Myriad Supply Named One of Inc. Magazine’s Best Workplaces of 2018

New York, NY, May 23, 2018 – Myriad Supply, a cybersecurity consultancy and integrator, has been named one of Inc. magazine’s Best Workplaces of 2018, the publication’s third annual ranking in the fast-growing private company sector.  

“We are honored to receive this recognition that represents what we believe is a critical element to the success of our company: team culture,” said Andrew Fisher, CEO and Founder of Myriad Supply. “We are constantly working towards becoming a more diverse, inclusive, and equitable organization that attracts and supports top performers.”  

The award is the result of a comprehensive assessment of private American companies who have created exceptional workplaces beyond good pay and good perks by providing vibrant cultures, deep employee engagement, exceptional benefits, and leadership that inspires collaboration and teamwork. Out of thousands of applicants, Inc. recognized just under 300 winning companies. This is Myriad Supply’s second year receiving this recognition.  

“By including an employee survey into this year’s Best Workplaces selection process, we’ve really raised the bar. Companies that don’t score at the very top of their peer group don’t make the cut. So, our hats are off to the winners. They all excelled at engaging their workers, making them feel appreciated, and aligning them behind a mission. And remember, that’s not just our opinion: The employees told us that themselves.” says James Ledbetter, Inc. editor-in-chief.  

In the last year, Myriad Supply has implemented Equity, Diversity, and Inclusion (EDI) training, a company-wide coaching platform called 15Five, monthly “Ask Me Anything” sessions with executive leadership members, employee resource groups, and CEO Dine Arounds that provide an opportunity for the CEO to share his vision with small, rotating groups of employees and listen to their thoughts, feedback and ideas over lunch. This recognition from Inc. highlights both Myriad’s rich company culture and its commitment to ensuring employees feel heard, understood, and valued. 

The 2018 Best Places to Work list will be featured in the June issue of Inc. magazine hitting newsstands today and online at www.inc.com/best-workplaces.   

About Myriad Supply
Myriad Supply is a cybersecurity consultancy and integrator focused on providing complete, secure IT infrastructure solutions to enterprises. Using industry-specific knowledge and a security first approach, Myriad helps clients define, design, and implement their technology vision within the areas of security, SDN, mobility, and cloud. Myriad, located in New York City, has been serving clients since 2003. To learn more, visit www.myriadsupply.com or email hello@myriadsupply.com. 

About Inc. Media 
Founded in 1979 and acquired in 2005 by Mansueto Ventures, Inc. is the only major brand dedicated exclusively to owners and managers of growing private companies, with the aim to deliver real solutions for today’s innovative company builders.  Winner of Advertising Age’s “The A-List” in January 2015, and the National Magazine Award for General Excellence in both 2014 and 2012. Total monthly audience reach for the brand has grown significantly from 2,000,000 in 2010 to over 20,000,000 today.  For more information, visit www.inc.com. 

About Quantum Workplace 
Quantum Workplace is an HR technology company that serves organizations through employee engagement surveys, action-planning tools, exit surveys, peer-to-peer recognition, performance evaluations, goal tracking, and leadership assessment. For more information, visit www.quantumworkplace.com. 

Myriad Supply Media Contact:
Kirsten Gonzalez 
Myriad Supply 
646-795-6047 
Kgonzalez@myriadsupply.com 

Stacey Solomon of Myriad Supply Recognized as One of CRN’s 2018 Women of the Channel

New York, NY, May 17, 2018 – Myriad Supply, a leading IT consultancy and integrator, announced today CRN®, a brand of The Channel Company, has named Stacey Solomon, Vice President of Purchasing at Myriad Supply, to its prestigious 2018 Women of the Channel list.

“It’s a great honor to be recognized amongst this group of extraordinary women,” said Stacey Solomon, Vice President of Purchasing at Myriad Supply. “I have had many great opportunities with Myriad and am excited and encouraged to continue this journey in the channel, helping Myriad achieve greatness within the area of cybersecurity.” 

The executives who comprise this annual list span the IT channel, representing vendors, distributors, solution providers and other organizations that figure prominently in the channel ecosystem. CRN editors select the Women of the Channel honorees based on their professional accomplishments, demonstrated expertise and ongoing dedication to the IT channel. 

“This accomplished group of leaders is steadily guiding the IT channel into a prosperous new era of services-led business models and deep, strategic partnerships,” said Bob Skelley, CEO of The Channel Company. “CRN’s 2018 Women of the Channel list honors executives who are driving channel progress through a number of achievements—exemplary partner programs, innovative product development and marketing, effective team-building, visionary leadership and accelerated sales growth—as well as advocacy for the next generation of women channel executives.”   

Solomon joined Myriad in 2010. Over the past 8 years, she has played a critical role in the development of the purchasing department and fostering relationships with a number of distributors. As an integrator and consultancy, the function of the purchasing department is crucial to supporting Myriad’s client offerings. Under Solomon’s lead, the purchasing department has earned the trust of Myriad’s clients and sales team alike through hard work, attention to detail, and their dedication to ensuring purchase orders meet the deadline set forth in client agreements. 

The 2018 Women of the Channel list will be featured in the June issue of CRN Magazine and online at www.CRN.com/wotc 

About Myriad Supply
Myriad is an IT consultancy and integrator focused on providing complete, secure IT infrastructure solutions to enterprises. Using industry-specific knowledge and a security first approach, Myriad helps clients define, design, and implement their technology vision within the areas of security, SDN, mobility, and cloud. Myriad, located in New York City, has been serving clients since 2003. To learn more, visit us at www.MyriadSupply.com or email hello@myriadsupply.com 

About the Channel Company 
The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelco.com  

CRN is a registered trademark of The Channel Company, LLC. All rights reserved.  

Myriad Supply Media Contact:
Kirsten Gonzalez
Myriad Supply
646-795-6047
Kgonzalez@myriadsupply.com 

The Channel Company Contact:
Kim Sparks
The Channel Company
(508) 416-1193
ksparks@thechannelco.com  

UCaaS vs. UC: Keeping Up in The Modern World

Unified Communications (“UC”) and Unified Communications as a Service (“UCaaS”) are terms that have been widely overused in the tech industry, leading to confusion in the marketplace around what the terms mean, how they differ, and the benefits they bring to an organization.   

Unified Communications refers to premise-based systems which provide the integration of real-time communication tools such as IP telephony, conferencing/collaboration, instant messaging & presence (IM/P), email with voicemail (UM), and additional communication applications (e.g. contact center, SMS, MMS, etc.) into a single cohesive solution.  Unified Communications as a Service provides the same functions of its premise-based compadre, but in a cloud-based deliver model.   

Just confusing enough, right?  Let’s remove the technology aspect and compare it to how we watch movies…  

A long time ago in a galaxy far, far away, when people wanted to have a movie night, they would have to go to Blockbuster to rent or buy the VHS.  This required time to go to/from the store, a VHS player at our homes to play the movie, and there was a cost tied to each rental.  Archaic, right?  Thankfully, technology didn’t stay stagnant, and we moved from VHS to a better technology: DVDs! But wait—that disk won’t play on the machine we purchased not too long ago and works fine… Well, if you wanted to keep up with the times, you had to buy a new machine.  Then we moved from DVD to BluRay, and people thought, “What do you mean this disc isn’t compatible? It looks and feels the same!” It became time to shell out more money on another machine, which may have even caused a need to buy a new entertainment system to hold all three systems.   

Let’s fast-forward our way out of the Stone Age to modern day.  We have grown accustomed to our movie nights or binge-watching our favorite TV series being nothing more than a few clicks of a button away.  We don’t feel obligated to sit through 100 minutes of pain watching Caddyshack II because we paid to rent it and it’s due back tomorrow; we pay a flat monthly fee to gain access to endless options and the luxury of being able to pick a show back up from where we left off a month ago.  The physical machine no longer dictates what we can/can’t watch, nor does the format of the movie necessitate ongoing expenses; our only “worry” is how big of a screen we can it watch on. 

Believe it or not, this isn’t one long advertisement for “Netflix and Chill”—the importance of the necessity of constantly adapting in order to consume and utilize the best technology out there is just as relevant now as it was thirty years ago. When it comes to UCaaS vs. UC, it boils down to the consumption model and which one makes the most sense for an organization.  We live in a world where the only constant is change and the pace of change is increasing by the minute.  By adopting cloud-based, UCaaS solutions, organizations are able to increase their agility and ability to keep up with advancements in technology as they come by removing the constraints that legacy, on-premise, systems have imposed for years.  If you don’t agree, we respect your opinion and would love to discuss further— can you meet next at the local Blockbuster next week? 

Ransomware is A Real Threat

Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries. We’ve all heard stories describing the severe impacts organizations face after being targeted by ransomware. Ransomware is a big business for organized crime rings and, as some suspect, even state-sponsored agencies. According to industry experts, it’s estimated ransomware ransacked $1B in 2016. Money, personal files, and data aren’t all that’s at risk—when a hospital gets infected by ransomware and is unable to treat patients, it can be a life or death situation.  

What are the effects of ransomware? 

Beyond extortion (paying a ransom to regain access to infected systems), viruses and malware can impact productivity and lead to loss of revenue due to outage or employees not having access to systems. This highlights the importance of backups at home and in the business. Imagine losing all your precious family photos if your home computer gets infected. Now imagine your photos are an organization’s financials, client information, or patient data. That collateral is a big deal to your business, not just for productivity, but because the impact to your company’s reputation can have financial impacts that last longer than the settlement from a lawsuit or fines imposed by governing bodies.  

How does malware infect an organization? 

Companies are faced with the challenge of how to secure their resources from malware and viruses coming from different attack angles called “threat vectors.” Attacks can infiltrate an organization via websites, email, network, and remote/mobile workers. Sometimes an attack can be caused by something as seemingly innocuous as users bringing in a laptop from home or plugging a USB drive into the corporate network.  To prevent attacks from these different vectors, it’s necessary to secure internal resources from the inside out and the outside in. The question becomes: how do you protect your network from your own employees? 

What can an organization do to prevent attacks? 

Malware and viruses are constantly evolving, so there isn’t a sole, one-step solution that protects everything. Without layers of security, segmentation, authentication, blocking, visibility, and alerting, any user can gain access to the network and malware can spread from device to device without anyone knowing. For these reasons, automated blocking and a rapid time-to-detection are important. 

There are many ways an organization can be alerted of a security problem before it’s too late. The key is identifying what the threat vectors are and having a plan in place to address them. A great and easy first layer of defense companies can very easily add is DNS protection. DNS protection can automate the blocking of malicious known links/websites via the web or email and is a great/simple first layer of defense customers can add to their network without much effort. This service is offered as a cloud-based subscription service with 1, 3, and 5-year licenses. 

Ultimately, a layered approach is the best defense. Firewalls, email protection, DNS protection and endpoint protection are all great tools for visibility and alerting. Many use user behavior analytics and artificial intelligence (AI) to flag zero-day threats. A zero-day threat is a new malware or virus which firewalls don’t yet have definitions or signatures to identify and block, hence the name “zero day” – day one is when the threat is first recognized. A layered approach which includes regular updates to your computers, intelligence to uncover current and emerging threats, visibility across all devices and ports (anywhere), and power to block (stop phishing, malware, and ransomware) early on is critical, as they make the job of the cybercriminals targeting your company and network harder and the economics less attractive. 

Myriad Debuts Employee Resource Groups 

Myriad is excited to announce the creation of ERGs (Employee Resource Groups). A tool utilized by many companies, we are proud to offer the opportunity to participate in these spaces to our employees. 

What is an ERG? 

Employee Resource Groups (ERGs) are voluntary, employee-led groups that act as both a social network and a think-tank. They help ensure a workplace environment is inclusive and aligned with the company’s mission and values, strengthen the voices of employees, and harness the power of diverse thinking and affirming employees’ identities to maintain an open and understanding environment. 

What are Myriad’s ERGs? 

Currently, there are two ERGs at Myriad: The Rainbow Alliance, and The Cultural Collective (and coming soon is Women’s Empowerment!). Myriad is an inclusive workplace and encourages support and empowerment to all employees, as well as open discussion surrounding topics surrounding a common ground (gender expression, cultural background, etc.) to make Myriad an even better workplace. ERGs are open to all employees regardless of how they identify—the more the merrier!  

What are some of the things ERGs do? 

The types of activities ERG participants at Myriad mainly fall into three categories: internal discussions, social events (everything from movie screenings to dance lessons!), career advancement (networking, peer-to-peer mentorship) and volunteerism within the NYC community. For instance, the Cultural Collective plans on attending youth-centric panels and creating partnerships with non-profits aimed at underrepresented groups in tech. Next month, the Rainbow Collective will be volunteering with SAGE, the country’s largest organization dedicated to improving the lives of older adult members of the LGBT community via health and wellness, employment assistance, housing, and more by serving meals to the elderly. 

Why are ERGs important? 

ERGs create a platform for connection amongst team members who share common interests and goals, help foster a more caring, aware and respectful community, and are a resource for Myriad leadership when it comes to issues, policies, and employees’ needs. An open forum where people can meet and support one another is essential to creating or maintaining a work environment that fosters employee satisfaction, leadership, and career advancement. 

Myriad values diversity and equality. Plus, we’re always growing! As well as supporting current members of the team, we’re happy to have ERGs serve as informal welcome to new employees by offering the chance to network and mentor. Join us! 

3 Takeaways for the KRACK WPA2 Vulnerability

WiFi Security and WPA2

Over the last 48 hours security researchers have discovered new weaknesses in the WPA2 Wi-Fi security protocol which could allow hackers to steal sensitive info or even inject malware into networks and network devices, with mobile devices being particularly vulnerable due to the proliferation of native apps which may not implement app-level encryption.  

As stated on KrackAttacks, the weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. 

The attack works by focusing on the four-way handshake used by WPA2 to confirm that client and access point have the correct network password and to negotiate a new encryption key to be used to encrypt all subsequent traffic. 

To prevent the attack, users must update affected products as soon as security updates become available. 

1. There is no silver bullet for cyber threat prevention; nothing is secured forever. Vulnerabilities will always await discovery and be subject to exploitation. Developers call them “bugs”, but we must all learn to speak the same language, and adopt a holistic layered approach.

2.  SANS Institute describes the term layered security as “a defensive strategy featuring multiple defensive layers that are designed to slow down an attacker”. The military uses similar tactics called “deep defense” or “defense in depth,” where their goal is to slow an attack, causing enemy casualties. In the digital world, this means causing delays for the attackers and detecting them before they can do serious damage. In some cases, a properly implemented layer may act as a strong enough deterrent to cause the attacker to look for an easier target.

3. Although an attacker may gain wireless access into your network, a layered security approach will ensure that the hole discovered can’t be exploited. By adhering to best practices like keeping systems patched and updated, implementing user roles and group policy, having end-to-end network segmentation in place to limit the spread of malware and free reign of bad actors, utilizing multi-factor authentication (MFA), securing data with data at rest and in-flight encryption, and taking advantage of app-level encryption where possible. 

If you’d like to discuss the threat landscape and how things like this WPA2 crack happen, best practices for adopting a holistic security approach, or the unique challenges inherent to your business, please reach out to me directly. We’re here to help.