Blog

February 15th, 2010

business continuityWith the start of a new year, businesses commonly implement changes and launch new initiatives that have ramifications for your IT environment. Ignore them at your own peril.

Chief among your IT considerations should be a Business Continuity Plan, or BCP, which will allow your business to resume normal operations in the event of a significant data loss or network downtime. Unfortunately, recent studies have found that about half of small and midsize businesses have no BCP. That’s a huge risk; more than half of companies that experience catastrophic data losses go out of business within a couple of years.

And while it’s important to have a plan in the first place, it’s equally important that your BCP is flexible and scalable to adapt as your business undergoes changes.

Software installations, modifications, and updates as well as the addition of new hardware are an important part of business continuity planning. You must ensure your backup, storage, and recovery procedures and systems are kept current with these changes. Improper maintenance and outdated procedures can lead to backup errors that result in costly data losses. Unfortunately, some companies discover these errors too late – when they try to recover the data.

In addition to the IT considerations of a BCP, don’t ignore the human element. Someone, typically your IT staff, has to be in charge of overseeing BCP execution. But it doesn’t end there. Other employees have their roles, too, but do they know what those roles are? Have they been brought up to speed on the importance of backup and recovery, and what they need to do should you experience a catastrophic data loss? Has your business produced and printed a manual for employees to use as a reference?

Let us help you assess your business continuity strategy to make sure it takes all relevant aspects into account and is kept current with your evolving needs. Your business may depend on it.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
February 15th, 2010

tabletMuch has been said about the launch of Apple’s long awaited, new mobile device. Called the Apple iPad, the device promises to boost sales of a new category of computing devices called tablets.

What are tablets?
Tablets or tablet PCs are not new, and the concept itself has been around for 30 years. Although it’s had some success in industrial and commercial environments, it’s struggled to gain wide adoption among consumers in the past. Tablets, simply put, are slate-shaped, hand-held personal computers often with a touch screen or a stylus as input devices instead of a traditional keyboard. They are smaller and handier to carry around than Netbooks, but have larger, more capable screens than smartphones. With its launch, Apple has largely stolen the spotlight on tablet PCs – but is by no means the only vendor selling them. Other vendors include HP, Fujitsu, Samsung, Asus, and many more. Some use Windows, others Linux, while still others have their own proprietary operating systems.

A special category of tablet PCs is ebook readers such as Amazon’s Kindle and Barnes and Nobles’s Nook. These are specialized tablets, primarily designed for viewing digital content.

What are tablets good for?
For consumers, the tablet’s appeal is that its form makes it easier to carry around and surf the Internet. Its larger screen allows users to view and interact with applications and media more comfortably than with a smartphone.

What about business?
Tablets seem to have hit their stride in niche applications within industry and commerce. For people in the field, it can be more convenient to carry around and better suited to outdoor conditions than a laptop, yet can be as powerful and capable. With the entry of Apple into the market, more generalized business applications could find its way to the devices, including:

  • on-the-go presentation delivery
  • quick information access
  • on-the-go content creation and editing, such as photos, audio and video recording, and documents
  • easy information sharing and collaboration

Are Tablet PCs right for your business?
If you’re considering using Tablet PCs in your business, here are some things to consider:

  1. Connectivity. How does the device connect to the Internet? Can it work within your existing office network? Can it securely access your data remotely (i.e., work with your existing VPN infrastructure)?
  2. Security. Does the device support the encryption of data? Can it authenticate against your existing applications?
  3. Portability. How much power does it consume? How long can it go between charges?
  4. Interoperability. Can you access your existing applications such as email? Can you use your existing network services? Can it open existing data and file formats such as your office documents and spreadsheets? Does it require significant investment to outfit and manage on an ongoing basis?
  5. Usability. Does it have enough power to run the applications you need? Is it easy to use or will it require extensive training?

Even if you decide not to adopt the Tablet into your business environment, you may need to consider the impact that your employees may have using these devices on their own to do their work, as many began doing when Netbooks and Smartphones came out.

If you would like to learn more about how Tablet PCs can affect your business and your IT services, contact us today. We will be glad to help.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
February 11th, 2010

mobileMorgan Stanley has just released the Mobile Internet Report, which estimates that within five years, more users will access the Internet via mobile devices than desktop PCs. The growth in mobile Internet usage, according to Morgan Stanley’s analysts, is being driven by five technologies:

  1. 3G adoption – especially as more devices come out that support the wireless broadband standard at a lower price point than in previous years. Subscription costs for data access across the world have also been decreasing as service providers build out their infrastructure and achieve cost-efficiencies with scale.
  2. Social networking – which is driving a “constantly online” behavior among users engaged in communication, information sharing, and relationship building.
  3. Video – which has encouraged users to exchange rich, multimedia content online
  4. VoIP – which is lowering the cost of communication while improving the user experience by not tying them to their desks.
  5. Interesting new devices/initiatives – such as the launch of the iPhone, Palm Pre, and lately Google’s Android.

What does this mean for SMEs? Well, for one thing this will require more vigilant monitoring, control, and oversight. Mobile devices can pose a significant security risk, since it’s getting difficult to track the data going in and out of these devices. Also, audit and control tools and procedures are simply not as mature as those available for desktop computers. The risks associated with theft and loss also increase since mobile devices’ small sizes make them easy to conceal or misplace.

Is your organization ready for what’s coming? As mobile devices become the primary Internet access for consumers and workers, it’s time to for your organization to become aware of the issues surrounding their use.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
February 8th, 2010

commoncraftFor many people, learning begins by understanding the basic principles that drive a certain concept. Whether in technology or science or society, the world is filled with so many complex and complicated subjects that affect our lives, but remain largely misunderstood by the general public.

This is where commoncraft.com comes in. Owned and maintained by husband and wife team Lee and Sachi LeFever from Seattle, Washington, the site’s goal is simple: to present complex concepts in a way that can be easily understood by anyone.

Presented in videos they call “__________ in Plain English”, the LeFevers illustrate seemingly intimidating subject matter with terms that are easy to grasp – layman’s language, if you will – “in plain English”. Their first video, “RSS in Plain English”, quickly became an internet hit. Now they offer several free videos that use simple analogies to aid in comprehension accompanied by equally simple visual aids and illustrations. Topics include concepts about the environment, finance, society, and technology.

The videos are completely free and do not require registration to view. Videos are kept short and sweet, cutting to the heart of the matter so that the broken down concepts are easily retained. You’ll hear no fancy words or technical jargon; everything is presented in an easy but no-nonsense manner.

Common Craft can make a custom learning video for you for a fee, which you can discuss with them. Try giving their free videos a whirl and you’ll soon find out that some subjects aren’t as complicated as you might think.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
January 20th, 2010

cloud computingWith more and more people and organizations accessing the Internet, and as the potential uses of the web grows, the way business is done is naturally evolving as well.

One example of this is the emergence of cloud computing services. In essence, this is the outsourcing of an organization’s IT services to a different company. Everything is managed through the Internet – through “the cloud”, hence the term.

There are three things that make cloud computing services different from usual hosting services:

  • The company only pays for the resources they use.
  • Subscribers can adjust the amount of service they get based on their need.
  • The service is completely managed by the service provider.

Cloud computing services also include providing virtual data storage – meaning you store your data off site on the cloud service provider’s secure servers. You can, however, still access your data through the Internet.

There are both private and public cloud services. A public cloud service is available to everyone on the Internet, while private services are only available to specific clientèle. Some cloud services use public clouds to provide private service, making them a virtual private cloud computing service.

The increasing use of the web in our personal and social lives as well as in business gives the trend of cloud computing services vast potential. However, this service is not for everyone – for instance, if you have reservations about keeping sensitive information in a location outside your organization, you might want to pass.

Want to learn the pros and cons of cloud computing services for your business model? Give us a call – we’d be happy to discuss a possible cloud computing road map with you.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
January 20th, 2010

five_reasonManaged IT services are the technology solution of choice for large businesses, but many small and medium businesses remain resistant to considering this approach. Below are five reasons you may want to change your mind.

Reason #1:  You need to control costs. In today’s economic environment, IT budgets have been slashed—but a cut in IT spending doesn’t come with a cut in demand for IT services. As a result, you have to do the same amount of work with fewer resources. Although managed services might cost more in the short-term, they cost far less in the long term once you account for the domino effect of lost productivity and customer dissatisfaction.

Reason #2:  IT complexity is increasing. The breadth of information technology a company requires places small- to mid-sized businesses at a distinct disadvantage. Equipment is constantly upgraded in the market, and new IT-related specialties are emerging in a variety of areas, from telephony to networking. It’s difficult for small businesses to maintain the expertise necessary to properly manage these new technologies.

Reason #3:  You’re more dependent than ever on IT. At the same time, companies have become dramatically more dependent on IT in the past few years—and increased use of IT leads to increased outages and greater loss of productivity.

Reason #4:  Your existing solutions are inefficient. In today’s world, a one- or-two person in-house IT department or consultancy simply cannot handle the occasional IT breakdowns that are bound to occur. In many cases, employees have to wait in line to receive help. As a result, not only are your employees less productive, their morale is also decreased—and unhappy employees are less productive employees.

Reason #5:  You need to maintain compliance. More and more companies are finding themselves subject to regulatory compliance, from Sarbanes-Oxely to the Health Insurance Portability and Accountability Act (HIPPA)—and most small businesses don’t have the resources to fully understand the requirements of these regulations, let alone comply with them.

Of course, the best reason to consider managed IT services may be that IT isn’t your specialty. If managing IT infrastructure has absolutely nothing to do with your core competency, why wouldn’t you outsource it to an expert? By implementing managed services, you can utilize your internal IT resources for other purposes, such as supporting your strategic business objectives.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
January 20th, 2010

backupSmall and medium-sized companies sometimes think that disaster planning is only for larger corporations, but recent changes in technology make such planning affordable for almost all business sizes. In fact, small businesses today can’t afford to be without such planning.

As a small business owner, you should have three goals when it comes to disaster planning: ensuring that you never lose critical data, minimizing downtime, and recovering as quickly as possible in the event of a disaster.

Those actions fall into three different categories: backups, disaster recovery, and business continuity.

What’s the difference?

  • Backing up is the process of safeguarding your data by copying it to a safe medium for recovery in the event of loss.
  • Disaster recovery is the process of restoring operations that are critical to your business after a disaster occurs.
  • Business continuity is the creation of a plan that details how your organization will recover and restore interrupted functions after a disaster.

Business continuity is the most comprehensive of these three functions, because it involves much more than just a discussion of IT issues – it’s a detailed action plan. Certainly, you need to consider how you protect your IT infrastructure and data, but you also need to consider what you and your employees should do if a disaster occurs. Do your employees know where to meet in the event of a building evacuation? Do you have a plan for reaching out to all employees and their emergency contacts to communicate critical information? Do you have a way to communicate to customers when and how you’ll resume providing products or services? What will you do if one of your major suppliers experiences a disaster?

It’s hard to underestimate the importance of these three plans, but many small and medium businesses do. That’s because when most people think of disaster, they think of floods, earthquakes, and fires. They may even consider equipment failures. But there are human-induced disasters as well—for example, disgruntled or incompetent employees who delete critical information, or hackers. It could easily happen to you.

Perhaps you have a backup system in place. Maybe you even have backup, disaster recovery, and business continuity plans. But because business goals and environments change, any plan needs to be re-evaluated from time to time to make sure it’s still meeting all of your needs. We can help you evaluate your current plans, or sort through the options if you don’t yet have plans. Contact us for today for details.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
January 18th, 2010

bad_weatherThe prevailing bad weather in the United States and Europe has caused varying degrees of production delays in all sorts of industries and business. In circumstances like these, communication is especially important – when all members of the organization need to stay connected to keep operations coordinated and moving forward.

Bad weather or not, there has been an increased demand to maintain constant communication and continue productivity outside the office. With remote and mobile accessibility between all links in a company, efficiency can be maintained through working from remote locations. Your company’s employees – from the worker-bees out in field to supervisors, managers, and CXOs – no longer need to be limited by dependence on in-office resources.

Our services provide solutions that allow people to maintain communication regardless of the weather and other productivity-stalling circumstances. We realize the importance of being able to keep in touch, especially in critical situations such as the current weather conditions.

Please contact us to learn more about our communications solutions.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
January 10th, 2010

documentingYou expect your computer to work when you turn it on. The last thing you want is to waste valuable time trying to get your email running or wrestling with a web browser that won’t load.

These are frustrations you surely have experienced, and chances are you will again. But you don’t have to. Or, at the very least, you can make them as rare as your refrigerator breaking down or your car battery dying.

To get there, you need to understand how well your IT environment is running. No, we’re not suggesting that you look under the hood to figure out what does what and how. Leave that to the IT people. What we’re proposing is a comprehensive endeavor to document all your IT processes and inventory your IT assets. Identify your best practices – those processes and functions that experience has proven to run efficiently and produce the most desirable results – and document them as part of your overall business practices.

During the process of documenting your IT processes and functions, you’re bound to discover your IT environment isn’t as efficient as it should be – hence, your computer-borne frustrations. You’ll also identify needs that you weren’t aware of. Left unaddressed, these needs cut into productivity (and therefore profits), and can sometimes lead to costly IT network emergencies that would have been a lot less expensive with the right technology and proper maintenance in place.

Let us help assess your needs through this documentation process, and identify solutions that will bring you peace of mind. Some common solutions include outsourcing some of your network functions such as security, backup and recovery, or email, so that they are maintained and updated to keep them running smoothly and prevent costly downtime.

You expect your computer to work when you turn it on – and that is what we want to make sure happens.

Published with permission from TechAdvisory.org. Source.
Bookmark and Share
January 2nd, 2010

phishingTrusteer, a security solutions vendor, recently released the results of their study which shows how successful phishing attacks are, how many users respond to phishing attacks, and how many users submit their login information to criminal websites. The results are alarming. Among them:

  • Each phishing attack involves a very small percentage of customers (0.000564%), but due to the large number of phishing attacks, the aggregated number is significant
  • 45% of bank customers redirected to a phishing site divulge their personal credentials
  • 0.47% of bank customers fall victim to phishing attacks each year, translating to $2.4M-$9.4M in annual fraud losses per one million clients
  • Each financial institution was targeted, on average, by 16 phishing websites per week, translating to 832 phishing attacks per year per bank brand

Despite efforts by browser developers and security vendors to protect users from phishing attacks, a small number apparently are still able to bypass anti-spam/phishing protection – and when they do, the results can be damaging.

Let us help you protect yourself from phishing attacks. To find out more contact us today.

Related articles:

Published with permission from TechAdvisory.org. Source.
Bookmark and Share