cloud backup

How Cloud Backup Can Keep Your Business Data Secure

Data backup used to be a lot more difficult than it is now. Remember the days of floppy disks? Fortunately, the system eventually made its way to CDs and then external hard drives, but it is even easier than that. Did you ever wonder what would happen in the disks got into the wrong hands or they burned up in a fire? You do not have to worry about any of that with a cloud backup; it is safe, secure, and not as risk for catching on fire. Discover the many ways a cloud backup can keep your business data secure. Remember, to benefit from data archiving, you have to actually back up the files. According to a Harris Interactive poll, over 2,250 users admitted to never backing up their computers, and only 7% actually practice safe archiving on a daily basis. What gives? Your computer’s data is definitely not safer just sitting around it he computer. You put your credit card back in your wallet every time you use it, so why not tuck your essential data away too. Discover how cloud backup can keep your business data secure.

  • Backup features are automatic and recovery is swift. This makes it easier for a user to recover critical data at any given moment and from any location. If human error, natural disaster, or an electrical outage cause a user to lose his/her data, everything the user needs will be stored in the cloud.
  • Access is only granted to permitted users, and the host can revoke cloud privileges at any time.
  • Some services encrypt files on the PC before they are uploaded with a SSL connection. The files will remain encrypted until the user(s) need to access them again.
  • Files are inaccessible unless the key can unlock the encryption algorithm.
  • The cloud services allow the users to create their own password or keys to access the files, so if the password is incorrect, the encryption process will make the data inaccessible to outsiders.
  • There is also a physical protection when a business uses a cloud-based backup system. Not only are your documents are data subjected to online activity and theft, but they are also susceptible to burglary and fire.       If the files are not backed up or company hardware is stolen, data can be destroyed or accessed by thieves with sinister intentions.
  • Some services permit access only with facial recognition.

Need help choosing a good cloud computing solution? Cognoscape can help!

Let’s talk about your company needs. Contact us today for a free consultation.

 

disaster recovery plan

5 Scenarios That Could Put You Out Of Business If You Don’t Have a Disaster Recovery Plan

Taking time and money to back up your company data is extremely burdensome, but make no mistake – having a disaster recovery plan is absolutely necessary. Many companies have perished after experiencing a devastating IT catastrophe. Here are 5 scenarios that could leave your businesses in pieces if you haven’t invested in disaster recovery.

Can Your Company Survive Disaster?

  1. Could your company goes weeks without revenue? Most business owners would say no! Regardless of what type of disaster may come your way, most will leave you scrambling to pick up the pieces if you haven’t prepared. It can only take a few weeks of time before a company has lost so much income that they close up shop.
  2. Mother nature is unpredictable and unforgiving. Hurricanes, fires and water damage are all examples of how natural disasters can wipe out your company. When this type of disaster occurs it can be devastating, so it is imperative that you have your important data backed up and stored in a safe place.
  3. It’s no secret that there are malicious attackers on the internet. What would happen if your office became the target of someone looking to obtain sensitive personal information for you or your clients. Once a company experiences a security breach, it can be a problem for the owner, clients and employees.

Maintain Your Good Reputation With Clients and Staff

  1. Hardware and software are never fool proof, regardless of the quality. Even the best brands become outdated and can break without warning. Often times companies will gain a false sense of security, thinking that if they invest in a good IT infrastructure they won’t have to worry about disaster recovery.
  2. Regardless of what may come your way, it is important to maintain your reputation to your customers. When a company experiences an IT crisis it can be detrimental to the way that customers view the way you do business. When you appear unprepared, customers look for someone else to take care of their needs.

Are you prepared for the worst case scenario? Having a plan doesn’t mean much if you don’t put it in to motion. Any one of these disasters could put you out of business if you haven’t taken the time to carefully weigh the consequences. For companies who have invested in a disaster recovery plan, getting up and running won’t be a problem.

52

Data Loss Can Cause You To Shut Down

52Small and medium sized businesses today are relying more than ever on IT systems to efficiently run their business, support customers and optimize productivity. These systems house sensitive digital data ranging from employee and customer information, to internal emails, documents and financial records, sales orders and transaction histories. This is in addition to applications and programs critical to daily business functions and customer service.

While corporate-level data losses and insider theft are well publicized, many smaller businesses have also become casualties of data loss and theft. Following a significant data loss, it is estimated that a small-to-medium sized business can lose up to 25% in daily revenue by the end of the first week. Projected lost daily revenue increases to 40% one month into a major data loss.

According to The National Archives & Records Administration in Washington, 93% of companies that have experienced data loss, coupled with prolonged downtime for ten or more days, have filed for bankruptcy within twelve months of the incident while 50% wasted no time and filed for bankruptcy immediately. Finally, 43% of companies with no data recovery and business continuity plan actually go out of business following a major data loss.

Still, a survey conducted by Symantec SMB revealed that fewer than half of SMBs surveyed backup their data each week. Only 23% of those surveyed said they backup data every day and have a business continuity plan in place.

Businesses play on a much bigger playing field than they did two decades ago. Any disruptive technological event – even the smallest of incidents – can have an amplified impact on day-to-day business and profitability. Being proactive with data recovery solutions, and having emergency response procedures in place prior to a disruption or data disaster, is the only way to minimize downtime and soften the impact of such events. CLICK HERE for a free network assessment.

69

Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe

69Not too long ago, the New York Times’ website experienced a well-publicized attack, which raises the question – how can this happen to such a world-renowned corporation? If this can happen to the New York Times, what does this bode for the security of a small company’s website? What’s to stop someone from sending visitors of your site to an adult site or something equally offensive?

The short answer to that question is nothing. In the New York Times’ attack, the attackers changed the newspapers’ Domain Name System (DNS) records to send visitors to a Syrian website. The same type of thing can very well happen to your business website. For a clearer perspective, let’s get into the specifics of the attack and explain what DNS is.

The perpetrators of the New York Times’ attack targeted the site’s Internet DNS records. To better understand this, know that computers communicate in numbers, whereas we speak in letters. In order for us to have an easy-to-remember destination like nytimes.com, the IP address must be converted to that particular URL through DNS.

Therefore, no matter how big or small a company’s online presence is, every website is vulnerable to the same DNS hacking as the New York Times’ site. The good news is the websites of smaller companies or organizations fly under the radar and rarely targeted.  Larger targets like the New York Times, or LinkedIn, which was recently redirected to a domain sales page, are more likely targets.

For now… There is no reason to panic and prioritize securing DNS over other things right now. But there is a belief that DNS vulnerability will be something cybercriminals pick on more often down the road. Here are a few ways to stay safe:

Select a Registrar with a Solid Reputation for Security

Chances are, you purchased your domain name through a reputable registrar like GoDaddy, Bluehost, 1&1, or Dreamhost. Obviously, you need to create a strong password for when you log into the registrar to manage your site’s files. Nonetheless, recent DNS attacks are concerning because they’re far more than the average password hack.

It was actually the security of the registrars themselves that was compromised in recent attacks. The attackers were basically able to change any DNS record in that registrar’s directory. What’s particularly frightening is the registrars attacked had solid reputations. The New York Times, along with sites like Twitter and the Huffington Post, is registered with Melbourne IT. LinkedIn, Craigslist and US Airways are registered with Network Solutions. Both had been believed to be secure.

So what else can be done?

Set Up a Registry Lock & Inquire About Other Optional Security

A registry lock makes it difficult for anyone to make even the most mundane changes to your registrar account without manual intervention by a staff registrar. This likely comes at an additional cost and not every domain registrar has it available.

Ask your registrar about registry locking and other additional security measures like two factor authentication, which requires another verifying factor in addition to your login and password, or IP address dependent logins, which limits access to your account from anywhere outside of one particular IP address.

While adding any of these extra safeguards will limit your ability to make easy account change or access your files from remote locations, it may be a worthwhile price to pay.

CLICK HERE for a free network assessment and avoid cybercrime with Cognoscape.

67

Is That a Business Continuity Plan in Your Pocket or a Bunch of Jargon?

67Technology is full of difficult jargon. To further complicate things, certain terms are often used in a different context between one publication or service provider and the next. An example of this is the usage of backup, disaster recovery, and business continuity. These terms are commonly used interchangeably, often resulting in confusion. In an effort to alleviate some of this confusion, let’s describe each physical process. You will see an overlay among all three, although they are each different processes.

Backup – In IT lingo, the most basic description of backup is the act of copying data, as in files or programs, from its original location to another. The purpose of this is to ensure that the original files or programs are retrievable in the event of any accidental deletion, hardware or software failure, or any other type of tampering, corruption and theft.

It’s important to remember that the term “backup” refers to data only and doesn’t apply to the physical machines, devices, or systems themselves. If there were a system failure, disk crash, or an onsite physical disaster, all systems would still have to be replaced, rebuilt, and properly configured before the backed-up data could be loaded onto them.

Disaster Recovery – Backups are a single, albeit crucial, component of any disaster recovery plan. Disaster recovery refers to the complete recovery of your physical systems, applications, and data in the event of a physical disaster like a fire; hurricane or tornado; flood; earthquake; act of terror or theft.

A disaster recovery plan uses pre-determined parameters to define an acceptable recovery period. From there, the most satisfactory recovery point is chosen to get your business up and running with minimal data loss and interruption.

Business Continuity – Although backup and disaster recovery processes make sure that a business can recover its systems and data within a reasonable time, there is still the chance of downtime from a few hours to many days. The point of a business continuity plan is to give businesses continuous access to their technology and data, no matter what. Zero or minimal downtime is the goal.

Critical business data can be backed up with configurable snapshots that are instantly virtualized. This allows files, folders and data to be turned on and restored in seconds. Bare metal restores of hardware, where an image of one machine is overlaid onto a different machine, is also utilized along with cloud replication for instant off-site virtualization.

Many businesses also keep redundant systems and storage at a different physical location than their main site as part of their business continuity process. They may also outline procedures for staff to work remotely off-site. Some businesses or organizations may go as far as to have printed contact lists and other critical data stored off-site to keep their business moving if a disaster wipes out power and their ability to access anything electronically.

This should clarify the differences between backup, disaster recovery, and business continuity solutions. Choosing what works best for your business will come down to your current IT infrastructure, your budget and how much downtime you can reasonably accept.

CLICK HERE for a free network assessment.

65

Healthcare and Cloud Computing Together at Last

65 For years, the healthcare industry was thought to be the very last sector to embrace cloud computing. With HIPAA compliance, storing private patient data in the cloud seemed much too risky from a security and legal standpoint. However, with a government issued mandate to migrate patient data to electronic heath records by 2015, the cost-effectiveness of the cloud was simply too logical to not entice independent practitioners and small healthcare entities now burdened by the need to invest technology and tech-savvy personnel. If only there was a way around the security and privacy concerns.

Wish granted. In January of 2013, the U.S. Department of Health and Human Services introduced a few revisions to the regulations administered under the Health Insurance Portability and Accountability Act of 1996. Labeled the “Final Omnibus Rule,” this update spelled out the legal framework to be used by healthcare organizations working with cloud service providers.

With a signed Business Associate (BA) agreement, a cloud service provider accepts the responsibility to protect patient data under HIPAA law. This expanded definition of BA means that the government can now penalize cloud service providers accountable for data breaches.

Although many healthcare organizations had already entrusted certain cloud service providers with their data, only the HIPAA covered entity (the healthcare organization) was penalized in the event of a breach prior to this ruling. While the HIPAA covered entity is still responsible for oversight, this shared accountability with the cloud service provider has expanded responsibility and has led to an influx of healthcare organizations and cloud service providers working together, worry-free, in perfect harmony.

CLICK HERE for a free network assessment.

64

Are Managed IT Services Right For You? A Few Things to Consider

64How do you get a small business to recognize the value of manages IT services? In the start-up environment, we encounter an eclectic bunch of personality types. There is a reason people become entrepreneurs or C-level execs. When we meet the owners or decision makers at smaller companies and organizations, we can tell right away why they’re where they are. They’re visionaries. They’re risk takers. They’re competitive. They want to be in charge. Therefore, they aren’t always quick to place the fate of their business technology in the hands of a third party. They’ve come as far as they have by being in control and they’re hesitant to give up that control. But we’ve learned a few things along the way. For example, the Type A personality is highly independent but also very competitive. So we tap into the competitive advantage that managed IT services gives them. The Type B personality is creative and doesn’t like static routines. But their ears perk up when they hear terminology like “cutting-edge” and we can then paint the big picture for them once their listening. But anyone we do business with has to be committed to the efficiency, security, and stability of their business technology to see our value proposition. And they have to recognize that managing their IT infrastructure is an investment they cannot take lightly. So here are a few things we commonly have to address before any deal for managed IT services is signed.

Is my business large enough to even consider managed services?

There is an old adage that size doesn’t matter (ahem… we’re talking about in a fight) but SMBs must always think big to get big. The truth is, any company, regardless of its size or the number of people they employ, will run more efficiently if its technology is monitored, maintained, and managed properly. These are facets of your operations that drive profitability and give our Type A personalities that competitive edge they crave. And they can rest easy whenever business is booming because their technology is built to sustain their growth. That’s the big picture that our Type B personality can appreciate.

How is making another IT investment a cost-savings move for my business?

There are still many SMBs who feel a greater focus and investment should go towards their core operations or marketing and sales. They only worry about technology when it breaks, figuring they’ll just call a service technician to come to the office and fix whatever the problem is. Or buy some new hardware at Office Depot.

There are some very obvious flaws to this strategy.

  • You’re paying way too much when it’s way too late – An issue that was likely preventable with early detection has escalated into a full blown business disruption and that on-call technician likely charges a high hourly rate, on top of hardware replacement costs, and may not get to your site right away. Being proactive rather than reactive to technology issues is important.
  • Don’t forget productivity killers – It’s taking your employees too long to boot their computers. Servers and applications are running slowly. Employee devices are full of Malware. Non-technical employees are running around troubleshooting tech problems. If you see this, your present approach to IT management is killing employee productivity and your bottom line.
  • What happens internally is noticed externally – Don’t think for a second that customers or clients don’t notice outdated or slow internal technology and mismanagement. If your site or applications are down often, run slowly, or your customer service rep tells them “I’m sorry, our system is down”, they’re noticing and it’s hurting your business.

When all is said and done, professionally managed IT services will give you a competitive edge, guarantee your business is always leveraging the newest most cutting-edge technology, and enhance your relationships with customers and clients – all while reducing costs.

CLICK HERE for a free network assessment.

63

Inquiring SMBs Want to Know… What’s the Difference Between a Help Desk and NOC?

It’s no secret that any growing small-to-medium sized business must monitor and manage its business technology in the most 63cost-efficient way. The tricky part is figuring out how to do this without sacrificing the overall experience of the end- user. End-users can be clients and customers or employees. Both rely on the efficiency of a firm’s network, servers, and applications, and the availability of the company’s data center. Thanks to the evolution of managed services, it’s actually possible these days to reduce costs, which strengthens IT support and infrastructure. It’s just a matter optimally integrating all available resources.

 

IT’S A STAFFING CONUNDRUM FOR MOST SMBs

Most SMBs tend to be short staffed. This isn’t just another reference to the many SMBs with little to no onsite tech support. While that’s true, and problematic, it’s actually all operations that tend to be short staffed.

Small yet growing companies and organizations aren’t just short on tech support; it seems like even their administrative assistant needs an assistant to keep up. Customer support and sales teams are also overworked, and often hindered by having to understand and troubleshoot tech problems when they have no tech expertise whatsoever.

There is no, “Hold for a moment, Sir. I’m about to transfer you to our tech support team.” There is no tech support team.

This is where managed service providers (MSPs) step in to save the day. MSPs help SMBs better manage their technology to achieve greater ROI (Return-on-Investment). One way they do this is by augmenting a SMBs existing on-site staff with the remote support of a 24/7 Network Operations Center (NOC) and Help Desk.

WHAT’S THE DIFFERENCE BETWEEN A NOC AND A HELP DESK?

This question is asked a lot because it’s really not uncommon to see both referenced interchangeably, which leaves many to assume they are one in the same. They are not. Here is the easiest way to distinguish between the two.

NOC: Most of the work performed by a NOC focuses on the network and systems. The NOC can almost be viewed as a mission control center. They monitor and manage an IT network. A 24/7 NOC typically monitors the network and system security, performance, and backup processes.

Help Desk: The Help Desk is more customer-oriented. The Help Desk has interaction with the end-user, or someone representing the end-user, to directly respond and resolve technical problems as they arise. Customers or employees can typically reach the Help Desk by clicking a support icon, emailing them, or dialing a toll-free number.

DO THE HELP DESK AND NOC INTERACT? Although the NOC and Help Desk are different, they do work together, along with any in-house tech support, to provide cohesive tech solutions to end-users. The Help Desk typically has three tiers of support and may sometimes have to escalate tickets to the NOC for resolution. This open communication, and ease of escalation, improves the end-user experience and serves as a proactive cost-efficient approach to managing SMB technology.

CLICK HERE for a free network assessment.

62

Three Steps To Fix IT Management for SMBs

62Small-to-medium-sized businesses (SMBs) tend to have a more difficult time managing IT than larger enterprises. Despite being as technology dependent as larger enterprises, SMBs have tighter budgets and fewer resources to devote to IT management. This leads to a more reactive “break-fix” approach to their technology that never does any smaller company or organization any good.

Here’s what break fix most often leads to. If the burden rests on the shoulders of hourly or salaried in-house IT support, and they’re too busy putting out fires all day, then their skills and talents are essentially wasted.

If there is no in-house tech support, and many smaller companies and organizations don’t have even one onsite “IT guy”, SMBs are commonly taken for a ride by some of the more unscrupulous on-call IT consultants.

Although “If it ain’t broke, don’t fix it” is a popular saying, it should never be applied to the management of business technology. The cost of downtime can crush any barely surviving small business. The combined impact of lost revenue, lost productivity, and lost brand reputation is a severe hit that many SMBs aren’t built to withstand.

It pays to be proactive, not a reactive about technology. This requires a cultural shift from how IT has commonly been handled in the past. Say goodbye to manual, yet necessary, processes and hello to a better way for businesses to meet their technology needs – a smarter and more cost-efficient way.

THREE STEPS TO FIX IT MANAGEMENT FOR SMBs

  1. Be Proactive – More often than not, it’s the things that aren’t caught early on that turn into costly business disruptions. For instance, many of the hardware, software, and application failures that cause downtime occurrences are preventable; they’re just not detected and addressed early enough. SMBs today have the advantage of using a Remote Monitoring and Management (RMM) tool to help their existing in-house support staff get a grip on their workload. A RMM tool, combined with an outsourced 24/7 Network Operations Center (NOC), monitors your technology all day and all through the night via one comprehensive interface that is even accessible with a mobile device. This kind of around the clock monitoring transforms technology management. Problems can be nipped in the bud with an alert and prompt ticket resolution before they turn into major issues that disrupt day-to-day operations.
  1. Automate/Schedule Mundane Tasks – Free the in-house support staff from everyday manual maintenance and monitoring by automating a broad range of IT security and monitoring tasks.
  1. Get More From Your In-House Team – If you have any in-house IT support, you’ve likely hired some incredibly skilled and talented people who would be more worthy contributors to your company or organization if they weren’t always so tied up fixing things and performing monotonous tasks. With RMM and NOC solutions, SMBs can put these individuals to work on projects that matter. They are freed-up to work on concepts, strategies, and application development that better serve your customers, employees, and suppliers, truly giving business a competitive advantage.

CLICK HERE for a free network assessment.

shutterstock_166356290

4 Easy Ways to Boost Your Web-Surfing Security

The internet has become more of a necessity than a luxury. With social networks becoming more popular and the usage of the internet becoming more widespread, it’s important to make sure that you’re secure online.

Here are 4 easy ways you can protect yourself online.

 

#1) Don’t Overshare

When you’re spending lots of time on your favorite social networks, it can be tempting to post lots of personal information, including your location and your full name. But sharing those kinds of things can really compromise your privacy!

Check out the privacy settings for your online profiles and make sure that your personal information is not available to the public.

 

#2) Watch Out For Scammers

Have you ever received an email from a random person stating that you were an heir set to receive a huge fortune?

Or maybe you’ve received an email from someone you don’t know that included a sob story and a desperate plea for financial help.

Either way, these types of emails are scams – the scammers use your sympathy or excitement against you, get your credit card information, and steal your money or your identity.

Make sure that you are careful about which emails you take seriously and respond to. Remember – pretty much anyone can email you. Make sure you use discretion so you can keep your money and information secure.

 

#3) Protect With Passwords

Many popular websites require you to register, create a password, and log in to gain full access. While some people see this as an inconvenience, it’s truly a good way to keep your data secure and private.

Be sure that, when you create a password, you make it one that’s difficult to guess. Use varied capitalization, use numbers, and try not to use a dictionary word. That way, you can feel confident that your accounts are safe from hackers.

 

#4) Safe Shopping

It’s important to follow best safety practices when you’re shopping online. After all, you’re likely using your credit or debit card. You don’t want that information to get into the wrong hands! Make sure that you never enter your credit card on a page that is not encrypted. When a page is encrypted, the web address will begin with “https” instead of “http.”

Also, make sure you never enter your social security number. No seller should ever need that information – if they do, it’s likely that they’re trying to scam you

Another good practice is to check out the seller’s reviews and policies. You can shop a lot more confidently if you know other people have had a good experience purchasing from the seller.

 

Why stop there? It’s good to make sure you’re secure when you’re casually using the internet, but it’s also important to make sure that your company networks are secure. I mean, you could lose your money, your clients, or even your business if a hacker accessed and used your data!

Here at Cognoscape, we’ve got the security solutions you need to gain peace of mind and keep your critical information safe. Contact us today, and let’s work together to prevent security breaches.