuity. Remote access is a very powerful tool but, if not implemented correctly, may result in a cyber or ransomware attack against the business. As businesses rush to close their physical operations and move to a remote workforce, the improper configuration of these remote access systems can be an easy way for cybercriminals to attack. Please follow these best practices for remote access:
Unless your IT resources clearly understand the risks associated with using Remote Desktop Protocol (RDP), do not allow them to install it. RDP is a highly exploitable technology that is a primary target of cybercriminals.
Utilize a remote control software that allows you to “log in” to a computer at your office.
Make sure the remote control software utilizes Multi Factor Authentication (MFA) so it makes it more difficult for a cybercriminal to hack into your system. MFA sends a text message to your cell phone or an App on your phone to authenticate your log in.
Utilize strong passwords that incorporate multiple words, numbers and special characters for the authentication for the remote control software.
If you are using a VPN, make sure your IT vendor has updated all the VPN software. As of just a few months ago, many VPNs had vulnerabilities that could allow a breach to occur.
Make sure all remote computers are running the latest versions of Windows 10 or MAC.
Make sure all remote computers have anti-virus software installed and the virus definitions are up-to-date.
Use strong passwords on all remote and host computers that incorporate multiple words, numbers and special characters.
For Wi-Fi enabled devices, use the strongest encryption protocol available. WPA3 is the newest. At a minimum, you should be using WPA2.
Do not allow family members to access any device that is used to remote into a work computer.
Make sure you lock the computer before you walk away from it. On a Windows computer, this can be done by pressing the “Windows” key and the letter “L” at the same time.