Should I Remove TP-Link Devices?
Assessing the impact of potential TP-Link router bans on small business networks and exploring steps to enhance cybersecurity.
Securing your small business network is more critical than ever. Recent discussions about potential bans on TP-Link routers have raised concerns among small business owners regarding the safety and reliability of their networking equipment. Understanding the implications of these developments is essential for making informed decisions about your network infrastructure.
Background on TP-Link and Security Concerns
TP-Link, a prominent Chinese manufacturer of networking devices, has been under scrutiny due to potential national security risks. Investigations by U.S. authorities have highlighted concerns about vulnerabilities in TP-Link routers that malicious actors could exploit. Notably, Chinese state-sponsored hackers have been reported to exploit known vulnerabilities in TP-Link routers, raising alarms about potential threats to critical infrastructure.
In December 2024, reports indicated that U.S. authorities were considering banning TP-Link routers due to hacking fears. The investigations focused on whether TP-Link routers, which have been linked to cyberattacks by Chinese entities, pose security risks. Microsoft analysis showed Chinese hackers using TP-Link devices to launch attacks on Western targets, including U.S. government agencies.
Implications for Small Businesses
These developments necessitate reevaluating network security strategies for small business owners. Routers are foundational to network infrastructure, acting as gateways between internal networks and the broader Internet. Compromised routers can serve as entry points for cyber threats, potentially leading to data breaches, operational disruptions, and financial losses.
Steps to Enhance Network Security
Assess Your Current Equipment: Identify the make and model of your networking devices. If you're using TP-Link routers, stay informed about the ongoing investigations and potential bans.
Stay Updated on Firmware: Manufacturers release firmware updates to address security vulnerabilities. Regularly updating your router's firmware is crucial for maintaining security.
Consider Alternative Solutions: If concerns persist, evaluate routers from other reputable manufacturers known for their commitment to security. Brands like Netgear, Linksys, and Asus offer reliable alternatives.
Implement Network Security Best Practices:
Change Default Credentials: Ensure that default usernames and passwords are updated to strong, unique credentials.
Disable Remote Management: Turn off remote management features to reduce potential attack vectors unless necessary.
Enable Network Encryption: Utilize WPA3 encryption to protect wireless communications.
Consult with IT Professionals (like me!): Engage with technology consultants to conduct comprehensive security assessments and receive tailored recommendations.
My Thinking
Two months ago, I suggested in a newsletter that it’d be reasonable to assume the flaws found in Chinese-manufactured routers that Salt Typhoon exploited might exist in TP-Link devices and to consider removing them. Today, I’m a hard remove on TP-Link devices. The Chinese threat seems to be evolving to Cisco devices, implying a broader state-sponsored coordination than just a single vulnerability found in one OEM’s product line.
Take Away
The potential ban on TP-Link routers underscores the importance of proactive network security measures. By staying informed and implementing best practices, small business owners can safeguard their operations against evolving cyber threats.
R
Should I Put my Windows Computer to Sleep?
Deciding between shutting down your Windows computer or putting it to sleep? Understand the benefits of each to optimize your business's efficiency and equipment lifespan.
As a small business owner or manager, you're likely familiar with the daily decision: should you shut down your Windows computer at the end of the day or simply put it to sleep? Each option has its own set of advantages and considerations, and understanding these can help you make the best choice for your business's efficiency and equipment longevity.
Shutting Down: The Complete Power-Off
When you shut down your computer, it closes all running programs and completely powers off the system. This process ensures that all temporary data is cleared, providing a fresh start upon the next boot. Advantages:
Energy Conservation: A shut-down computer consumes minimal to no power, which can lead to energy savings, especially if multiple machines are involved.
System Refresh: Regular shutdowns can help clear temporary files and reset system processes, improving performance.
But there are considerations:
Startup Time: Booting up after a shutdown takes longer than waking from sleep mode, which might slightly delay the start of your workday.
Interruptions: Any unsaved work needs to be saved appropriately before shutdown to prevent data loss.
Sleep Mode: Quick Resumption with Minimal Power
Sleep mode puts your computer into a low-power state, preserving your current session (open applications and documents) in RAM while powering down non-essential components. This allows for a quick resume when you're ready to work again.
Advantages:
Immediate Access: Waking from sleep is almost instantaneous, allowing you to pick up right where you left off without waiting for an entire boot process.
Convenience: There's no need to close and reopen applications, which can enhance productivity, especially during short breaks.
Considerations:
Power Consumption: While minimal, sleep mode does consume some power to maintain the system state in RAM. Over extended periods, this can add up.
Potential Vulnerabilities: In the event of a power outage or battery drain (for laptops), unsaved data could be lost. However, many modern systems have safeguards like hybrid sleep to mitigate this risk.
Hybrid Sleep: Combining the Best of Both Worlds
Some Windows systems offer a "hybrid sleep" option, which combines sleep and hibernation. It saves the contents of RAM to the hard drive (like hibernation) and then enters a low-power state (like sleep). This ensures data preservation even if power is lost, while allowing for a quick resume.
Making the Right Choice for Your Business
The decision between shutting down and sleeping your computer depends on your specific work patterns and priorities:
Short Breaks (e.g., lunch hours): Sleep mode is ideal as it allows for quick resumption of work without needing a complete system restart.
End of Workday: If you won't use the computer until the next day, shutting it down can save energy and provide a fresh start in the morning.
Overnight Tasks: If your computer is set to perform updates, backups, or other maintenance tasks during off-hours, sleep mode (with appropriate settings) or leaving it on might be more suitable.
Additional Considerations
Hardware Longevity: There's a common concern that frequent shutdowns and startups can wear out hardware components. However, modern computers are designed to handle power cycles efficiently, with minimal impact on hardware lifespan.
Security: Shutting down your computer can reduce exposure to certain security risks, as it disconnects the machine from networks and potential threats.
The Argument for Always On — Daily Reboots
I encourage my business clients to leave their Windows PC (desktop) on permanently in High-Performance power mode. In this APM (Advanced Power Management) mode, the Windows machine remains on overnight. I encourage this so that daily processes (Windows updates, reboots for patching, malware and anti-virus scans, backups, and general maintenance) can be performed on the machine overnight. If unable to run during the evening, they’ll try to run during the day, slowing the machine down and may even interrupt the user. In business, we want computers to perform such maintenance while we’re not around.
I also encourage my business clients to get into the practice of restarting their Windows computers every day, usually through the practice of logging off. When performing a restart, the whole system reboots; if done when the user’s leaving work, that reboot can take as long as it needs to, and when the operating system returns, it waits to enter interactive mode; somebody has to log in to it, so it’s secured. This forces a best practice behavior (never leaving applications or files open — restarting closes all files) and secures the machine. It also tackles a problem that Windows computers specifically suffer from: memory leaks.
A memory leak in Microsoft Windows occurs when an application or process fails to release memory it no longer needs, leading to progressively higher RAM usage. Over time, this can slow down the system, cause performance issues, and even lead to crashes as available memory is exhausted. This happens all the time on Microsoft Windows. Memory leaks are often caused by poorly optimized software, driver issues, or long-running applications that continuously consume resources without freeing them. Regular system restarts and software updates can help mitigate memory leaks and maintain optimal performance. Restarting the machine daily helps address memory leaks.
Conclusion
Both shutting down and using sleep mode have their merits, but I’d recommend to anyone: restart your Windows machine when you’re done with it, and leave it on.
For small business owners and managers, aligning your choice with your operational needs and energy efficiency goals is key. By understanding the benefits and limitations of each option, you can optimize your workflow and ensure the longevity of your equipment. But don’t take my word for it. Remember, the best choice is the one that fits seamlessly into your business routine while supporting productivity and sustainability.
R
Do You Need 3rd-Party Anti-Virus Software for Windows 11?
Is Windows 11's built-in security enough for your small business, or should you consider third-party antivirus solutions? Explore the best approach.
If you’re a small business owner, safeguarding your business's data is paramount. Yet you might wonder: Is Windows 11's built-in security sufficient, or should you invest in third-party antivirus software?
Let’s Talk About AV Software
There are all kinds of anti-virus software, and we still need it after 40 years of personal computing because … why? Because the operating system is inherently flawed? The premise that you need a 3rd-party to monitor the holes in something seems hokey.
How effective is something that seems to have a built-in demand fulfillment?
How useful is it if it’s not guaranteed to work by its own EULA (End User License Agreement), and nobody is responsible if it fails?
How important is having a product focusing on a computer when threats have evolved away from personal computers and websites? Email? Phishing, infostealers, and browser hijacking?
How effective is something updated in the scope of days or weeks when the significant flaws strike within hours, creating Zero-Day effects?
Why rely on something that isn’t warranted to work? Why do we shrug off AV solutions that fail?
I’d submit that anti-virus software is a passive, reactionary tool. It’s not a proactive response to viruses (writing and testing good, error-free, safe code). It’s something we hope works. So, first, let’s talk about that: an anti-virus is not a foolproof iron shield. Nobody claims it is — yet they insist we need it.
Instead of a supplemental expense to help give us better confidence in a computing platform’s security, why not choose an operating system with a history of writing and testing good, error-free code? Regretably, that’s not Microsoft Windows.
Linux (Apple’s MacOS and ChromeOS) has a better track record. So, if you’re at all interested in security, you should immediately see that Windows (a 35-year-old operating system distributed with the promise of never having to recompile anything since the 1990s) is the antithesis of secure.
Windows 11's Built-in Security Features
But, if you must run Windows, Windows 11 comes equipped with robust security measures designed to protect your system from various threats:
Microsoft Defender Antivirus: Formerly known as Windows Defender, this built-in antivirus solution offers real-time protection against malware, viruses, and spyware. It operates seamlessly in the background, ensuring your system remains secure without additional installations.
Trusted Platform Module (TPM) 2.0: Windows 11 requires TPM 2.0, a hardware-based security feature that ensures platform integrity by verifying the boot process and protecting encryption keys. This addition enhances protection against firmware and hardware attacks.
Virtualization-Based Security (VBS) and Hypervisor-Protected Code Integrity (HVCI): These features isolate critical parts of the operating system, preventing malicious code from tampering with system defenses.
So long as the user sets a decent password, Windows remains current on its patches, its firewall is activated, and the disk volume is Bitlockered (encrypted), a Windows 11 machine can be trusted with its native security solutions.
Guaranting those state of affairs is the problem without oversight. That’s where Endpoint Management becomes so important.
But viruses aren’t the whole of the security problem.
The Case for Third-Party Antivirus Software
Most modern operating systems (including Windows) have built-in controls that make it difficult to harm the operating system. Security threats, though, have evolved beyond the local operating system. We’re now more at risk of things stealing our information online, from hacks of insecure websites or from aggressors who trick us into going somewhere on the web we shouldn’t.
That’s where 3rd-party products come in.
Advanced Features: Third-party antivirus programs often offer additional functionalities, such as virtual private networks (VPNs), password managers, web filtering, and identity theft protection. These features can provide a more holistic security approach, especially for businesses handling sensitive information.
Specialized Protection: Certain industries or businesses with specific compliance requirements might benefit from the tailored security measures that some third-party solutions provide.
Considerations for Small Businesses
When deciding on your security strategy, consider the following:
Choose the Right Tool: Get down to brass tax. Why continue spending money on flawed software? Choose an operating system with a stronger security and vulnerability remediation track record. Hint: It’s not Microsoft Windows.
Risk Profile: Assess the nature of your business operations. Investing in additional security measures might be prudent if you handle sensitive customer data or intellectual property or have a compliance obligation like HIPAA, FERPA, or GLB.
User Behavior: Educate your team on safe online practices. Human error, such as clicking on phishing links, remains a significant security threat.
System Performance: Some third-party antivirus solutions can be resource-intensive, potentially affecting system performance. Ensure that any additional software integrates smoothly with your existing setup.
There Isn’t a Magic Pill: Anyone who says their anti-virus product solves all problems is lying. There’s no magic pill to fix all ails, and the microcomputer threat environment changes daily. The best security (confidence in our safeguards) comes from a holistic asset management approach beyond paying for a software subscription.
Conclusion
For many small businesses, Windows 11's built-in security features provide a solid foundation against common threats.
However, exploring third-party antivirus solutions could offer additional peace of mind if your business requires advanced security capabilities or operates in a high-risk environment.
Ultimately, the decision should align with your security needs and operational considerations.
What’s good for you? What makes you feel comfortable? We can work out the answers together.
R