Article

Data Backups: Simple Way to Take Care of Your Data

For most business, the result of a sudden and immediate loss of data would be devastating. Yet data backups are probably one of the most neglected aspects of data management for many businesses. Let’s begin with a simple question: How important your data is to you? Think of all the information you have in your computers – all your databases, spreadsheets, documents, files, projects, emails, software – and think of how valuable they are to your business. Now try to imagine it all disappearing in an instant. What would happen to your company? What would you say to your clients? You’d have to start from scratch – and would you even have the capability to do so right away? For most business – if not all – the result of a sudden and immediate loss of data would be devastating. Operations would be crippled, and productivity would grind to a halt. Many businesses rely on soft data and losing that data, simply put, prevents them from working on anything – at least until the data can be recovered or the system goes up again, and in some cases, they’d have to start from scratch again. The difficulty of starting with virtually nothing is obvious. Things look a little brighter when a company goes the data recovery route, but the effects are just as debilitating to daily operations. For one thing, data recovery is not an exact science. Sometimes, if you’re lucky, all the data can be recovered, but many just a few tidbits of it can be retrieved, and sometimes you might get nothing at all. To top that off, data recovery is a long and expensive procedure, especially if you have a lot of data. What is the solution then? Simple: back up your data. Data backup services are much cheaper than data recovery services, and if you lose your data, you have something solid and reliable to fall back on. Data backups are probably one of the most neglected aspects of data management for many businesses these days – but it is also one of the most essential ones. Some companies think that it’s a waste of time and resources. But in the long term not only do you pay a fraction of the cost of data recovery to have your information backed up, you also prevent your business from suffering if you lose everything. You never know what events might happen that compromise you data. Natural disasters, accidents, and simple hardware failure can occur when you least expect it to, so it is only prudent and it’s responsible to make sure that your data is safely backed up. Talk to us – we’ll help you find the backup solution that’s right for your business.

Data Backups: Simple Way to Take Care of Your Data Read More »

New Viruses Infiltrate Systems through USB Drives

Two new viruses have been discovered to infiltrate systems through removable drives. USB flash drives have become indispensable to almost everyone who uses a computer. It’s a quick and easy way to immediately transfer and share information and other data, especially files that are too large to send through email. Unfortunately, some malware take advantage of this convenience by attaching themselves to files on the drive to infect any other system it comes into contact with. Two such malware have recently been discovered. Chymine is a Trojan application with keylogging capabilities, designed to copy passwords and other sensitive data, and Dulkis-A is a Visual Basic worm designed to copy and allow malware to infiltrate the system. Both exploit a vulnerability in Windows Shell. Microsoft has yet to directly address the issue and provide a patch that fixes the problem. In the meantime, they have issued directions for a workaround that prevents both malware from manipulating the Windows Shell susceptibility. The workaround is effective for Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server R2, but it comes with a cost – you lose all your icon graphics. Success in removing the virus has been marginal at best, with current fixes including a warning that removing these malware might result in unwanted changes to your system because of the way the virus embeds itself. The best way to avoid being infected, be careful not to run any suspicious programs and files, especially when taken from USB drives and any other removable storage, even from a Blackberry or an iPhone. It’s also best to avoid automatically enabling USB devices to autorun once they’re plugged into your computer. If you have any concerns or want to make sure your systems are protected, give us a call and we’ll work with you to ensure the security of your systems and data.

New Viruses Infiltrate Systems through USB Drives Read More »

Before Moving Your Business to The Cloud…

Before you entrust your sensitive data to a “cloud” service provider, make sure you weigh the risks with the benefits. “ Cloud computing ,” largely synonymous with Internet-based computing, has become a hot topic of discussion among many in the business community, with its promise of radically simplifying the access to, and use of, computing resources on demand. It’s no wonder then that it’s been small businesses, often without full-time IT resources of their own, that have been the first to adopt the concept. As a business owner, however, before you start moving critical data to the “cloud,” you’ll do well to bear in mind the risks that come with the computing model. First is security and privacy—ask how the service provider ensures the confidentiality and integrity of your data while in their care. Do they provide backups? Can you back up your data yourself? Are their security processes and procedures reviewed and vetted by a third party? Next is availability. Do they guarantee the uptime of their services—7 days a week, 24 hours a day? Do they provide a service level guarantee? Do they have processes in place to handle exceptional circumstances that can disrupt services, such as a natural disaster? Is support readily available to help in case you encounter any issues? Finally, there’s cost. While pay-as-you go can be attractive, the total cost over time can add up. It’s worth thinking two to three years out and considering the total cost versus alternatives. Asking these basic questions can go a long way in giving you peace of mind before you entrust your valuable data and core business systems to the care of others. If you’d like some help sorting all this out and making the best decision for your unique needs, give us a call.

Before Moving Your Business to The Cloud… Read More »

How Much is Your IT Worth To You?

Having an efficient IT system is one way a business can improve productivity and earn more. But IT technologies are constantly changing and upgrading, and those who don’t keep up can lose money in the process. In this day and age, few businesses (if any) can survive without an IT arm. Every business, big or small, needs someone, or preferably a group of people, on hand to fix computer problems, check networks, monitor software – to generally make sure that their operations are running smoothly. One question, though: have you ever stopped to consider whether the cost of maintaining your in-house IT system is worth it? For instance, consider your internet connection. Let’s say that a conservative estimate of the efficiency of your business without an internet connection is at 50%. And if your business makes a $1 million a year, then $500,000 depends on your internet connection. If your monthly bill for that connection is $500, or $6,000 annually, you earn $500,000 – $6,000 = $494,000. Now, if you decide to switch to a cheaper DSL connection, which is about $50 per month or $480 a year, you get a much higher figure: $499,520. You could argue that the DSL is the wiser option, but when you look at a deeper level, a slower internet connection may also hamper your company’s productivity – let’s say, by 10%. So with only a DSL connection, your business operates at 90% of its total possible productivity. Considering the previous figures, a loss of 10% in productivity means a loss of $100,000. Subtract that savings from the DSL connection, $5,520 – you get a whopping loss of $94,480. So when you think you’re saving by getting a cheaper internet connection, you are actually losing more money. Inversely, if you subscribe to an even better connection that costs you $10,000, productivity can increase by $15,000. The same principle applies when your IT infrastructure is not up to date, with slow computers, outdated software, and other problems. In a company with 10 employees who bring in an annual average of $65,000 each, even losing productivity for just 35 minutes a day due to IT handicaps can cost you $47,000. Hardly chump change! But hiring an IT provider who charges $20,000 a year can offset that lost productivity and even make your business run better, by as much as $27,000. It’s also noteworthy to mention that employing an IT firm can count as a legitimate business expense, thereby lowering your tax liability to about $8,000 if you peg corporate tax at 40%. IT is important to a business. If you doubt that, just try doing without it for a week – just shut the whole thing down. For most, that’s out of the question, but operating with old software and hardware is almost just as bad. However, many businesses cannot spare the resources to continually upgrade their IT systems. Enlisting the services of an IT firm changes all that. IT Service Providers are constantly on the lookout for better technologies – both hardware and software – that can make your business function much more efficiently and cost effectively. It’s what they do. And the costs are minimal. If you’re wondering how much better your company might operate with an IT Service Provider, we’ll be happy to sit down with you and run some numbers.

How Much is Your IT Worth To You? Read More »

Help Save the Planet – and Save Money, Too

Making your business greener isn’t only good for the environment, but can also help your business become much more cost effective too. There’s been a lot of buzz about environmental issues such as climate change, and with the effects reaching everyone around the world, we all need to do our part to help. The good news is that going green in your office or business can also help you become more cost effective. Here’s how: Shut down your system when it’s not being used. The principle behind this is pretty simple – you can save electricity and the bills you’ll have to pay with a simple system that can power down when it’s not being used. Downsize your infrastructure. You’ll save on bills and power consumption, as well as equipment. Determine the workstations that can be run on a skeletal system, with the heavy lifting done virtually or remotely. This is especially applicable to companies that have people frequently on the road or in the field. Also, if you let people work from home or remotely, there is little need to maintain a vast infrastructure at the home office. Go for a paperless office. Paper comes from the cutting down of thousands of trees, and buying it costs money. But these days with almost everything done electronically, paper use can be reduced to a minimum, if not eliminated completely. Turn your trash into gold. If you have old units you’re going to throw out but are still in working condition, consider donating them to charity and get a tax break. Or, try to recycle them. E-waste is becoming a big problem these days, so the less you throw away, the better. If you’d like to know more about how to make your business more cost effective and environment friendly at the same time, we’d be happy to talk with you and draw up a plan that’s specifically suited to your needs.

Help Save the Planet – and Save Money, Too Read More »

Social Engineering a Threat to Business Security

The security of your organization is not only threatened by malware, hacks, and network attacks, but also attacks via a technique called “social engineering”. Be aware that hackers have another tool in their toolset that employs a particularly subtle, insidious way of compromising the security of your systems and network. Called social engineering , it’s the use of psychological tricks to deceive targets into revealing potentially compromising information about the systems in their organization. In practice, it can be as simple as a hacker calling an employee and asking subtle questions to gain information, or posing as someone trusted, perhaps as building maintenance, walking in the doors of an organization to directly gain access to systems—or even searching through the trash and refuse left behind by employees. The popularity of social networking has also increased the danger with the ease and convenience of creating connections to potentially trusting members of your organization. However, there are some actions you can take to protect your business: Create a policy outlining the proper handling and sharing of information online as well as offline. Put systems and procedures in place to protect your systems if sensitive information does get out—such as the regular replacement of passwords. Educate your employees about the threat. You cannot solve a problem if your people do not know that a problem exists in the first place. Awareness can be your best defense.

Social Engineering a Threat to Business Security Read More »

Mozilla Firefox Releases Fixes for Several Major Security Holes

Mozilla implements new initiatives to ensure the security of its browser to fix the main security holes, and this brings Firefox’s latest version to 3.6.7 The Mozilla foundation, the organization behind the Firefox browser, announced recently that it has released a patch to fix many major security holes found in its software, as well as the pull out of malicious add-ons in its extensions gallery. A new update brings Firefox’s latest version to 3.6.7, and includes fixes for nine critical issues that could potentially be exploited by hackers to launch attacks on vulnerable systems. This comes after recently pulling out a password stealing add-on called the “Mozilla Sniffer” in the Firefox extensions gallery. As a preventive measure, the Mozilla foundation has announced a US $3,000 security bounty program that for anyone who finds an eligible security bug. It has also announced that it will implement a source code review of add-ons to catch potential malware that could be injected into otherwise patched Firefox browsers. As always, users are advised to be constantly on guard and to make sure they are using the latest updated versions of their software. Customers under our Managed Security program benefit by letting us do the worrying and updating for them, so they can focus on their business instead of their security. Not on our Managed Security program? Contact us today.

Mozilla Firefox Releases Fixes for Several Major Security Holes Read More »

Common Vulnerabilities in Many Common Applications Still Exploited by Hackers

The continued exploit of many vulnerable applications that have been fixed by vendors for over a year highlight the need to keep software updated with the latest versions and patches. A new report released by security firm M86 Security reveals a trend toward more sophisticated forms of malware in taking advantage of vulnerabilities in common software applications and developing techniques to avoid detection. In M86’s report, among the applications commonly exploited are Microsoft’s Internet Explorer and Adobe Reader. Another vector for malware that hackers have been using recently is Java and Adobe’s Flash—which are installed on many PCs, often as plug-ins to most browsers. Although the vulnerabilities in these applications have been identified and patched for over a year, failure to keep up with the latest updates have made many systems still vulnerable to attack. Our customers taking advantage of our Managed Security need not worry, since we make sure our customers’ systems are patched as soon as updates become available. Find out more about our Security Offerings today.

Common Vulnerabilities in Many Common Applications Still Exploited by Hackers Read More »

Increasing Adoption of Mobile Devices Presents Opportunity for Businesses

Despite the clear trend towards greater adoption of mobile devices by businesses and consumers, a new study finds that many businesses are not taking full advantage of the opportunities created by this trend—especially in sales and marketing. Global smartphone shipments continue to rise, driven by operator subsidies, lower barriers to adoption with the introduction of lower-cost models, and greater choices afforded by vigorous competition from companies such as Apple, RIM, Microsoft, and Google. Not far behind is the rising interest and adoption of other mobile devices, such as tablets with the success of Apple’s iPad. Despite this trend, a new study by eROI , an online marketing agency, finds that many businesses are not taking full advantage of the opportunities it creates—especially in sales and marketing. The company surveyed 500 businesses, and the majority cited lack of resources and little understanding of what needs to be done as the major barriers to capitalizing on the trend. This, despite findings which show 91 percent of the population use mobile devices, with 23 percent using smartphones that make extensive use of online services. Companies would benefit from looking at how these trends can be leveraged for building a strategy toward reaching new customers, engaging current customers, and creating rich experiences for both. Some examples from early pioneers in this area: building versions of their website that can be viewed comfortably on mobile devices, using services that make extensive use of social networks and location-based services such as Facebook and FourSquare that work well with mobile devices, and even building custom applications to provide a new channel for reaching and serving customers. Companies can start small with pilot projects then work from there to see which work best for their businesses.

Increasing Adoption of Mobile Devices Presents Opportunity for Businesses Read More »

Windows XP Users Targeted by Zero-Day Exploit

Barely a month after a Google engineer disclosed a critical vulnerability in Windows XP, hackers have taken launched an attack on vulnerable machines. On June 10, a Google engineer disclosed a security flaw in Windows XP’s Help Center, which can potentially allow hackers to search and retrieve sensitive information from vulnerable PCs, and even turn them into “zombies:”machines that follow the commands of a remote master to perhaps download more malware or send out spam. Recently, reports have come out that the first real exploit has emerged, with Microsoft reporting that over 10,000 Windows XP systems have already been subjected to attack . The systems attacked are based not only in the US, but also in Russia, Portugal, Germany, and Brazil. A patch from Microsoft was released on July 13, and workarounds also exist to contain the threat, such as disabling the HCP protocol. Customers of our Managed Security services running Windows XP are assured of immediate support once the patch is rolled out, but in the meantime can take advantage of our assistance to secure systems through other means. If you’re on one of our Managed Services plans don’t worry – you’re protected. If you’re not sure contact us to find out how we can protect your systems and network from this and other dangerous attacks.

Windows XP Users Targeted by Zero-Day Exploit Read More »

Scroll to Top