• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Have an Emergency? Get Help Now
Shoreline Technology Solutions in Holland, MI

Shoreline Technology Solutions

Shoreline Technology Solutions

  • About
    • Testimonials
    • Blog
  • Services
    • Managed Services
      • Essential
      • Advanced Security
      • Compliance-as-a-Service
    • Co-Managed Services
    • Hardware Services
    • Cloud-Based Solutions
    • Disaster Recovery as a Service
    • VoIP (Internet Phone) Services
    • Free Network Security Assessment
  • Case Studies
  • Submit Ticket
  • Remote Assistance
  • Contact
  • Free Assessment

ThreatLocker’s 12 Steps To Protect Against Ransomware

September 21, 2022 By Mark Kolean Leave a Comment

Learn how to stop cyber-attacks in their tracks with the ebook the ThreatLocker® team has put together with their decades of cybersecurity experience. The ebook includes the steps you need to take in order to better protect against ransomware. You’ll also see why the need for a policy-driven, Zero Trust, endpoint security solution has never been greater.

Default Deny

Starting with a default deny approach will enable any application to be blocked regardless of whether it is known or unknown malware. Default Deny has long been considered the gold standard in protecting businesses from known and unknown executables. Unlike antivirus, Default Deny puts you in control over what software, scripts, executables, and libraries can run on your endpoints and servers. This approach not only stops malicious software but also stops other unpermitted applications from running. This process greatly minimizes cyber threats and other rouge applications running on your network.

Add Dual Factor Authentication to Management Tools and Servers

Add Dual Factor Authentication onto your RMMs, Antivirus, Remote Control Software, and any other platform that could allow access to both you and your customers’ systems. Dual factor authentication should not be considered enhanced security for I.T. or MSP tools. It should be standard. Most platforms are free, so it makes it easy to enable this extra layer of security across all applications.

Lock Down your Perimeter Firewall

Protecting your perimeter firewall helps to better protect you against hackers. When you leave ports such as RDP open you become vulnerable to malicious attacks. First and foremost you need to lock down all direct connections to Remote Desktop or similar services. If you do need to publish RDS, do so using a Remote Desktop Gateway server and protect the gateway with dual-factor authentication.

Restrict User Access

Training your employees around the risks associated with cyber threats, and showing them what not to click often isn’t enough. We need to help them better protect themselves and with Ringfencing, you can do just that.

Ringfencing allows you to define rulesets governing how an application can interact with other applications, and what resources an application can access. For example – If both PowerShell and Microsoft Office are required in your environment, that does not mean that Microsoft Office needs to be able to interact with PowerShell. Create Ringfencing policies to stop user frontend applications from interacting with system tools. Then create policies to stop applications like RegSRV32 and PowerShell from accessing the internet.

Don’t Just Look for Malware, Look for the Footholds

Antivirus software often focuses on searching for active malware, but far too often dead services or scheduled tasks are left dormant causing no harm until a set date and time. Use additional layers such as threat hunting to detect and remediate these threats. “Cyber threat hunters bring a human element to enterprise security, complementing automated systems. They are skilled IT security professionals who search, log, monitor and neutralize threats before they can cause serious problems”, reports IBM. Threat hunters will dedicate their time to finding hidden malware so they can prevent a cyber-attack from happening. Not only does this add an extra layer of reliability to any cyber security stack, but it also minimizes the damage that the attack could have caused.

Set Default Lockout Group Policies

A lockout policy enables administrators to determine how long a user should be locked out of their account. For example, if a user were to forget their password a certain amount of times, the user would automatically be locked out. This enables the administrator to ensure that an attacker can’t use a dictionary or a brute force attack to try and guess the user’s password. This process is free and can be completed in no time at all. Admins need to simply set the default lock policy on computers to 10 minutes, or a reasonable number. Leaving machines unlocked, or forgetting your password will leave your machine vulnerable to cyber-attacks. Always assume hackers have the means to exploit any computer at any time and start locking your machine or setting lockout group policies.

Patch your Computers

In 2017, Equifax were hit with a huge data breach. More than 143 million U.S consumers were affected, sensitive information was stolen, including credit card numbers, phone numbers, social security numbers, etc. The result? Equifax had to pay almost $1billion in legal fees and additional charges. Their reputation was compromised, their customers were fleeing, and their future was up in the air. During the investigation, it was discovered that the breach was the result of an unpatched web application. Hackers were able to get in and hijack their computer systems and network. As you can see, patching is not optional. Always make sure your machines are up-to-date and patched with the latest software.

Disable Macros

Macros are automated input sequences used to imitate mouse action or keyboard clicks. These programmable patterns are then used to automate work and trim down the time it takes to complete tasks on programs such as Microsoft Excel and Word.

Unfortunately, hackers can exploit macros, turning them into malicious viruses that will hijack machines. With so many businesses across the globe now using automated programs to complete tasks, macro attacks are dramatically increasing. You can avoid macro attacks by simply disabling them on your machine using a group policy or doing it manually. If you don’t need them, it’s better to disable them before it’s too late.

Use Secure Passwords

Using a strong and secure password is a vital step when it comes to better protecting your data. Hackers are extremely clever. They use software to crack passwords, enabling them to crack even the toughest of passwords. Having a long and complex password full of numbers, capital letters, special characters, etc, will help your data stay protected. There are a huge variety of password generator tools available, and password managers, which will help you generate an unhackable password and keep your data safe. The more you do to protect your data, the harder it will be for hackers to gain access to it.

Monitor your Domain Admins Groups

Monitoring your domain admin group is a vital step to becoming better protected. It is important you know who operates within this group and when new users are added. If a user is added without permission, or without the need to be a domain admin, you will increase the risk of a security breach. Your group should be limited to the minimum and monitored closely for any suspicious activity. If a hacker already has access to your system, it won’t take them long to insert themselves as a domain admin. In doing so they will have access to every machine, across every network. Once they carry out their attack, the effects will wreak havoc. Locking down your domain admin group will stop this from happening. It’s important to get ahead of the game before the hacker even has the chance to win.

Turn on the Windows Firewall

Did you know that ransomware attacks can propagate across your network? One of the easiest ways for ransomware to propagate is by using push installers. As scary as this may sound, there are ways you can mitigate this type of attack from happening.

Don’t Make Users Local Administrators

It is important to note that users who are local administrators can knowingly and unknowingly make changes to their system which can allow malware to infect the operating system. It is also worth noting that you probably won’t want to add domain user groups to the administrator group. If an attack is going to happen, doing the above will enable the attack to wreak havoc on your machines and network. Make sure you remove regular user accounts from the local administrator’s group. That includes your own account. If you need administrator access, use a second login.

For the full ebook and an overview of the ThreatLocker platform, see 12 Steps to Prevent Ransomware.


As a Holland, Michigan Managed Service Provider (MSP), we offer more than just server disaster recovery and break-fix IT support. We evaluate and organize your network, keeping your data backed up and secure—at all times. Don’t wait for server disaster to find a qualified Managed Services Provider. Reach out to Shoreline Technology Solutions today. Our information technology company will evaluate your network free-of-charge and provide you with best-in-class hardware and cloud-based solutions. We’re excited to hear from you!

Mark Kolean, President / Network Architect
Mark Kolean

President / Network Architect

Mark Kolean always had a fascination with technology from the time he was 3 and his gift of the Atari 2600 to current. In 1990 at the age of 14 Mark got his first job in customer support for a mail order business supporting Tandy TSR-80 computer software shipped on cassette tape. A few years later Mark was building hundreds of 286, 386, and 486 computers for the new emerging DOS & Windows 3.1 computers that had exploded on the market.

After a college career studying business and technology Mark Started Shoreline Computer Systems in 1999 at the height of the dot.com boom with the looming crisis of the year2k bug just around the corner. In the early 2000’s a lot of work was done with early network systems including Lantastic, Novell, and Windows NT Server. Mark became a community contributor to the Small Business Specialist community that revolved around Small Business Server 2000-2011 which focused on single or dual server environments for businesses up to 50 in size. Networks during this time frame mostly had a break fix relationship in which work was billed only when a problem occurred.

In the 2010’s Microsoft released their first cloud based software called Microsoft BPOS which would in later become known as Microsoft Office 365. This introduced a new model in technology with pay as you go subscription services. Starting in 2013 Mark’s team at Shoreline Computer System rebranded as Shoreline Technology Solutions to focus on the transition to become proactive and less reactive to data backup and security needs. Starting in 2018 all customers are required to have a backup management plan in place as a center point with the full understanding that if STS isn’t watching the customer’s data, then no one is.

Now in Mark’s 22 years of business he is building a company emphasis of how to help customers retire servers and build networks completely in the cloud.

Share this post:

Share on Facebook Share on LinkedIn Share on X (Twitter) Share on Reddit Share on Email

Network Security

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Client Testimonials

John Cavedo Jr
google
John Cavedo Jr
January 28, 2025

Professional, Responsive, Affordable. Highly recommend for your IT needs.

Dan Lampe
google
Dan Lampe
January 27, 2025

STS has been very proactive in preventing issues. Very responsive in taking care of problems. Long term satisfied customer.

Dylan Walter
google
Dylan Walter
January 12, 2025

Great staff & they quickly take care of your IT needs! Would recommend

Eric Schaefer
google
Eric Schaefer
December 19, 2024

Thornapple Township is very pleased to have Shoreline Technology Solutions as our IT provider for over 3 years. The transition from our previous provider to STS was smooth. Mark has assembled a team of knowledgeable professionals, and their fast, friendly and professional service is appreciated. We also like the fact that they are proactive in their approach to managing our environment. Thank you Mark and Team!

Jennifer Williams
google
Jennifer Williams
November 1, 2024

Shoreline Technology Solutions is GREAT to work with and has a wonderful staff---always eager to help and solve all my issues! When I was in jam, they offered many options and identified the lowest cost solution---which as a small business owner I SO appreciate! If you want an IT solution you can TRUST---chose Shoreline Technology Solutions!

Russell
google
Russell
September 22, 2024

The Shoreline team is first class. Professional, efficient and all of their recommendations have helped us improve our business operations!

Chad Kirkpatrick
google
Chad Kirkpatrick
June 27, 2024

Our non-profit organization, Broadway Grand Rapids, has worked with Shoreline for years and as technology continues to evolve and change, they have been there to guide us. From advanced security implementation to our successful cloud migration project, they have proactively advised us and walked us through it all. It's not just the big projects that they excel at! STS has been our wholistic IT partner keeping us running on a day to day basis as well. Their fast and friendly team always answers and responds quickly to our needs no matter how big or small. No matter your size or experience level, they are the ideal IT partner, and I can't recommend them enough.

Emma Battle
google
Emma Battle
April 15, 2024

We appreciate the fast, friendly and proactive services provided while working both in the office and while working remotely.

Austin Schild
google
Austin Schild
December 26, 2023

STS has been managing our companies' equipment and network for a few years now. We couldn't be happier with their service. Fast and timely responses, efficient problem solving via remote access, and seamless transitions with little to no downtime during upgrades or additions to the network. Definitely give STS a chance if you're in the market for an IT company to help manage all your computer and network needs!

jim hovinga
google
jim hovinga
December 26, 2023

Mark and his team have taken care of all my IT needs.....knowledgable, professional and a pleasure to work with.

David Fagerstrom
google
David Fagerstrom
December 26, 2023

They are there when we call. That means a lot to up

Morgan Langejans
google
Morgan Langejans
December 26, 2023

We have only been using Shoreline for a few months now, we switched over to them from another local tech company. The difference in company's is not comparable. If we put a ticket into shoreline they respond within 24 hours, it is usually the same day. Shoreline has amazing customer support; they remote into our computers and are very quick to solve our issues. If for some reason they cannot solve it just by remoting in we had Terri stop in within an hour to help us. We are very grateful for Shoreline, and we are very thankful for your team!

Kendra Ortega
google
Kendra Ortega
December 26, 2023

Mark and his team have done an excellent job with my business tech assistance and security. I highly recommend them.

Rachel Keur-Nelson
google
Rachel Keur-Nelson
December 23, 2023

Easy to work with and no down time on systems updates, etc.!

Susan Beyer
google
Susan Beyer
March 15, 2023

Shoreline Technology Solutions is very helpful for our IT needs. They provide excellent customer service and are always readily available to answer our questions and solve our tech issues.

Stuek
google
Stuek
November 8, 2022

Mark and his team are excellent at what they do. They helped us with a large server upgrade and the transition was very easy on my staff with very little work interruption. I highly recommend Shoreline Technology Solutions.

Diana Sprik
google
Diana Sprik
May 5, 2022

We are a small office in Holland and have been using Shoreline for over 5 years. We have found them to offer proactive service and IT suggestions. The service is consistently fast and friendly. Because of solutions implemented by Shoreline we've had reliable remote access which has allowed us to be more flexible in our work. The hardware Shoreline installed has been quality and long-lasting. It is clear in all they do that Shoreline takes IT security seriously and we feel well protected by the systems they've put in place. Overall, we have been very pleased with the great relationship we've built with Shoreline and consider them a true partner in functioning at our best.

Jen Aulgur
google
Jen Aulgur
February 24, 2022

Shoreline Technology Solutions has been our IT specialists since 2016 and they took us from a very antiquated system to something that works for our busy lives at Harbor Humane Society. We have over 5 years of great support with Shoreline. They are extremely fast and typically address our concerns within the same day. They offer proactive services and suggestions. They are helping us with our long term IT security goals as well as continuing to maintain and update our equipment and systems as needed. We highly recommend Shoreline Technology Solutions to meet your business needs!

Ralph Hensley
google
Ralph Hensley
November 18, 2021

Shoreline Technology had been with us for 7 plus years. They have done a great job of moving us to a reliable system environment, moving us to new platforms, responding to our urgent requests and providing us with counsel on system development. They manage all of our devices, wireless and system server, and all of our user devices. They always respond to our needs quickly and we value having them as a trusted valued added partner. With lots of sensitive and confidential information on our servers, its great to know we have a partner who is looking out for our best interests and the interests of the church. We would not want to be with any other IT provider. We were and it was not a pleasant relationship. I would recommend to any company looking to have a value added partners, look no further Shoreline Technology is the answer.

Clint Myers
google
Clint Myers
November 11, 2021

Mark and his team at Shoreline have been fantastic to work with as Shoreline helped us unbundle and reconfigure our network this past year! They worked around our schedule to minimize downtime and quickly responded when we had questions. Highly recommend

Ryan Dykstra
google
Ryan Dykstra
October 25, 2021

Basic IT break-fix issues are unpredictable and sometimes maddening - especially if they're left to accumulate over time. A dependable and competent resource for IT is very important for us and has been surprisingly hard to find, but that’s exactly what we have now after signing up with Shoreline. They're responsive, professional and efficient (and nice to be around!). Our productivity has increased and downtime has virtually disappeared.

Marc Vlietstra
google
Marc Vlietstra
July 7, 2021

Mark and his team at Shoreline Tech have supported our company for over 8 years. They are very responsive to any calls for support and can always find a solution to our communication issues. They continue to support our older server and have already laid plans for the upgrade due in 2023. As our machines age and technology advances, communication becomes more difficult between our workstations and the machine controls. They remotely repair our system when necessary so that we can maintain our production schedule. I highly recommend the team at Shoreline and have no desire to search for another IT service. Their service and knowledge are top notch.

Amanda J. Snyder
google
Amanda J. Snyder
March 9, 2021

We hired Shoreline Technology Solutions (STS) in January 2021 to be our managed IT provider and migrate our current IT environment onto a brand new, cloud-based system utilizing Microsoft 365. Our situation was challenging and unique, but Mark and his team didn’t hesitate to take on the challenge. During the planning stages, STS was very proactive in making recommendations for items we never considered. They helped us plan and think through all stages of the migration process. We couldn’t have asked for a more seamless and easy transition. Downtime was minimal and any end-user issues were met with friendly, efficient service. Now that we’re through the migration, our organization is happily working under the new system with great efficiency. We look forward to a long-standing relationship with STS as our IT service provider.

L B
google
L B
November 16, 2020

So grateful for the STS help at a crazy time right before the election. The internet outage at the office meant that I couldn’t issue ballots to people who were stopping in all day long to vote early. Kyle not only helped me set up my computer to work off my phone’s hotspot, but he came back later to network the new laptops together for the election day festivities—something that I just didn’t have time for.

Guard Your Business Against Ransomware!

Get the Guide

Footer

Contact

Shoreline Technology Solutions
828 Lincoln Ave.
Holland, MI 49423
Phone: (616) 394-1303

Message Us

Services

  • Services Overview
  • Managed Services
  • Co-Managed Services
  • Hardware Services
  • Cloud-Based Solutions
  • Free Network Security Assessment
  • Disaster Recovery as a Service

For Clients & Prospects

  • Testimonials
  • Blog
  • Client Knowledge Center
  • Submit Ticket
  • Remote Assistance
  • Payment Portal

Follow Us

  • Facebook
  • LinkedIn
Best of Holland, Microsoft Silver Partner, Datto Gold Global Partner Badges

Sitemap | Website Design by OptimWise