Jul 22, 2015 | SMB Technology
In order to keep your business up and running and to avoid being hacked, your company must develop an effective password management policy. This is especially true for any business that must comply with HIPAA, PCI, and/or other regulatory compliances, as regulatory scrutiny and fines can be costly and time consuming. The following four steps can help protect your business from disruption. Make Your Password Complex Make passwords complex; don’t make it easy for hackers to access your company’s data. Include both uppercase and lowercase letters, at least one digit, and punctuation and special characters. Consider creating a passphrase that includes several words, but be sure to avoid expressions from movies or other everyday vernacular. Avoid The Usual Suspects Believe it or not, the most common password is “Password.” Whatever you do, do not use easy-to-guess passwords. Change all default passwords right away, and avoid obvious choices, such as your family name, your pets’ names, or your birthday. Also, not not allow employees to keep a Post-It on their desk with a list of passwords. Change Passwords Often Some systems automatically prompt you to change your password every now and then. For systems that do not already have this feature built in, consider making quarterly password changes mandatory for your organization. And remember: Recycling is good, just not for passwords. Smart Management Consider using a password management system or encryption email to secure your resources. Both can assist you in staying safe from malware and threats. Some malware programs are designed to “phish” for your password. While logging in, malware may transmit your password without your knowledge, so make...
Jul 14, 2015 | SMB Technology
Disaster recovery and business continuity planning are processes that help organizations prepare for disruptive events—this might include a hurricane, an earthquake, a power outage caused by a fire or a cyber attack by hackers. Your business should have a process in place ranging from overseeing a disaster plan, to providing input and support, to putting the plan into action during an emergency. Having a Plan Is Important Given the human tendency to look on the bright side, some business people are prone to ignoring disaster recovery because disaster seems an unlikely event. Business continuity planning is a more comprehensive approach to making sure you can keep making money, not only after a natural disaster but also in the event of smaller disruptions including illness or departure an employee or other challenges that businesses face from time to time. The critical point is that neither element can be ignored, and physical, IT and human resources plans cannot be developed in isolation from each other. At its core, BC/DR is about constant communication. Don’t Forget to Test Your Plan Once you have a plan, it is imperative to test your backup and recovery scenarios to make sure you can bring your systems up in a timely manner. For disaster scenarios, consider training employees on protocol in an emergency situation. Understanding the effects that a disaster can have on your company is extremely important. In order to prepare your business for a disaster, it is necessary to analyze the costs and risks associated with downtime of your critical applications and their data. Having a proactive business continuity/data recovery plan will save your...
Jun 22, 2015 | SMB Technology
The new Windows 10 operating system is purported to be the best Windows ever. The combination of ease of use for new users, automatic updates, and built in security features is causing small to medium sized businesses to breathe a sigh of relief as business owners dream about spending less time and money on training and more energy on making money – finally. Windows 10 is Easy to Use The new OS combines the interface of Windows 8 with the Start menu of Windows 7. This is a godsend for small business, because it means not having to train employees to complete mundane tasks, such as syncing a Bluetooth device. Such options are readily available on the Start menu now. The Windows 10 Start menu is designed to be easy for new users. Check out some of the things users can now do right from the Start menu: Find settings Reboot Launch applications and place apps into the program list Find documents Adjust desktop resolution In addition, the new OS is designed for all platforms, especially smartphones. When using Windows 10 on your smartphone, it will only display the finger-control interface. All in all, Windows 10 is great for SMBs who want to avoid high training costs. Automatic Updates! Microsoft experienced the pain first-hand of customers complaining about having to upgrade from Windows XP and later from Windows 7 to 8. Microsoft Vice President for Operating Systems, Terry Myerson, explained that the company never wants to be in the position of having to convince people to buy the next version of Windows again. The plans for Windows 10 include...
Jun 17, 2015 | SMB Technology
Big data breaches have been making headlines more and more frequently. It was announced last week that the computer systems at the U.S. Office of Personnel Management had been breached. This is the second computer break-in in the past year for the agency. An estimated four million current and former federal employee records may have been compromised. Guidance Software, a cybersecurity firm, used Einstein, an intrusion detection system, to trace the breach back to a machine under the control of Chinese intelligence. Is Your Network Protected? The hard truth about data breaches is that no one is safe: An individual, a small business, a Fortune 500 company, and government agencies can all be infiltrated. Costs from data breaches have grown tremendously in recent years. On average, a data breach will cost a large company about $640,000 to cover the cost of business disruption, information loss, and detection. It takes the average company about a month to recover. If you own a small to medium sized company, it’s doubly wise to be prepared. Small organizations can expect a higher per-capita cost than large organizations. So, what can your organization do to be better prepared for a possible data breach? Why Invest in Stronger Security Measures United States senators have added $200 million in funding to their proposed fiscal 2016 budget to fund a detailed study of the cyber vulnerabilities of major weapons systems. Smaller organizations would be wise to follow these footsteps and make data security a priority going forward. The biggest goal for SMBs when it comes to data security is education over technical improvement. Security education must be...
May 20, 2015 | SMB Technology
According to the International Data Corporation (IDC), total public IT Cloud services (SaaS, PaaS, and IaaS) spending will reach $127 billion in 2018. Compared to the 4.1% compound annual growth rate the IT market will experience from 2013-2018, the public Cloud will grow at a 22.8% compound annual growth rate. That’s five and a half times more than the total IT market spending! The Cloud is unquestionably the most significant trend ever to hit the IT industry. Understanding these figures warrants a thorough review of the advantages associated with moving your organization to the Cloud. Cost Savings The prime advantage of Cloud computing is the ability to pay for what’s being used instead of being compelled to pay for unused services. It’s just smart business sense to cut out unnecessary spending. Large Cloud providers are able to offer more computing power at a lower cost, as they benefit from huge economies from scale. Just make sure Cloud services are not over-provisioned, and only use what you need. Advantages of Both Public and Private Models Organizations have a lot of options when it comes to Cloud models, but most people are confused about the difference between the public and private model. Public Cloud services are designed for a market and not a single enterprise. It is open to all potential users and is shared among unrelated consumers, while private Cloud services are shared within an enterprise but have restrictions on access. These Cloud services can be either onsite or offsite and can be managed by either a third party or in-house staff. There are advantages to both models. The public...
May 15, 2015 | SMB Technology
It’s a moment every business owner dreads. A message appears on your organization’s computer screen alerting you that your files have been encrypted and the only way to access them is by paying a ransom. Security threats to computers and mobile phones have grown more sophisticated around the globe in the past few years. The United States in particular saw an increase in “ransomware.” What is Ransomware? Cypersecurity experts report that ransomware is one of the fastest growing forms of hacking, and the scary part is that no one is safe. An individual, a small business, a Fortune 500 company, and government agencies can all be infiltrated. It also attacks smartphones. Ransomware is malicious software that hackers use to extort money from individuals or businesses by preventing them from opening their documents, pictures, and other files unless they pay a ransom, usually in the amount of several hundred dollars. How Ransomware Works Similar to other hackers’ schemes, ransomware can arrive in emails or attachments with links that, when clicked, encrypt your files. Attacks can also occur during a visit to a website, as cybercriminals can attach computer code to even the most well known websites. It could happen during something as harmless as updating an application or downloading an app on your smartphone. Protect Your Organization Cybercriminals are starting to target small businesses more and more, because generally speaking, they are more vulnerable. While big companies have backups and separate computers for their different departments, small to medium sized businesses lack technology teams, sophisticated software, and secure backup systems to protect from ransomware. One of the best investments your...