Blog

February 22nd, 2010

SaaSThe growing reach and power of the internet has changed the way people do business, with more and more web-based services popping up. One of these is SaaS.

SaaS stands for Software as a Service, which refers to any licensed software being “rented” to a company by another company on an as-needed basis.

To illustrate, let’s say Company A is in need of licensed software, but only for a specific period of time because of a one-time client or project. Company B, as the SaaS provider, rents out the use of the software  to Company A for the time Company A needs to use it – weekly, monthly, and so on. (Company B is specially licensed to do this, of course.)

The term became popular near the end of 2000, but the service started in 1998 with a website called siteeasy.com. The concept has become increasingly popular because the legal alternative to rent/outsource the use of the software spares the expense and hassle of procuring software licenses.

As with other outsourced services, the hardware used for SaaS are remotely located and hosted, and accessed through the internet by the subscriber. Virtually all kinds of software can be used through a SaaS service, and availability of the software depends on the subscriber.

There’s vast potential in the use of the internet and web-based services such as SaaS, but the nature of the remote hosting service is not for everyone. If you’d like to learn more about the pros and cons in relation to your business model, we’d be happy to discuss a possible SaaS road map with you.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
February 22nd, 2010

managed serviceMost small and medium businesses can’t afford the luxury of a qualified IT administrator, let alone an entire IT department. If you’re in this position, how do you maintain the information technology infrastructure that’s critical to your organization?

One option is Managed Services, in which you outsource this role to an IT expert called a “managed services provider,” which will typically offer on-site or remote network and security monitoring, data backup and technical support.

Because the Managed Services model allow a business to focus on its core competencies, it is increasing in popularity—but sometimes it’s hard to separate the real benefit from the hype.

What’s the value to you?

  • Peace of mind. Your managed services provider will monitor your IT infrastructure and prevent or resolve any problems—a sharp diversion from the traditional “fix it when it breaks” model of IT management.

  • Simplicity. Your managed services provider will provide many of its services remotely, via the Internet, instead of through on-site visits. This reduces time and cost.

  • Constant support. You don’t have to worry about support; your  managed services provider will offer the assistance you need, when you need it.

  • Affordability. Managed services providers typically offer several price structures, including a per-month fee—which is much lower than the cost of building an in-house IT support department.

  • Accountability. Have you ever tried to resolve an IT problem only to find that one vendor blames it on another who blames it on another? With managed services, you don’t have to go to multiple vendors to figure out why your network is down or you’ve experienced a security breach. You’ll have one point of contact: your managed services provider.

Want to learn more about how Managed Services can give you dependable IT with predictable costs? Give us a call.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
February 18th, 2010

hackerIn a report by security firm Websense, an alarming rise in the growth of malicious websites was identified in 2009 as compared to 2008 – almost 225 percent. The study also found an increased focus among hackers and spammers on targeting social media sites such as blogs and wikis. Social media or so-called Web 2.0 sites allow user-generated content, which can be a source of vulnerability. Researchers identified that up to 95 percent of user-generated comments to blogs, chat rooms, and message boards are spam or malicious – linking to data stealing sites or to downloads of malicious software. Email also continues to be a target for malicious activity with tens of thousands of Hotmail, Gmail and Yahoo! email accounts hacked and passwords stolen and posted online in 2009, which resulted in a marked increase in the number of spam emails.

For our clients on our Managed Service plans, we work hard to ensure your systems are protected from harmful or malicious activity coming from the Internet. If you’re not under our Managed Service plans perhaps now is a good time to talk – let’s make sure your systems are safe in 2010.

Related articles

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
February 16th, 2010

firefoxMozilla, the organization behind the popular Firefox browser disclosed that two add-ons available for download on its website were vectors for Trojans that could compromise users’ computers. Add-ons allow users to extend and enhance the capabilities of Firefox beyond the default install. Normally they are scanned for malware before being uploaded onto Mozilla’s website, but apparently two of them managed to slip through Mozilla’s automated scans. The infected add-ons are Version 4.0 of Sothink Web Video Downloader and all versions of Master Filer.

Mozilla has since updated their scanning process, but as part of our ongoing security watch we are vigilant in continuously protecting our customers under our Managed Services program from malware – you can rest easy.

When managing your systems on your own, it’s highly advisable to be vigilant with security and always use antivirus software – even when downloading and using software from legitimate sources. If you have downloaded these Firefox add-ons, uninstalling them does not remove the trojans that they carry, and you’ll need to use antivirus software to remove any malware on their system. Need more information or help? Call us and we will be glad to assist you.

Related links:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
February 15th, 2010

business continuityWith the start of a new year, businesses commonly implement changes and launch new initiatives that have ramifications for your IT environment. Ignore them at your own peril.

Chief among your IT considerations should be a Business Continuity Plan, or BCP, which will allow your business to resume normal operations in the event of a significant data loss or network downtime. Unfortunately, recent studies have found that about half of small and midsize businesses have no BCP. That’s a huge risk; more than half of companies that experience catastrophic data losses go out of business within a couple of years.

And while it’s important to have a plan in the first place, it’s equally important that your BCP is flexible and scalable to adapt as your business undergoes changes.

Software installations, modifications, and updates as well as the addition of new hardware are an important part of business continuity planning. You must ensure your backup, storage, and recovery procedures and systems are kept current with these changes. Improper maintenance and outdated procedures can lead to backup errors that result in costly data losses. Unfortunately, some companies discover these errors too late – when they try to recover the data.

In addition to the IT considerations of a BCP, don’t ignore the human element. Someone, typically your IT staff, has to be in charge of overseeing BCP execution. But it doesn’t end there. Other employees have their roles, too, but do they know what those roles are? Have they been brought up to speed on the importance of backup and recovery, and what they need to do should you experience a catastrophic data loss? Has your business produced and printed a manual for employees to use as a reference?

Let us help you assess your business continuity strategy to make sure it takes all relevant aspects into account and is kept current with your evolving needs. Your business may depend on it.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
February 15th, 2010

tabletMuch has been said about the launch of Apple’s long awaited, new mobile device. Called the Apple iPad, the device promises to boost sales of a new category of computing devices called tablets.

What are tablets?
Tablets or tablet PCs are not new, and the concept itself has been around for 30 years. Although it’s had some success in industrial and commercial environments, it’s struggled to gain wide adoption among consumers in the past. Tablets, simply put, are slate-shaped, hand-held personal computers often with a touch screen or a stylus as input devices instead of a traditional keyboard. They are smaller and handier to carry around than Netbooks, but have larger, more capable screens than smartphones. With its launch, Apple has largely stolen the spotlight on tablet PCs – but is by no means the only vendor selling them. Other vendors include HP, Fujitsu, Samsung, Asus, and many more. Some use Windows, others Linux, while still others have their own proprietary operating systems.

A special category of tablet PCs is ebook readers such as Amazon’s Kindle and Barnes and Nobles’s Nook. These are specialized tablets, primarily designed for viewing digital content.

What are tablets good for?
For consumers, the tablet’s appeal is that its form makes it easier to carry around and surf the Internet. Its larger screen allows users to view and interact with applications and media more comfortably than with a smartphone.

What about business?
Tablets seem to have hit their stride in niche applications within industry and commerce. For people in the field, it can be more convenient to carry around and better suited to outdoor conditions than a laptop, yet can be as powerful and capable. With the entry of Apple into the market, more generalized business applications could find its way to the devices, including:

  • on-the-go presentation delivery
  • quick information access
  • on-the-go content creation and editing, such as photos, audio and video recording, and documents
  • easy information sharing and collaboration

Are Tablet PCs right for your business?
If you’re considering using Tablet PCs in your business, here are some things to consider:

  1. Connectivity. How does the device connect to the Internet? Can it work within your existing office network? Can it securely access your data remotely (i.e., work with your existing VPN infrastructure)?
  2. Security. Does the device support the encryption of data? Can it authenticate against your existing applications?
  3. Portability. How much power does it consume? How long can it go between charges?
  4. Interoperability. Can you access your existing applications such as email? Can you use your existing network services? Can it open existing data and file formats such as your office documents and spreadsheets? Does it require significant investment to outfit and manage on an ongoing basis?
  5. Usability. Does it have enough power to run the applications you need? Is it easy to use or will it require extensive training?

Even if you decide not to adopt the Tablet into your business environment, you may need to consider the impact that your employees may have using these devices on their own to do their work, as many began doing when Netbooks and Smartphones came out.

If you would like to learn more about how Tablet PCs can affect your business and your IT services, contact us today. We will be glad to help.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
February 11th, 2010

mobileMorgan Stanley has just released the Mobile Internet Report, which estimates that within five years, more users will access the Internet via mobile devices than desktop PCs. The growth in mobile Internet usage, according to Morgan Stanley’s analysts, is being driven by five technologies:

  1. 3G adoption – especially as more devices come out that support the wireless broadband standard at a lower price point than in previous years. Subscription costs for data access across the world have also been decreasing as service providers build out their infrastructure and achieve cost-efficiencies with scale.
  2. Social networking – which is driving a “constantly online” behavior among users engaged in communication, information sharing, and relationship building.
  3. Video – which has encouraged users to exchange rich, multimedia content online
  4. VoIP – which is lowering the cost of communication while improving the user experience by not tying them to their desks.
  5. Interesting new devices/initiatives – such as the launch of the iPhone, Palm Pre, and lately Google’s Android.

What does this mean for SMEs? Well, for one thing this will require more vigilant monitoring, control, and oversight. Mobile devices can pose a significant security risk, since it’s getting difficult to track the data going in and out of these devices. Also, audit and control tools and procedures are simply not as mature as those available for desktop computers. The risks associated with theft and loss also increase since mobile devices’ small sizes make them easy to conceal or misplace.

Is your organization ready for what’s coming? As mobile devices become the primary Internet access for consumers and workers, it’s time to for your organization to become aware of the issues surrounding their use.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
February 8th, 2010

commoncraftFor many people, learning begins by understanding the basic principles that drive a certain concept. Whether in technology or science or society, the world is filled with so many complex and complicated subjects that affect our lives, but remain largely misunderstood by the general public.

This is where commoncraft.com comes in. Owned and maintained by husband and wife team Lee and Sachi LeFever from Seattle, Washington, the site’s goal is simple: to present complex concepts in a way that can be easily understood by anyone.

Presented in videos they call “__________ in Plain English”, the LeFevers illustrate seemingly intimidating subject matter with terms that are easy to grasp – layman’s language, if you will – “in plain English”. Their first video, “RSS in Plain English”, quickly became an internet hit. Now they offer several free videos that use simple analogies to aid in comprehension accompanied by equally simple visual aids and illustrations. Topics include concepts about the environment, finance, society, and technology.

The videos are completely free and do not require registration to view. Videos are kept short and sweet, cutting to the heart of the matter so that the broken down concepts are easily retained. You’ll hear no fancy words or technical jargon; everything is presented in an easy but no-nonsense manner.

Common Craft can make a custom learning video for you for a fee, which you can discuss with them. Try giving their free videos a whirl and you’ll soon find out that some subjects aren’t as complicated as you might think.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
February 3rd, 2010

passwordSecurity firm Imperva recently released a warning to users of popular social networking website RockYou indicating that their accounts and passwords may have been compromised. According to the firm, a hacker may have accessed an alarming 32 million accounts. But what is more interesting in the wake of this news is an analysis made of the accounts and passwords stolen. From the data provided to researchers, it seems that a great number of users still use insecure passwords, such as those with six or less characters (30% of users); those confined to alpha-numeric characters (60%); or passwords including names, slang words, dictionary words, or trivial passwords such as consecutive digits, adjacent keyboard keys (50%). The most popular password? 123456. Are you using an insecure password? Let us guide you through best practices for information security. Contact us today.

Related links:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
January 31st, 2010

chineseEarly January, Google released a report detailing attacks on its infrastructure which it claimed to have originated from China. In the wake of its announcement, another report came out detailing what is purported to be an “organized espionage operation” originating from China. Known as “Operation Aurora”, the attack attempted to siphon information from 33 companies in the US, including Google. The attackers are believed to have exploited a vulnerability in Internet Explorer (IE). The vulnerability affect IE 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and IE 6, IE 7, and IE 8 on Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2. In the wake of the attacks Microsoft released a patch to address the vulnerability. If you are unsure if this patch has been applied to your systems, contact us for help.

Related links:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share