5 Critical Technologies To Keep Your Business Running During the Zombie Apocalypse

It’s no secret that zombies have taken over the entertainment world in the past few years, thanks to The Walking Dead. You don’t have to be a fan of the show to appreciate zombies, since they have been a fascination of humans since the B.C. era. The question is: when the apocalypse happens, will you be ready? Everyone will be running for food and water, but how will you protect your business from the invasion of these flesh-eating monsters? Here are 5 critical technologies your business needs to stay afloat during the zombie apocalypse.


  1. Cloud Storage

Storing your company’s important data on hard drives, CDs and flash drives may seem secure, but it won’t hold up when zombies are tearing your space apart looking for brains to munch on. Storing your data in the cloud is much safer because it is not on the premises and you will be able to access the information from anywhere that retains Internet connection during the crisis. If employees need to access the data, they can do it without leaving the house and risking their lives.


  1. Nusura Simulation Deck

Just because you’re stuck in the apocalypse doesn’t mean you have to get behind on your social media updates. Created by a former FEMA deputy public affairs officer, the Nusura Simulation Deck app, simulates social media reactions to emergency announcements and posts them on your behalf. This way, there isn’t the pressure of Tweeting the wrong content in your state of panic, making your company look silly and unprofessional. The app emulates the most popular social media platforms including Twitter, Facebook and YouTube.


  1. Cognoscape’s Wifi Service

Cognoscape takes the time to build your business a custom wifi solution to meet your everyday needs, so you’re not over-paying and getting exactly what your business requires to be efficient. The company provides excellent customer service to diagnose any problems that arise. This is an important service to have when the zombies strike for a couple reasons . First, wifi will allow you to stay online when they destroy the tangible connections. Second, Cognoscape can be there to help you get through the disaster with their excellent service skills.


  1. Asset Tracking Solution

The zombie apocalypse will no doubt cause mass confusion and chaos. In the midst of this, your business can be turned completely upside-down and all your important equipment and tools will get lost. An asset tracking solution will keep track of everything important and allow you to find it instantly. You’re already going to be in a panic, no need to make it worse.


  1. BoostTurbine 4000 Portable Charger

When you’re worrying about saving yourself from bloody monsters, chances are you will forget to charge your important mobile devices. It may be difficult to find a plug-in during this difficult time, so you need a battery backup pack to help you out. The BoostTurbine 4000 has a hand crank turbine power generator and a rechargeable lithium battery, with a USB port to charge your tablets and phones. Four minutes of cranking gets you enough power to talk for a minute or send a few texts, in dire emergencies when the lithium battery has died.

data loss prevention

3 Tips To Help You Prevent Data Loss

Data loss has been a hot issue lately, especially after the hacking of iCloud and the resulting leak of celebrity photos, as well as the attack on Sony Pictures, releasing massive amounts of confidential and personal employee data.

Whether you’re a large multinational corporation or an independent technology company, your information is important and should be kept as safe as possible.

Here are a few basic tips on how to make sure your data is secure and remains that way.


Backup Your Data

By now, backing up your data should be common sense. Too many things can go wrong not to have your data backed up in case of hardware failure or an untimely system crash.

But here’s an additional recommendation – DO NOT back your data up on the same drive as your operating system.

Whether it’s a result of malfunctioning software or a vicious malware attack, a majority of computer issues affect the operating system.

Often, you’ll need to reinstall certain software or reformat the infected drive in order to remove a virus, leaving most if not all of your data unsalvageable.

Which brings us to the next tip…


Install An Anti-Virus Program

Though backing up your data is extremely important in the event that your system is infected by a virus, preventing the virus from the start can save a great deal of trouble in the form of downtime as well as file loss and data corruption.

An effective anti-virus program will help prevent, detect, and remove software viruses (as well as other malware such as trojans, worms, bots, etc.) keeping your valuable data as secure as possible.


Have A Disaster Recovery Plan

All it takes is one major security breach or virus attack to force unnecessary downtime, vital data loss, while risking the safety and reputation of your business.

Even with sufficient data backup and up-to-date antivirus software, your documents and important information can still be lost due to human error and natural disasters. Though these issues cannot always be prevented, they can certainly be minimized with a proper disaster recovery plan.

So if you have the opportunity to safeguard the future of your business, shouldn’t you take it?

Contact Cognoscape today to learn more about how you can keep your information truly safe.

cloud backup

How Cloud Backup Can Keep Your Business Data Secure

Data backup used to be a lot more difficult than it is now. Remember the days of floppy disks? Fortunately, the system eventually made its way to CDs and then external hard drives, but it is even easier than that. Did you ever wonder what would happen in the disks got into the wrong hands or they burned up in a fire? You do not have to worry about any of that with a cloud backup; it is safe, secure, and not as risk for catching on fire. Discover the many ways a cloud backup can keep your business data secure. Remember, to benefit from data archiving, you have to actually back up the files. According to a Harris Interactive poll, over 2,250 users admitted to never backing up their computers, and only 7% actually practice safe archiving on a daily basis. What gives? Your computer’s data is definitely not safer just sitting around it he computer. You put your credit card back in your wallet every time you use it, so why not tuck your essential data away too. Discover how cloud backup can keep your business data secure.

  • Backup features are automatic and recovery is swift. This makes it easier for a user to recover critical data at any given moment and from any location. If human error, natural disaster, or an electrical outage cause a user to lose his/her data, everything the user needs will be stored in the cloud.
  • Access is only granted to permitted users, and the host can revoke cloud privileges at any time.
  • Some services encrypt files on the PC before they are uploaded with a SSL connection. The files will remain encrypted until the user(s) need to access them again.
  • Files are inaccessible unless the key can unlock the encryption algorithm.
  • The cloud services allow the users to create their own password or keys to access the files, so if the password is incorrect, the encryption process will make the data inaccessible to outsiders.
  • There is also a physical protection when a business uses a cloud-based backup system. Not only are your documents are data subjected to online activity and theft, but they are also susceptible to burglary and fire.       If the files are not backed up or company hardware is stolen, data can be destroyed or accessed by thieves with sinister intentions.
  • Some services permit access only with facial recognition.

Need help choosing a good cloud computing solution? Cognoscape can help!

Let’s talk about your company needs. Contact us today for a free consultation.


disaster recovery plan

5 Scenarios That Could Put You Out Of Business If You Don’t Have a Disaster Recovery Plan

Taking time and money to back up your company data is extremely burdensome, but make no mistake – having a disaster recovery plan is absolutely necessary. Many companies have perished after experiencing a devastating IT catastrophe. Here are 5 scenarios that could leave your businesses in pieces if you haven’t invested in disaster recovery.

Can Your Company Survive Disaster?

  1. Could your company goes weeks without revenue? Most business owners would say no! Regardless of what type of disaster may come your way, most will leave you scrambling to pick up the pieces if you haven’t prepared. It can only take a few weeks of time before a company has lost so much income that they close up shop.
  2. Mother nature is unpredictable and unforgiving. Hurricanes, fires and water damage are all examples of how natural disasters can wipe out your company. When this type of disaster occurs it can be devastating, so it is imperative that you have your important data backed up and stored in a safe place.
  3. It’s no secret that there are malicious attackers on the internet. What would happen if your office became the target of someone looking to obtain sensitive personal information for you or your clients. Once a company experiences a security breach, it can be a problem for the owner, clients and employees.

Maintain Your Good Reputation With Clients and Staff

  1. Hardware and software are never fool proof, regardless of the quality. Even the best brands become outdated and can break without warning. Often times companies will gain a false sense of security, thinking that if they invest in a good IT infrastructure they won’t have to worry about disaster recovery.
  2. Regardless of what may come your way, it is important to maintain your reputation to your customers. When a company experiences an IT crisis it can be detrimental to the way that customers view the way you do business. When you appear unprepared, customers look for someone else to take care of their needs.

Are you prepared for the worst case scenario? Having a plan doesn’t mean much if you don’t put it in to motion. Any one of these disasters could put you out of business if you haven’t taken the time to carefully weigh the consequences. For companies who have invested in a disaster recovery plan, getting up and running won’t be a problem.


Data Loss Can Cause You To Shut Down

52Small and medium sized businesses today are relying more than ever on IT systems to efficiently run their business, support customers and optimize productivity. These systems house sensitive digital data ranging from employee and customer information, to internal emails, documents and financial records, sales orders and transaction histories. This is in addition to applications and programs critical to daily business functions and customer service.

While corporate-level data losses and insider theft are well publicized, many smaller businesses have also become casualties of data loss and theft. Following a significant data loss, it is estimated that a small-to-medium sized business can lose up to 25% in daily revenue by the end of the first week. Projected lost daily revenue increases to 40% one month into a major data loss.

According to The National Archives & Records Administration in Washington, 93% of companies that have experienced data loss, coupled with prolonged downtime for ten or more days, have filed for bankruptcy within twelve months of the incident while 50% wasted no time and filed for bankruptcy immediately. Finally, 43% of companies with no data recovery and business continuity plan actually go out of business following a major data loss.

Still, a survey conducted by Symantec SMB revealed that fewer than half of SMBs surveyed backup their data each week. Only 23% of those surveyed said they backup data every day and have a business continuity plan in place.

Businesses play on a much bigger playing field than they did two decades ago. Any disruptive technological event – even the smallest of incidents – can have an amplified impact on day-to-day business and profitability. Being proactive with data recovery solutions, and having emergency response procedures in place prior to a disruption or data disaster, is the only way to minimize downtime and soften the impact of such events. CLICK HERE for a free network assessment.


Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe

69Not too long ago, the New York Times’ website experienced a well-publicized attack, which raises the question – how can this happen to such a world-renowned corporation? If this can happen to the New York Times, what does this bode for the security of a small company’s website? What’s to stop someone from sending visitors of your site to an adult site or something equally offensive?

The short answer to that question is nothing. In the New York Times’ attack, the attackers changed the newspapers’ Domain Name System (DNS) records to send visitors to a Syrian website. The same type of thing can very well happen to your business website. For a clearer perspective, let’s get into the specifics of the attack and explain what DNS is.

The perpetrators of the New York Times’ attack targeted the site’s Internet DNS records. To better understand this, know that computers communicate in numbers, whereas we speak in letters. In order for us to have an easy-to-remember destination like, the IP address must be converted to that particular URL through DNS.

Therefore, no matter how big or small a company’s online presence is, every website is vulnerable to the same DNS hacking as the New York Times’ site. The good news is the websites of smaller companies or organizations fly under the radar and rarely targeted.  Larger targets like the New York Times, or LinkedIn, which was recently redirected to a domain sales page, are more likely targets.

For now… There is no reason to panic and prioritize securing DNS over other things right now. But there is a belief that DNS vulnerability will be something cybercriminals pick on more often down the road. Here are a few ways to stay safe:

Select a Registrar with a Solid Reputation for Security

Chances are, you purchased your domain name through a reputable registrar like GoDaddy, Bluehost, 1&1, or Dreamhost. Obviously, you need to create a strong password for when you log into the registrar to manage your site’s files. Nonetheless, recent DNS attacks are concerning because they’re far more than the average password hack.

It was actually the security of the registrars themselves that was compromised in recent attacks. The attackers were basically able to change any DNS record in that registrar’s directory. What’s particularly frightening is the registrars attacked had solid reputations. The New York Times, along with sites like Twitter and the Huffington Post, is registered with Melbourne IT. LinkedIn, Craigslist and US Airways are registered with Network Solutions. Both had been believed to be secure.

So what else can be done?

Set Up a Registry Lock & Inquire About Other Optional Security

A registry lock makes it difficult for anyone to make even the most mundane changes to your registrar account without manual intervention by a staff registrar. This likely comes at an additional cost and not every domain registrar has it available.

Ask your registrar about registry locking and other additional security measures like two factor authentication, which requires another verifying factor in addition to your login and password, or IP address dependent logins, which limits access to your account from anywhere outside of one particular IP address.

While adding any of these extra safeguards will limit your ability to make easy account change or access your files from remote locations, it may be a worthwhile price to pay.

CLICK HERE for a free network assessment and avoid cybercrime with Cognoscape.


Is That a Business Continuity Plan in Your Pocket or a Bunch of Jargon?

67Technology is full of difficult jargon. To further complicate things, certain terms are often used in a different context between one publication or service provider and the next. An example of this is the usage of backup, disaster recovery, and business continuity. These terms are commonly used interchangeably, often resulting in confusion. In an effort to alleviate some of this confusion, let’s describe each physical process. You will see an overlay among all three, although they are each different processes.

Backup – In IT lingo, the most basic description of backup is the act of copying data, as in files or programs, from its original location to another. The purpose of this is to ensure that the original files or programs are retrievable in the event of any accidental deletion, hardware or software failure, or any other type of tampering, corruption and theft.

It’s important to remember that the term “backup” refers to data only and doesn’t apply to the physical machines, devices, or systems themselves. If there were a system failure, disk crash, or an onsite physical disaster, all systems would still have to be replaced, rebuilt, and properly configured before the backed-up data could be loaded onto them.

Disaster Recovery – Backups are a single, albeit crucial, component of any disaster recovery plan. Disaster recovery refers to the complete recovery of your physical systems, applications, and data in the event of a physical disaster like a fire; hurricane or tornado; flood; earthquake; act of terror or theft.

A disaster recovery plan uses pre-determined parameters to define an acceptable recovery period. From there, the most satisfactory recovery point is chosen to get your business up and running with minimal data loss and interruption.

Business Continuity – Although backup and disaster recovery processes make sure that a business can recover its systems and data within a reasonable time, there is still the chance of downtime from a few hours to many days. The point of a business continuity plan is to give businesses continuous access to their technology and data, no matter what. Zero or minimal downtime is the goal.

Critical business data can be backed up with configurable snapshots that are instantly virtualized. This allows files, folders and data to be turned on and restored in seconds. Bare metal restores of hardware, where an image of one machine is overlaid onto a different machine, is also utilized along with cloud replication for instant off-site virtualization.

Many businesses also keep redundant systems and storage at a different physical location than their main site as part of their business continuity process. They may also outline procedures for staff to work remotely off-site. Some businesses or organizations may go as far as to have printed contact lists and other critical data stored off-site to keep their business moving if a disaster wipes out power and their ability to access anything electronically.

This should clarify the differences between backup, disaster recovery, and business continuity solutions. Choosing what works best for your business will come down to your current IT infrastructure, your budget and how much downtime you can reasonably accept.

CLICK HERE for a free network assessment.


Healthcare and Cloud Computing Together at Last

65 For years, the healthcare industry was thought to be the very last sector to embrace cloud computing. With HIPAA compliance, storing private patient data in the cloud seemed much too risky from a security and legal standpoint. However, with a government issued mandate to migrate patient data to electronic heath records by 2015, the cost-effectiveness of the cloud was simply too logical to not entice independent practitioners and small healthcare entities now burdened by the need to invest technology and tech-savvy personnel. If only there was a way around the security and privacy concerns.

Wish granted. In January of 2013, the U.S. Department of Health and Human Services introduced a few revisions to the regulations administered under the Health Insurance Portability and Accountability Act of 1996. Labeled the “Final Omnibus Rule,” this update spelled out the legal framework to be used by healthcare organizations working with cloud service providers.

With a signed Business Associate (BA) agreement, a cloud service provider accepts the responsibility to protect patient data under HIPAA law. This expanded definition of BA means that the government can now penalize cloud service providers accountable for data breaches.

Although many healthcare organizations had already entrusted certain cloud service providers with their data, only the HIPAA covered entity (the healthcare organization) was penalized in the event of a breach prior to this ruling. While the HIPAA covered entity is still responsible for oversight, this shared accountability with the cloud service provider has expanded responsibility and has led to an influx of healthcare organizations and cloud service providers working together, worry-free, in perfect harmony.

CLICK HERE for a free network assessment.


Are Managed IT Services Right For You? A Few Things to Consider

64How do you get a small business to recognize the value of manages IT services? In the start-up environment, we encounter an eclectic bunch of personality types. There is a reason people become entrepreneurs or C-level execs. When we meet the owners or decision makers at smaller companies and organizations, we can tell right away why they’re where they are. They’re visionaries. They’re risk takers. They’re competitive. They want to be in charge. Therefore, they aren’t always quick to place the fate of their business technology in the hands of a third party. They’ve come as far as they have by being in control and they’re hesitant to give up that control. But we’ve learned a few things along the way. For example, the Type A personality is highly independent but also very competitive. So we tap into the competitive advantage that managed IT services gives them. The Type B personality is creative and doesn’t like static routines. But their ears perk up when they hear terminology like “cutting-edge” and we can then paint the big picture for them once their listening. But anyone we do business with has to be committed to the efficiency, security, and stability of their business technology to see our value proposition. And they have to recognize that managing their IT infrastructure is an investment they cannot take lightly. So here are a few things we commonly have to address before any deal for managed IT services is signed.

Is my business large enough to even consider managed services?

There is an old adage that size doesn’t matter (ahem… we’re talking about in a fight) but SMBs must always think big to get big. The truth is, any company, regardless of its size or the number of people they employ, will run more efficiently if its technology is monitored, maintained, and managed properly. These are facets of your operations that drive profitability and give our Type A personalities that competitive edge they crave. And they can rest easy whenever business is booming because their technology is built to sustain their growth. That’s the big picture that our Type B personality can appreciate.

How is making another IT investment a cost-savings move for my business?

There are still many SMBs who feel a greater focus and investment should go towards their core operations or marketing and sales. They only worry about technology when it breaks, figuring they’ll just call a service technician to come to the office and fix whatever the problem is. Or buy some new hardware at Office Depot.

There are some very obvious flaws to this strategy.

  • You’re paying way too much when it’s way too late – An issue that was likely preventable with early detection has escalated into a full blown business disruption and that on-call technician likely charges a high hourly rate, on top of hardware replacement costs, and may not get to your site right away. Being proactive rather than reactive to technology issues is important.
  • Don’t forget productivity killers – It’s taking your employees too long to boot their computers. Servers and applications are running slowly. Employee devices are full of Malware. Non-technical employees are running around troubleshooting tech problems. If you see this, your present approach to IT management is killing employee productivity and your bottom line.
  • What happens internally is noticed externally – Don’t think for a second that customers or clients don’t notice outdated or slow internal technology and mismanagement. If your site or applications are down often, run slowly, or your customer service rep tells them “I’m sorry, our system is down”, they’re noticing and it’s hurting your business.

When all is said and done, professionally managed IT services will give you a competitive edge, guarantee your business is always leveraging the newest most cutting-edge technology, and enhance your relationships with customers and clients – all while reducing costs.

CLICK HERE for a free network assessment.


Inquiring SMBs Want to Know… What’s the Difference Between a Help Desk and NOC?

It’s no secret that any growing small-to-medium sized business must monitor and manage its business technology in the most 63cost-efficient way. The tricky part is figuring out how to do this without sacrificing the overall experience of the end- user. End-users can be clients and customers or employees. Both rely on the efficiency of a firm’s network, servers, and applications, and the availability of the company’s data center. Thanks to the evolution of managed services, it’s actually possible these days to reduce costs, which strengthens IT support and infrastructure. It’s just a matter optimally integrating all available resources.



Most SMBs tend to be short staffed. This isn’t just another reference to the many SMBs with little to no onsite tech support. While that’s true, and problematic, it’s actually all operations that tend to be short staffed.

Small yet growing companies and organizations aren’t just short on tech support; it seems like even their administrative assistant needs an assistant to keep up. Customer support and sales teams are also overworked, and often hindered by having to understand and troubleshoot tech problems when they have no tech expertise whatsoever.

There is no, “Hold for a moment, Sir. I’m about to transfer you to our tech support team.” There is no tech support team.

This is where managed service providers (MSPs) step in to save the day. MSPs help SMBs better manage their technology to achieve greater ROI (Return-on-Investment). One way they do this is by augmenting a SMBs existing on-site staff with the remote support of a 24/7 Network Operations Center (NOC) and Help Desk.


This question is asked a lot because it’s really not uncommon to see both referenced interchangeably, which leaves many to assume they are one in the same. They are not. Here is the easiest way to distinguish between the two.

NOC: Most of the work performed by a NOC focuses on the network and systems. The NOC can almost be viewed as a mission control center. They monitor and manage an IT network. A 24/7 NOC typically monitors the network and system security, performance, and backup processes.

Help Desk: The Help Desk is more customer-oriented. The Help Desk has interaction with the end-user, or someone representing the end-user, to directly respond and resolve technical problems as they arise. Customers or employees can typically reach the Help Desk by clicking a support icon, emailing them, or dialing a toll-free number.

DO THE HELP DESK AND NOC INTERACT? Although the NOC and Help Desk are different, they do work together, along with any in-house tech support, to provide cohesive tech solutions to end-users. The Help Desk typically has three tiers of support and may sometimes have to escalate tickets to the NOC for resolution. This open communication, and ease of escalation, improves the end-user experience and serves as a proactive cost-efficient approach to managing SMB technology.

CLICK HERE for a free network assessment.