business disaster

How the cloud can protect your business from apocalyptic disaster

In the movies, any scene depicting an apocalyptic scenario typically comes with a large special effects budget. Cinematic doom tends to be very colorful, kinetic, and loud. Apocalypse, for your business, might warrant an Academy Award nomination if it results from a natural disaster, like a volcano eruption, tsunami, or comet strike.

Companies, however, don’t often experience cataclysms as filmed by Michael Bay. Corporate apocalypses tend to be a bit more silent. Air conditioning units on the roof leak into the data center, knocking the company website offline and create thousands of dollars per hour in lost revenue. A botched application update or user error deletes important records forever.

The cloud sounds like a Deus ex Machina used at the end of a technology-minded thriller. Actually, it can be exactly that in real life when it comes to helping avert an apocalypse. The cloud can help keep your business going in many ways when disaster strikes.

In the old days, a business relied on applications installed on local computers or in company server rooms for its business needs. If something happened to those computers or server room, even something as mundane as a power outage or as devastating as a tornado, the company was offline and out of business until the power came on or the building and all of its computers were restored.

However, with cloud-based application deployment, distributed data centers around the country can host and run needed applications. Users, customers, and employees can reach them no matter what might threaten the corporate HQ. Your applications can be distributed across many data centers to ensure continued operations in the event of a regional power outage like the one suffered by the northeast in 2003 or an earthquake that devastates California. Or both at once.

If running applications in the cloud doesn’t suit your company’s style or business needs, the cloud can still help provide shelter in a mega storm. You can replace equipment and software lost due to an alien invasion, but the data your company has collected over time is irreplaceable. Hopefully, your team has some backup procedures in place—perhaps backing that data up weekly to tape drives. A cloud-based backup solution offers a more robust solution. By storing your data in the cloud, you protect it from a localized Armageddon that would destroy mere local backups. Additionally, a cloud-based backup acts automatically—you don’t have to physically swap and store backup media, freeing your employees to fight actual fires.

While it’s unlikely your company will suffer from a real apocalypse, the odds that some computer problem will impact daily operations is far greater. A software application outage or a data loss could cost your business a great deal of money at the very least—or perhaps effectively end your business. The right cloud-based solution for your organization can turn an apocalypse into a mere inconvenience.

Hacker is infiltrating a business’s network system from a remote location

Brief History of Information Technology Security

People are fiercely driven by ‘what is going to happen’ rather than ‘what has happened’. Due to the growing concern of intellectual property vulnerability, people have begun to investigate further into the past. By understanding the history of technology security you might be able to safeguard against potential threats. Information technology security protects sensitive assets and property through the use of technology processes and training. High concerns that stem directly from information security are protection of confidentiality, integrity, and availability.

“The more you know about the past, the better prepared you are for the future.” -Theodore Roosevelt

The Early Years

Despite the efforts of the “CIA Triad” (or more commonly known as the Parkerian Hexad) on confidentiality/control, information integrity, authenticity, availability, and utility, they were not able to guard against all threats. Early mainframes used by the military were connected to phone lines called ARPANET (precedent to today’s internet), which allowed integration of information between government data centers. A special ARPA squadron began to determine additional steps for better security by studying the unsecure points between the data centers and the public. Their studies jump started the first few precautions focused on mainframe operating systems. MIT, Bell Labs, and General Electric were the first pioneers to build multiple security levels and passwords into their mainframes.

The Boom of Hacking

Computer system hacking began in 1970’s with the boom of emerging telecommunication technology. Ready to ‘stick it to the man’, a group of hackers found a way to infiltrate the telephone and computer networks in order to make free long distance calls. Also known as “phreakers”, these groups were pioneers for organized crime against unsecured networks. After Ian Murphy’s crime of stealing information from military computers in 1986, the Computer Fraud and Abuse Act was created. The Emergency Response Team was created to alert computer users of network security issues after Robert Morris unleashed the Morris Worm to thousands of defenseless computers.

The Growing Concern

Although public use of the Internet is barely 20 years old, malicious Internet activity has turned into a major criminal enterprise for over a decade. Businesses are now under attack by big threats that can leave them defenseless and exposed. Growing concern for the safety of personal/business information comes from the accelerated worldwide use of electronic data and the heavy amount of business conducted over the internet. With this expedited advancement and expansion, more and more people are putting their personal information online, making them vulnerable for an attack. In 2010, a group of the nation’s top scientists concluded in a report to the Pentagon that “the cyber-universe is complex well beyond anyone’s understanding and exhibits behavior that no one predicted, and sometimes can’t even be explained well.”

We recognize that monitoring technology activities are important to continue to protect the safety and security of your business. If you have any questions or concerns about your technology contact Cognoscape today.  

5 Critical Technologies To Keep Your Business Running During the Zombie Apocalypse

It’s no secret that zombies have taken over the entertainment world in the past few years, thanks to The Walking Dead. You don’t have to be a fan of the show to appreciate zombies, since they have been a fascination of humans since the B.C. era. The question is: when the apocalypse happens, will you be ready? Everyone will be running for food and water, but how will you protect your business from the invasion of these flesh-eating monsters? Here are 5 critical technologies your business needs to stay afloat during the zombie apocalypse.

 

  1. Cloud Storage

Storing your company’s important data on hard drives, CDs and flash drives may seem secure, but it won’t hold up when zombies are tearing your space apart looking for brains to munch on. Storing your data in the cloud is much safer because it is not on the premises and you will be able to access the information from anywhere that retains Internet connection during the crisis. If employees need to access the data, they can do it without leaving the house and risking their lives.

 

  1. Nusura Simulation Deck

Just because you’re stuck in the apocalypse doesn’t mean you have to get behind on your social media updates. Created by a former FEMA deputy public affairs officer, the Nusura Simulation Deck app, simulates social media reactions to emergency announcements and posts them on your behalf. This way, there isn’t the pressure of Tweeting the wrong content in your state of panic, making your company look silly and unprofessional. The app emulates the most popular social media platforms including Twitter, Facebook and YouTube.

 

  1. Cognoscape’s Wifi Service

Cognoscape takes the time to build your business a custom wifi solution to meet your everyday needs, so you’re not over-paying and getting exactly what your business requires to be efficient. The company provides excellent customer service to diagnose any problems that arise. This is an important service to have when the zombies strike for a couple reasons . First, wifi will allow you to stay online when they destroy the tangible connections. Second, Cognoscape can be there to help you get through the disaster with their excellent service skills.

 

  1. Asset Tracking Solution

The zombie apocalypse will no doubt cause mass confusion and chaos. In the midst of this, your business can be turned completely upside-down and all your important equipment and tools will get lost. An asset tracking solution will keep track of everything important and allow you to find it instantly. You’re already going to be in a panic, no need to make it worse.

 

  1. BoostTurbine 4000 Portable Charger

When you’re worrying about saving yourself from bloody monsters, chances are you will forget to charge your important mobile devices. It may be difficult to find a plug-in during this difficult time, so you need a battery backup pack to help you out. The BoostTurbine 4000 has a hand crank turbine power generator and a rechargeable lithium battery, with a USB port to charge your tablets and phones. Four minutes of cranking gets you enough power to talk for a minute or send a few texts, in dire emergencies when the lithium battery has died.

data loss prevention

3 Tips To Help You Prevent Data Loss

Data loss has been a hot issue lately, especially after the hacking of iCloud and the resulting leak of celebrity photos, as well as the attack on Sony Pictures, releasing massive amounts of confidential and personal employee data.

Whether you’re a large multinational corporation or an independent technology company, your information is important and should be kept as safe as possible.

Here are a few basic tips on how to make sure your data is secure and remains that way.

 

Backup Your Data

By now, backing up your data should be common sense. Too many things can go wrong not to have your data backed up in case of hardware failure or an untimely system crash.

But here’s an additional recommendation – DO NOT back your data up on the same drive as your operating system.

Whether it’s a result of malfunctioning software or a vicious malware attack, a majority of computer issues affect the operating system.

Often, you’ll need to reinstall certain software or reformat the infected drive in order to remove a virus, leaving most if not all of your data unsalvageable.

Which brings us to the next tip…

 

Install An Anti-Virus Program

Though backing up your data is extremely important in the event that your system is infected by a virus, preventing the virus from the start can save a great deal of trouble in the form of downtime as well as file loss and data corruption.

An effective anti-virus program will help prevent, detect, and remove software viruses (as well as other malware such as trojans, worms, bots, etc.) keeping your valuable data as secure as possible.

 

Have A Disaster Recovery Plan

All it takes is one major security breach or virus attack to force unnecessary downtime, vital data loss, while risking the safety and reputation of your business.

Even with sufficient data backup and up-to-date antivirus software, your documents and important information can still be lost due to human error and natural disasters. Though these issues cannot always be prevented, they can certainly be minimized with a proper disaster recovery plan.

So if you have the opportunity to safeguard the future of your business, shouldn’t you take it?

Contact Cognoscape today to learn more about how you can keep your information truly safe.

cloud backup

How Cloud Backup Can Keep Your Business Data Secure

Data backup used to be a lot more difficult than it is now. Remember the days of floppy disks? Fortunately, the system eventually made its way to CDs and then external hard drives, but it is even easier than that. Did you ever wonder what would happen in the disks got into the wrong hands or they burned up in a fire? You do not have to worry about any of that with a cloud backup; it is safe, secure, and not as risk for catching on fire. Discover the many ways a cloud backup can keep your business data secure. Remember, to benefit from data archiving, you have to actually back up the files. According to a Harris Interactive poll, over 2,250 users admitted to never backing up their computers, and only 7% actually practice safe archiving on a daily basis. What gives? Your computer’s data is definitely not safer just sitting around it he computer. You put your credit card back in your wallet every time you use it, so why not tuck your essential data away too. Discover how cloud backup can keep your business data secure.

  • Backup features are automatic and recovery is swift. This makes it easier for a user to recover critical data at any given moment and from any location. If human error, natural disaster, or an electrical outage cause a user to lose his/her data, everything the user needs will be stored in the cloud.
  • Access is only granted to permitted users, and the host can revoke cloud privileges at any time.
  • Some services encrypt files on the PC before they are uploaded with a SSL connection. The files will remain encrypted until the user(s) need to access them again.
  • Files are inaccessible unless the key can unlock the encryption algorithm.
  • The cloud services allow the users to create their own password or keys to access the files, so if the password is incorrect, the encryption process will make the data inaccessible to outsiders.
  • There is also a physical protection when a business uses a cloud-based backup system. Not only are your documents are data subjected to online activity and theft, but they are also susceptible to burglary and fire.       If the files are not backed up or company hardware is stolen, data can be destroyed or accessed by thieves with sinister intentions.
  • Some services permit access only with facial recognition.

Need help choosing a good cloud computing solution? Cognoscape can help!

Let’s talk about your company needs. Contact us today for a free consultation.

 

disaster recovery plan

5 Scenarios That Could Put You Out Of Business If You Don’t Have a Disaster Recovery Plan

Taking time and money to back up your company data is extremely burdensome, but make no mistake – having a disaster recovery plan is absolutely necessary. Many companies have perished after experiencing a devastating IT catastrophe. Here are 5 scenarios that could leave your businesses in pieces if you haven’t invested in disaster recovery.

Can Your Company Survive Disaster?

  1. Could your company goes weeks without revenue? Most business owners would say no! Regardless of what type of disaster may come your way, most will leave you scrambling to pick up the pieces if you haven’t prepared. It can only take a few weeks of time before a company has lost so much income that they close up shop.
  2. Mother nature is unpredictable and unforgiving. Hurricanes, fires and water damage are all examples of how natural disasters can wipe out your company. When this type of disaster occurs it can be devastating, so it is imperative that you have your important data backed up and stored in a safe place.
  3. It’s no secret that there are malicious attackers on the internet. What would happen if your office became the target of someone looking to obtain sensitive personal information for you or your clients. Once a company experiences a security breach, it can be a problem for the owner, clients and employees.

Maintain Your Good Reputation With Clients and Staff

  1. Hardware and software are never fool proof, regardless of the quality. Even the best brands become outdated and can break without warning. Often times companies will gain a false sense of security, thinking that if they invest in a good IT infrastructure they won’t have to worry about disaster recovery.
  2. Regardless of what may come your way, it is important to maintain your reputation to your customers. When a company experiences an IT crisis it can be detrimental to the way that customers view the way you do business. When you appear unprepared, customers look for someone else to take care of their needs.

Are you prepared for the worst case scenario? Having a plan doesn’t mean much if you don’t put it in to motion. Any one of these disasters could put you out of business if you haven’t taken the time to carefully weigh the consequences. For companies who have invested in a disaster recovery plan, getting up and running won’t be a problem.

Data Loss Can Cause You To Shut Down

52Small and medium sized businesses today are relying more than ever on IT systems to efficiently run their business, support customers and optimize productivity. These systems house sensitive digital data ranging from employee and customer information, to internal emails, documents and financial records, sales orders and transaction histories. This is in addition to applications and programs critical to daily business functions and customer service.

While corporate-level data losses and insider theft are well publicized, many smaller businesses have also become casualties of data loss and theft. Following a significant data loss, it is estimated that a small-to-medium sized business can lose up to 25% in daily revenue by the end of the first week. Projected lost daily revenue increases to 40% one month into a major data loss.

According to The National Archives & Records Administration in Washington, 93% of companies that have experienced data loss, coupled with prolonged downtime for ten or more days, have filed for bankruptcy within twelve months of the incident while 50% wasted no time and filed for bankruptcy immediately. Finally, 43% of companies with no data recovery and business continuity plan actually go out of business following a major data loss.

Still, a survey conducted by Symantec SMB revealed that fewer than half of SMBs surveyed backup their data each week. Only 23% of those surveyed said they backup data every day and have a business continuity plan in place.

Businesses play on a much bigger playing field than they did two decades ago. Any disruptive technological event – even the smallest of incidents – can have an amplified impact on day-to-day business and profitability. Being proactive with data recovery solutions, and having emergency response procedures in place prior to a disruption or data disaster, is the only way to minimize downtime and soften the impact of such events. CLICK HERE for a free network assessment.

Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe

69Not too long ago, the New York Times’ website experienced a well-publicized attack, which raises the question – how can this happen to such a world-renowned corporation? If this can happen to the New York Times, what does this bode for the security of a small company’s website? What’s to stop someone from sending visitors of your site to an adult site or something equally offensive?

The short answer to that question is nothing. In the New York Times’ attack, the attackers changed the newspapers’ Domain Name System (DNS) records to send visitors to a Syrian website. The same type of thing can very well happen to your business website. For a clearer perspective, let’s get into the specifics of the attack and explain what DNS is.

The perpetrators of the New York Times’ attack targeted the site’s Internet DNS records. To better understand this, know that computers communicate in numbers, whereas we speak in letters. In order for us to have an easy-to-remember destination like nytimes.com, the IP address must be converted to that particular URL through DNS.

Therefore, no matter how big or small a company’s online presence is, every website is vulnerable to the same DNS hacking as the New York Times’ site. The good news is the websites of smaller companies or organizations fly under the radar and rarely targeted.  Larger targets like the New York Times, or LinkedIn, which was recently redirected to a domain sales page, are more likely targets.

For now… There is no reason to panic and prioritize securing DNS over other things right now. But there is a belief that DNS vulnerability will be something cybercriminals pick on more often down the road. Here are a few ways to stay safe:

Select a Registrar with a Solid Reputation for Security

Chances are, you purchased your domain name through a reputable registrar like GoDaddy, Bluehost, 1&1, or Dreamhost. Obviously, you need to create a strong password for when you log into the registrar to manage your site’s files. Nonetheless, recent DNS attacks are concerning because they’re far more than the average password hack.

It was actually the security of the registrars themselves that was compromised in recent attacks. The attackers were basically able to change any DNS record in that registrar’s directory. What’s particularly frightening is the registrars attacked had solid reputations. The New York Times, along with sites like Twitter and the Huffington Post, is registered with Melbourne IT. LinkedIn, Craigslist and US Airways are registered with Network Solutions. Both had been believed to be secure.

So what else can be done?

Set Up a Registry Lock & Inquire About Other Optional Security

A registry lock makes it difficult for anyone to make even the most mundane changes to your registrar account without manual intervention by a staff registrar. This likely comes at an additional cost and not every domain registrar has it available.

Ask your registrar about registry locking and other additional security measures like two factor authentication, which requires another verifying factor in addition to your login and password, or IP address dependent logins, which limits access to your account from anywhere outside of one particular IP address.

While adding any of these extra safeguards will limit your ability to make easy account change or access your files from remote locations, it may be a worthwhile price to pay.

CLICK HERE for a free network assessment and avoid cybercrime with Cognoscape.

Is That a Business Continuity Plan in Your Pocket or a Bunch of Jargon?

67Technology is full of difficult jargon. To further complicate things, certain terms are often used in a different context between one publication or service provider and the next. An example of this is the usage of backup, disaster recovery, and business continuity. These terms are commonly used interchangeably, often resulting in confusion. In an effort to alleviate some of this confusion, let’s describe each physical process. You will see an overlay among all three, although they are each different processes.

Backup – In IT lingo, the most basic description of backup is the act of copying data, as in files or programs, from its original location to another. The purpose of this is to ensure that the original files or programs are retrievable in the event of any accidental deletion, hardware or software failure, or any other type of tampering, corruption and theft.

It’s important to remember that the term “backup” refers to data only and doesn’t apply to the physical machines, devices, or systems themselves. If there were a system failure, disk crash, or an onsite physical disaster, all systems would still have to be replaced, rebuilt, and properly configured before the backed-up data could be loaded onto them.

Disaster Recovery – Backups are a single, albeit crucial, component of any disaster recovery plan. Disaster recovery refers to the complete recovery of your physical systems, applications, and data in the event of a physical disaster like a fire; hurricane or tornado; flood; earthquake; act of terror or theft.

A disaster recovery plan uses pre-determined parameters to define an acceptable recovery period. From there, the most satisfactory recovery point is chosen to get your business up and running with minimal data loss and interruption.

Business Continuity – Although backup and disaster recovery processes make sure that a business can recover its systems and data within a reasonable time, there is still the chance of downtime from a few hours to many days. The point of a business continuity plan is to give businesses continuous access to their technology and data, no matter what. Zero or minimal downtime is the goal.

Critical business data can be backed up with configurable snapshots that are instantly virtualized. This allows files, folders and data to be turned on and restored in seconds. Bare metal restores of hardware, where an image of one machine is overlaid onto a different machine, is also utilized along with cloud replication for instant off-site virtualization.

Many businesses also keep redundant systems and storage at a different physical location than their main site as part of their business continuity process. They may also outline procedures for staff to work remotely off-site. Some businesses or organizations may go as far as to have printed contact lists and other critical data stored off-site to keep their business moving if a disaster wipes out power and their ability to access anything electronically.

This should clarify the differences between backup, disaster recovery, and business continuity solutions. Choosing what works best for your business will come down to your current IT infrastructure, your budget and how much downtime you can reasonably accept.

CLICK HERE for a free network assessment.

Healthcare and Cloud Computing Together at Last

65 For years, the healthcare industry was thought to be the very last sector to embrace cloud computing. With HIPAA compliance, storing private patient data in the cloud seemed much too risky from a security and legal standpoint. However, with a government issued mandate to migrate patient data to electronic heath records by 2015, the cost-effectiveness of the cloud was simply too logical to not entice independent practitioners and small healthcare entities now burdened by the need to invest technology and tech-savvy personnel. If only there was a way around the security and privacy concerns.

Wish granted. In January of 2013, the U.S. Department of Health and Human Services introduced a few revisions to the regulations administered under the Health Insurance Portability and Accountability Act of 1996. Labeled the “Final Omnibus Rule,” this update spelled out the legal framework to be used by healthcare organizations working with cloud service providers.

With a signed Business Associate (BA) agreement, a cloud service provider accepts the responsibility to protect patient data under HIPAA law. This expanded definition of BA means that the government can now penalize cloud service providers accountable for data breaches.

Although many healthcare organizations had already entrusted certain cloud service providers with their data, only the HIPAA covered entity (the healthcare organization) was penalized in the event of a breach prior to this ruling. While the HIPAA covered entity is still responsible for oversight, this shared accountability with the cloud service provider has expanded responsibility and has led to an influx of healthcare organizations and cloud service providers working together, worry-free, in perfect harmony.

CLICK HERE for a free network assessment.