Dec 10, 2014 | SMB Technology
In just the past few years, it has become evident that the topic of cloud computing has shifted from a potential game changer to an essential ingredient of modern IT. For those moving down the path of business transformation, the cloud is the primary driver. The International Data Corporation estimates the public cloud market to grow at 23% CAGR through 2018, and they estimate that worldwide spending on hosted private cloud services will exceed $24 billion by 2016. If your organization is not implementing the cloud, you’re already behind. Just the Beginning Even though adoption rates are high, there is still a lot of confusion related to cloud computing. 28% of survey respondents did not know whether their business used a private or public cloud model, which demonstrates the confusion over terminology or lack thereof. Previous eras of IT have lasted for over 20 years; so, after five years, the era of cloud computing is just getting started. CompTIA predicts the next decade will see cloud computing becoming even more accepted as a foundational building block. Cloud Options After these initial five years of cloud computing, the industry is no longer talking generally about the cloud market. Many companies are considering public cloud, private cloud, and hybrid cloud options. Software as a Service, Infrastructure as a Service, and Platform as a Service change the way that businesses buy IT goods and services. With many businesses shifting their computing infrastructure to the Cloud, companies continue to take advantage of the flexibility and simpler way of managing their applications and data. If your organization needs guidance learning more about the cloud,...
Nov 19, 2014 | SMB Technology
According to new IDC data, vendors shipped 327.6 million smartphones in the third quarter, an increase of 25.2%, when compared to the same quarter last year. This means that global smartphone shipments have topped 300 million shipments for the second quarter in a row. Although there have been rumors of a slowing market, the data clearly states otherwise. As technology pushes small to medium sized businesses towards smartphones and other mobile devices in the workplace, it is more important than ever to establish an effective BYOD (Bring Your Own Device) policy. 1. Decide What Mobile Devices Are Allowed If your company allows your employees to bring their own devices to work, it can be a nightmare for IT to have to support multiple platforms. Therefore, it is important to decide what devices are allowed to be used for work. Decide whether it is more cost-effective to purchase your own company devices to hand out to employees. 2. Establish BYOD Security Policies It is important for your company to establish an “acceptable use policy” for their mobile devices. This will curb employee distractions and reduce risks for harmful viruses and malware. Your company should also develop a monitoring system and disciplinary action for employees who disobey the policy. Although this may seem harsh, it may avoid a security breach down the road. 3. Employee Exit Policy In addition to creating an acceptable use policy, it is equally important to come up with an exit policy for when employees leave the company. Document in your employee exit checklist to ensure you remove the employee from access to information on the network,...
Nov 10, 2014 | SMB Technology
A new report from the Ponemon Institute, an organization that publishes the annual “Global Report on the Cost of Cyber Crime,” recently announced that the cost of a data breach has jumped 23% from last year. Here’s what your small to medium sized business needs to know about being prepared in case of a data breach. The Data Breach by the Numbers The report revealed that a data breach will cost a large company about $640,000. This price tag includes hefty costs, such as business disruption, information loss, and detection. The report also revealed that it takes a company an average of 31 days to recover, yet experts advise that the time to remediate from a breach should only be less than one week. Interestingly, small organizations have a higher per-capita cost than large organizations. So, what can your business do to be more prepared? Have a Data Breach Incident Response Plan An Incident Response is an organized approach to responding to and managing the aftermath of a security breach or attack. The goal of such a plan is to limit damage and reduce recovery time and costs. An Incident Recovery plan should include a clear-cut definition of what your company constitutes as an incident and a subsequent step-by-step process that should be followed carefully after an incident occurs. Consider Hiring an Information Security Firm If you contact an Information Security firm after a data breach occurs, your organization will have to pay more money and wait longer to recover. You may not be prepared to remediate and respond in time. Knowing who to call helps your organization avoid...
Jul 8, 2014 | SMB Technology
Businesses are under constant attack from a variety of network security threats. Cybercriminals hack databases for passwords for unauthorized access to your network. Undetected Malicious software (malware) can trap and forward passwords. Viruses can infect your hard drive and destroy application data and files without your knowledge. Businesses large and small face these network security threats on a daily basis; larger organizations, however, may have more resources to fight attacks. Small businesses may be more vulnerable to downtime and loss of productivity because of thinner margins and resources. Here are a few steps you can take to survive a network security attack. Prevent Network Security Attacks Before they Occur Protect your network by making sure all devices are in compliance with the latest anti-virus and malware updates. Ensure your operating system (O/S) patches are up to date. Protect your network with strong passwords and require your employees to change them regularly. Discourage writing passwords down, and make sure employees are aware of the risks of a network security attack. Lock Down your Mobile Devices Mobile devices including smartphones and tablets are particularly vulnerable to theft and loss. Passwords on these devices can be easily cracked leaving your applications and data vulnerable to unauthorized access. Train your employees to report theft or loss of mobile devices quickly, and make sure that all data on the device is encrypted. Having the ability to track and wipe data from these devices is another option to ensure you can survive a network security threat. Backup Your Data Online Backup and Cloud Backup are affordable options to have quick access to applications and data...
May 6, 2014 | SMB Technology
Companies small and large are increasingly reliant on their IT systems and infrastructure. Having a Business Continuity plan is a proactive way of avoiding unnecessary downtime due to a disaster, human error, or security breach. Not only may downtime cause data loss, but also according to Gartner Research, a conservative estimate of the cost of downtime for a computer network is $42,000 per hour. For a small business without a Business Continuity plan, such downtime could have long-term crippling implications. In case of natural disasters or IT outages, it is important to be able to calculate risks and financial losses caused by downtime in order to best allocate IT resources to get your business back online quickly. Below are suggestions for putting downtime for your computer network in perspective. Downtime of your Computer Network and Your Business Continuity Plan There are many factors that contribute to losses caused by downtime. These factors include employee productivity, financial losses, fines, legal fees, loss of revenue, and loss of goodwill. Whether it is inventory sitting on trucks, invoices that don’t go out, or cash registers that stop ringing, it is important to understand which applications and data are most important to bring back quickly. By identifying the systems that are most important to keeping your doors open, you will quickly realize where the highest risk of downtime is in your business. Also note that losing sensitive data, such as credit card information, may attract heavy fines and loss of reputation in addition to lost revenue. How to Avoid Downtime With Your Business Continuity Plan To avoid the disastrous effects that downtime can...