Sep 27, 2012 | SMB Technology
Beyond Bring Your Own Device (BYOD) Many businesses have adopted an IT policy of Bring Your Own Device (BYOD) to save money and provide employees with the flexibility of staying connected when they travel, work from home and spend time in the field. The BYOD policy allows employees to use personal smart phones and tablets for business purposes. According to research firm Computer Economics, companies can save between $1350 and $3500 annually by adopting a BYOD policy. In addition, employees can be more productive and have higher job satisfaction with a IT mobility plan. According to research by the Computer Technology Industry Association, CompTIA, security is the primary issue for IT Managers when it comes to mobility. The number one risk cited is loss or theft of a mobile device. Seventy percent of those surveyed implement mobile device password locking as part of their data protection plan for mobile devices. However, a four digit password in itself is not enough security, so there are a number of additional precautions companies should take to protect valuable corporate data. Here are a few recommendations you may consider to help mitigate risk from your BYOD policy: Have employees agree to a policy of notifying the company in a timely manner when a device is lost or stolen. If the company uses technology to “wipe” corporate data from the mobile device ensure employees keep personal data separate or prevent company data from residing on the mobile device all together. Local laws may prevent an employer from wiping or “rooting” a mobile device upon loss, theft or employee termination. If you do business in foreign countries be aware...
Aug 25, 2012 | SMB Technology
Maintaining Network Security: For many companies, network security is necessary to achieve compliance for PCI, HIPPA and other regulatory requirements. Keeping your computer and wireless network secure is a good policy to protect your company’s critical data. Without proper network security, your network may be vulnerable to computer virus and malware attacks and unauthorized access by computer hackers. Here are five tips to help you maintain network security. Audit Network Regularly Performing a periodic network scan may identify unauthorized computers and other devices that may have connected to your network directly or via wireless access. Your properly configured network, firewall, routers and wireless access points will prevent unauthorized intruders, however, regular audits ensure compliance to your network security policies. Keep O/S Patches Up To Date Your network is as secure as its’ weakest link. Make sure all PCs are up to date with Operating System O/S security patches. This helps prevent computer viruses and malware from exploiting your operating system and entering your network. Keep Antivirus and Malware Definitions Current In addition to your O/S patches, confirm that your Antivirus and Malware definitions are up to date. This further protects your PC from exploits and helps maintain the security of your network. Establish Policy for Mobile and Wireless Devices Bring Your Own Device (BYOD) is a trend providing employees the benefits of using their mobile devices at home and in the workplace. Employers are relieved from the burden of having to purchase additional mobile devices, such as tablets and PCs. It is important to ensure these devices maintain the same security standards of company owned desktop and laptop computers....
Jul 10, 2012 | SMB Technology
Bring Your Own Device (BYOD) Bring your own device (BOYD) is a recent trend where employees use their personal mobile devices including: iPhones, iPads, tablets computers and smartphones to access company information including your network, email, files and critical business applications. This policy can make your employees more productive. BYOD may save you the expense of buying mobile devices for your employees. However, if not managed appropriately, BYOD may open up security risks in your data protection strategy. Due to their mobile nature, these mobile devices are susceptible to theft and loss. Also, mobile devices may infect your network with viruses and malware, if they are not properly maintained. Here are some tips to minimize your exposure to employees who BYOD: Require Passcode to Unlock Device Requiring a passcode will prevent unintended access to your network or application data in case a user’s mobile device is lost or stolen. Keep OS/apps Up To Date To avoid virus and malware attacks on your mobile devices, it is a good policy to keep the operating system up to date with the latest security patches. It is also a good idea to keep your applications up to date to avoid a network security breach. Don’t Allow “Jailbreaking” of Operating Systems Some employees may “jailbreak” their iPhones or iPads so they can install additional applications and extensions that may not be available through the Apple Store. Jailbreaking may expose security breaches on these devices creating a weak link in your data protection plan. Services for Tracking and Wiping Most mobile devices will automatically check in to their geo-location when they are turned on....
Jun 9, 2012 | SMB Technology
Data Protection and Password Security Update: LinkedIn On June 7, LinkedIn disclosed that “some LinkedIn member passwords were compromised.” Per LinkedIn disclosures on their blog https://blog.linkedin.com/2012/06/07/taking-steps-to-protect-our-members/ ”LinkedIn learned that approximately 6.5 million hashed LinkedIn passwords were posted on a hacker site. Most of the passwords on the list appear to remain hashed and hard to decode, but unfortunately a small subset of the hashed passwords was decoded and published.” They continued, “no email logins associated with the passwords have been published, nor have we received any verified reports of unauthorized access to any member’s account as a result of this event.” There are a few important lessons to pass along given the recent data protection disclosure by LinkedIn: Separate Company from Personal You or your employees may have a variety of social media accounts. It is a good data protection policy to use separate email and password combinations for personal use versus business use. Where possible, use a personal email and password combination to set up and access your Facebook, Twitter and LinkedIn accounts. Discourage employees from using their business credentials on social networks. In the event that an email and password combination is compromised, there is a lower probability that your vital systems will be hacked if your company is not associated with the data leak on a social network. Data Protection Can Lower Exposure When it comes to data protection and backup, the first thoughts are rapid recovery from lost data. These same techniques also apply to hacked data. By having daily backups of your data companies can better pinpoint what data may have been compromised during...
May 25, 2012 | SMB Technology
PC Repair Tips to Improve Performance Over time Windows Personal Computers and Laptops need ongoing repair to keep them running smoothly. Why waste time and office productivity when you can proactively repair and maintain your PCs for optimal performance? Here are some tips you may try yourself or ask your IT Professional about for support. Check your Anti-virus Anti-virus programs are designed to protect your PC from security threats that can destroy your important data. Some anti-virus programs have stringent security settings where the anti-virus program scrutinizes every file and program on your PC. This may slow your systems down. Also, if you have had your PC or Laptop for a while, you may have installed multiple anti-virus programs overtime. These programs may be pulling double duty, slowing your systems even more. Inventory which anti-virus programs you have installed and check the security settings to make sure you balance your security needs with performance requirements. Eradicate Malware Malicious software or “Malware” may accumulate on your PC. These programs may run as background tasks without your knowledge. Some programs look for sensitive data, including passwords. They may interrogate every keystroke on your PC. Aside from the security risk, these programs may slow down the performance of your PC or Laptop. Many times anti-Malware security programs are part of an IT-managed service contract from your IT Service Provider. These programs run to detect and eliminate Malware from your PC and protect your system from future Malware intrusions. Remove unused programs Overtime your computer will collect programs you no longer use or need. Some of these programs may start up automatically when...