[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″ background_image=”https://www.mdsny.com/wp-content/uploads/2017/05/sec-pol.jpg” custom_padding=”0px|0px|0px|0px” custom_css_before=”content:%22%22;||display: block;||height: 100%;||position: absolute;||top: 0;||left: 0;||width: 100%;||background-color: rgba(58, 60, 69, .6);”][et_pb_row custom_padding=”0px|0px|70px|0px” admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” column_structure=”1_3,2_3″][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][/et_pb_column][et_pb_column type=”2_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_divider show_divider=”off” disabled_on=”on|on|off” admin_label=”Divider” _builder_version=”3.23.4″ height=”200px”][/et_pb_divider][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Sans||||” text_text_color=”#ffffff” text_font_size=”72″ text_line_height=”1.1em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”620px” custom_margin=”0px||0px|” text_font_size_tablet=”52″ text_font_size_last_edited=”on|tablet”]

How to Secure Your Backup from Ransomware

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|desktop” admin_label=”Section” _builder_version=”3.22″ background_color=”#f7f7f4″ custom_padding_tablet=”50px|0|50px|0″ padding_mobile=”off”][et_pb_row custom_padding=”0px|||” padding_mobile=”on” column_padding_mobile=”on” admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” column_structure=”1_3,2_3″][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Sans||||” text_text_color=”#323232″ text_font_size=”10em” text_line_height=”1.1em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”0px||0px|”]

1

[/et_pb_text][et_pb_divider color=”#aeaeac” admin_label=”Divider” _builder_version=”3.2″ custom_css_main_element=”width:20px;” hide_on_mobile=”off”][/et_pb_divider][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Sans|on|||” text_text_color=”#363636″ text_font_size=”18″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”-10px||0px|”]

June, 2017

[/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Sans||||” text_text_color=”#02b875″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”20px|||”]

Cyber Security

Ransomware

Backup

[/et_pb_text][et_pb_image align_tablet=”center” align_last_edited=”on|desktop” admin_label=”Image” _builder_version=”3.23″ animation_style=”slide” animation_direction=”left” animation_duration=”500ms” animation_intensity_slide=”10%”][/et_pb_image][et_pb_button button_url=”https://www.mdsny.com/choosing-the-best-backup/” button_text=”AirGap Your Backup” button_alignment=”center” admin_label=”Button” _builder_version=”3.16″ custom_button=”on” button_text_color=”rgba(0,0,0,0.74)” button_border_radius=”20px” button_icon=”%%228%%” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_button][et_pb_blurb url=”https://www.mdsny.com/contact” use_icon=”on” font_icon=”%%95%%” icon_color=”rgba(0,0,0,0.66)” admin_label=”Blurb” _builder_version=”3.0.74″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][/et_pb_blurb][/et_pb_column][et_pb_column type=”2_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Serif||||” text_text_color=”#363636″ text_font_size=”24″ text_line_height=”1.4em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”620px” custom_margin=”10px||0px|” text_font_size_last_edited=”on|tablet”]Securing your backups from ransomware is not always a one size fits all solution. There are numerous approaches to take. Here we outline the most effective methods in keeping your backups free from infection.
[/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Serif||||” text_text_color=”#363636″ text_font_size=”20″ text_line_height=”1.5em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”620px” custom_margin=”30px||0px|” text_font_size_last_edited=”on|tablet”]

Part I: Air Gaping

Air Gaping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. By physically isolating a computer or local network of computers from the internet, you add an extra layer of protection. Systems such as classified military networks, nuclear power plant controls, medical equipment, and avionics all use Air Gap. Dispite this separation there are examples of attacks successfully jumping the air gap and infecting a system, such as Stuxnet (a U.S. and Israeli military-grade piece of malware that attacked the Natanz nuclear plant in Iran) or agent.btz, possibly Chinese in origin, which successfully jumped the air gap protecting the U.S. military networks. Bruce Schneier, a security technologist who has worked with Snowden’s NSA files lays out ten rules for maintaining a single air-gapped computer in an article he wrote for Wired.com.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”50px|||” custom_padding_tablet=”17px|||” padding_mobile=”on” column_padding_mobile=”on” custom_padding_last_edited=”on|tablet” admin_label=”Row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://www.mdsny.com/wp-content/uploads/2017/05/air-gap-ft2.jpg” show_bottom_space=”off” align_tablet=”center” align_last_edited=”on|desktop” admin_label=”Image” _builder_version=”3.23″ animation_style=”fade” animation_duration=”500ms” animation=”fade_in” sticky=”on”][/et_pb_image][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Serif||on||” text_text_color=”#363636″ text_font_size=”12″ text_line_height=”1.2em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”6px|||”][/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”0px|||” padding_mobile=”on” column_padding_mobile=”on” admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” column_structure=”1_3,2_3″][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_cta title=”How to set up a proper repository security policy” button_url=”https://www.mdsny.com/choosing-the-best-backup/” button_text=”Speak To an Expert” admin_label=”Call To Action” _builder_version=”3.16″ header_letter_spacing=”2px” header_line_height=”1.2em” background_color=”#267cc1″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” border_width_all=”2px” border_color_all=”#0c71c3″ border_style_all=”groove” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_border_radius=”13px” button_icon=”%%258%%” custom_margin=”43px|||” custom_padding=”20px||53px|” custom_css_main_element=” border-radius: 25px;||” use_border_color=”on” border_color=”#0c71c3″ border_width=”2px” border_style=”groove” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_cta][/et_pb_column][et_pb_column type=”2_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Serif||||” text_text_color=”#363636″ text_font_size=”20″ text_line_height=”1.5em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”620px” custom_margin=”5px||0px|” text_font_size_last_edited=”on|tablet”]

Part II: Proper security policies on repository

In many attacks, company user accounts are targeted. Most backups are configured to use a User account (john.doe) instead of a service account (Veeam_service). When the user account is hacked, there exists a possibility for the backup to become compromised using those same credentials. One way to avoid this vulnerability is to use a service account or even to use a different operating system for your backup repository. For example, if you use a Linux based repository, you will need to create an account that is able to write to the directory. Next, you will setup that account in your backup software to do the reading/writing. This prevents access to your backup repository even though the Windows account was compromised.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”50px|||” padding_mobile=”on” column_padding_mobile=”on” admin_label=”Row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_divider color=”#aeaeac” admin_label=”Divider” _builder_version=”3.2″ hide_on_mobile=”off”][/et_pb_divider][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Serif||||” text_text_color=”#363636″ text_font_size=”48″ text_line_height=”1.3em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” max_width=”900px” module_alignment=”center” custom_margin=”16px||30px|” text_font_size_tablet=”38″ text_font_size_last_edited=”on|tablet”]

“One way to avoid this vulnerability is to use a service account … for your backup repository.”

[/et_pb_text][et_pb_divider color=”#aeaeac” admin_label=”Divider” _builder_version=”3.2″ hide_on_mobile=”off”][/et_pb_divider][/et_pb_column][/et_pb_row][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” column_structure=”1_2,1_2″][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Serif||||” text_text_color=”#363636″ text_font_size=”20″ text_line_height=”1.5em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”620px” custom_margin=”5px||0px|” text_font_size_last_edited=”on|tablet”]

Part III The 3-2-1-1-0 Method:

  • Three different copies of data;
  • Data spread across two different media;
  • One copy of the media off-site;
  • One copy of the media offline; and
  • No errors after a backup recoverability verification.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_code][/et_pb_code][/et_pb_column][/et_pb_row][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://www.mdsny.com/wp-content/uploads/2017/06/The-3-2-1-1-0-Method_clipped_rev_1-1.png” force_fullwidth=”on” align_tablet=”center” align_last_edited=”on|desktop” admin_label=”Image” _builder_version=”3.23″ animation_style=”slide” animation_direction=”left” animation_duration=”500ms” animation_intensity_slide=”10%”][/et_pb_image][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”17px|||” padding_mobile=”on” column_padding_mobile=”on” admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” column_structure=”1_3,2_3″][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”https://www.mdsny.com/wp-content/uploads/2017/05/cropped-mds.png” show_in_lightbox=”on” admin_label=”Image” _builder_version=”3.23″ max_width=”140px” custom_margin=”36px||0px|” animation_style=”slide” animation_direction=”left” animation_duration=”500ms” animation_intensity_slide=”10%” always_center_on_mobile=”off”][/et_pb_image][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Serif||on||” text_text_color=”#363636″ text_font_size=”16″ text_line_height=”1.1em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”140px” custom_margin=”16px||0px|”][/et_pb_text][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Serif||on||” text_text_color=”#363636″ text_font_size=”12″ text_line_height=”1.2em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”140px” custom_margin=”6px|||”]

Marc Lande
marc.lande@mdsny.com

 

[/et_pb_text][/et_pb_column][et_pb_column type=”2_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Serif||||” text_text_color=”#363636″ text_font_size=”20″ text_line_height=”1.5em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”620px” custom_margin=”30px||0px|” text_font_size_last_edited=”on|tablet”]

While all these methods will certainly decrease your chances of getting caught with a ransom, this is not an end all cure all for ransomware. Like many infections of the real world, ransomware has the ability to “mutate” and evade our defenses so new methods to combat these attacks are always in development. One of the best ways to prevent an attack is to have a dedicated security procedure in place. Maureen Data Systems can help you design and implement a security procedure to protect your data. Contact a member of our team today to get started on your security solution.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Section” _builder_version=”3.22″ custom_padding=”0px|0px|0px|0px”][et_pb_row padding_mobile=”off” column_padding_mobile=”on” admin_label=”Row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width=”780px” use_custom_width=”on” custom_width_px=”780px”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”3.0.74″ text_font=”PT Serif||||” text_text_color=”#363636″ text_font_size=”36″ text_line_height=”1.4em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” module_alignment=”center” custom_margin=”||70px|” text_font_size_tablet=”26″ text_font_size_last_edited=”on|tablet”]

Want new articles before they get published?
Subscribe to our Awesome Newsletter.

[/et_pb_text][et_pb_contact_form captcha=”off” email=”contactus@mdsny.com” admin_label=”Contact Form” module_id=”et_pb_contact_form_0″ _builder_version=”3.0.87″ custom_button=”on” button_text_color=”#ffffff” button_bg_color=”#02b875″ button_border_width=”8″ button_border_color=”#02b875″ button_border_radius=”4″][et_pb_contact_field field_id=”E-mail Address” field_title=”E-mail Address” _builder_version=”3.23″ form_field_background_color=”rgba(0,0,0,0)” form_field_text_color=”#adadab” form_field_font=”PT Sans||||” form_field_font_size=”20″ form_field_line_height=”1.4em” border_radii=”on||||” border_width_all=”1″ border_color_all=”#adadab” border_style_all=”solid” form_field_font_size_tablet=”20″ form_field_font_size_phone=”20″ form_field_line_height_tablet=”1.4em” form_field_line_height_phone=”1.4em” custom_css_main_element=”height:64px;” use_border_color=”on” border_color=”#adadab” border_width=”1″ border_style=”solid” field_background_color=”rgba(0,0,0,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_contact_field][et_pb_contact_field field_id=”First Name” field_title=”First Name” _builder_version=”3.23″ form_field_background_color=”rgba(0,0,0,0)” form_field_text_color=”#adadab” form_field_font=”PT Sans||||” form_field_font_size=”20″ form_field_line_height=”1.4em” border_radii=”on||||” border_width_all=”1″ border_color_all=”#adadab” border_style_all=”solid” form_field_font_size_tablet=”20″ form_field_font_size_phone=”20″ form_field_line_height_tablet=”1.4em” form_field_line_height_phone=”1.4em” custom_css_main_element=”height:64px;” use_border_color=”on” border_color=”#adadab” border_width=”1″ border_style=”solid” field_background_color=”rgba(0,0,0,0)” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][/et_pb_contact_field][/et_pb_contact_form][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ use_custom_gutter=”on” gutter_width=”2″ parallax_method_1=”off” parallax_method_2=”off” parallax_method_3=”off” admin_label=”Text” module_class=” et_pb_specialty_fullwidth” _builder_version=”3.22″ background_color=”#8d8c91″ inner_width_tablet=”80%” inner_width_last_edited=”on|desktop” inner_max_width_tablet=”80%” inner_max_width_last_edited=”on|desktop” custom_padding=”0px||0px|” make_fullwidth=”on” global_module=”119343″][/et_pb_section][et_pb_section fb_built=”1″ inner_shadow=”on” admin_label=”Blurb” module_class=” et_pb_specialty_fullwidth” _builder_version=”3.22″ background_color=”#2d3743″ inner_width_tablet=”80%” inner_width_last_edited=”on|desktop” inner_max_width_tablet=”80%” inner_max_width_last_edited=”on|desktop” custom_padding=”37px|0px|19px|0px” make_fullwidth=”on”][et_pb_row custom_padding=”37px|0px|19px|0px” admin_label=”row” module_class=” et_pb_row_fullwidth” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” width=”89%” width_tablet=”80%” width_last_edited=”on|desktop” max_width=”89%” max_width_tablet=”80%” max_width_last_edited=”on|desktop” make_fullwidth=”on” column_structure=”1_2,1_4,1_4″][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb image_max_width=”none” admin_label=”Blurb” _builder_version=”3.0.74″ header_font=”Droid Sans||||” header_text_color=”#d1d1d1″ header_font_size=”26px” body_font=”Droid Sans||||” body_text_color=”#dfdfdf” body_font_size=”16px” background_size=”initial” background_position=”top_left” background_repeat=”repeat” background_layout=”dark” inline_fonts=”Droid Sans”]

Our Pledge:

Building out and maintaining your IT ecosystem doesn’t have to be a do-it-yourself project. MDS can help identify network issues, configure devices, and optimize your infrastructure to maximize efficiency and performance.

Our consultants are highly trained technology specialists that understand the complexities of multi-vendor environments and have the knowledge and skills to help your business become more agile, customer-focused and operationally efficient.

 

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb image_max_width=”none” admin_label=”Blurb” _builder_version=”3.0.74″ header_text_color=”#d1d1d1″ header_font_size=”26px” body_font=”Droid Sans||||” body_text_color=”#dbdbdb” body_font_size=”16px” background_size=”initial” background_position=”top_left” background_repeat=”repeat” background_layout=”dark”]

Upcoming Events:

Extending and Enhancing Office 365 with Citrix

Webinar: Protecting Your Mobile Device From a Cyber Security Attack

 

 

 

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb image_max_width=”none” admin_label=”Blurb” _builder_version=”3.0.74″ header_text_color=”#d1d1d1″ header_font_size=”26px” body_font=”Droid Sans||||” body_text_color=”#dfdfdf” body_font_size=”16px” background_size=”initial” background_position=”top_left” background_repeat=”repeat” background_layout=”dark”]

Contacts:

NYC Headquarters:
307 West 38th Street, Suite 1801
New York, NY 10018
Tel: 646-744-1000

Miami Office:
Tel: 786-899-2980
San Juan Office:
Tel: 787-0620-9823

Email:
contactus@mdsny.com 

[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section]