5 Easy Things You Should Do To Protect Your Business Now

Let’s face it: no one likes to think about bad things happening to them, much less plan for them. So, we want to give you a quick “brush-up” on some simple things you can (and should!) be doing to protect your business.

 

  • 1. Review Your Business Insurance Carefully.

    Most businesses carry some type of general liability insurance that would pay them if their building and the things in it were damaged. However, many businesses do not have enough coverage to replace all the computer equipment and devices, desks, art, supplies and other things they’ve accumulated over the years that are housed in their office. Make sure you review your policy every year and keep in mind new additions and assets you’ve accumulated during that year.

  • 2. Consider Cloud Computing.

    One of the biggest advantages of cloud computing is that your data and assets are stored off-site in a highly secure, high-availability data center, with failover and redundancy built in. That means that if your building were destroyed and you had to evacuate, or if your server melted down due to an unexpected hardware failure, everything you’ve worked so hard to create over the years is safe and not a sitting duck in your unsecured closet or server room.

  • 3. Secure Your Data.

    Making sure that your data is protected from theft is a never-ending battle you don’t want to lose. Companies that get hacked and expose sensitive client and employee data can face severe penalties, lawsuits and massive loss of credibility in the marketplace. Make sure you never have to send an e-mail to your customers explaining the bad news that a hacker accessed their info through you. Further, if you keep any sensitive information (even passwords to portals containing sensitive information) on portable laptops, phones and other devices, make sure you have a way of controlling and safeguarding that information.

  • 4. Write A Simple Disaster Recovery Plan.

    The key word here is “simple.” If your plan gets too complicated or difficult, you won’t do it. But at a minimum, think of the disaster that is most likely to happen and that would have a severe and negative impact on your company’s survival.

  • 5. Review Your Employee Internet Policy.

    With so many people “addicted” to Facebook and Twitter, it’s important that your employees know where the line is in what they can and can’t post online. We also recommend content-filtering software to block content and web sites you don’t want employees visiting during work hours.

about the author

ashleypic01

Ashley Smith-Jenkins

Ashley has vast experience in the information technology field relating to computer and network services, including web development. For the past 20 years, Ashley has provided computer consulting and implementation for his customers. Ashley’s educational experience includes a Bachelor’s in Business Administration at the California State University of Fresno, as well as a being a Fluke Networks Certified Cabling Test Technician (CCTT), and CompTIA A+ Certified. | LinkedIn

 

Fill Out The Form Below To Schedule Your Network Health Check.
This service (normally $197) is FREE if you act TODAY!!

 

Our FREE Network Health Check will look for any problems in your IT network and make recommendations. At no charge, a senior technician will come to your office to perform a thorough 27-point network audit to look for security loopholes, hidden viruses and spyware, and other lurking problems. During the health check, we will:

  • PINPOINT ANY EXPOSURE OR RISK

    to potential lapses in security, data backup, power outages, and system down-time.

  • REVIEW YOUR CURRENT BACKUP TO MAKE SURE THE DATA ISN’T CORRUPT.

    It’s not uncommon for backups to fail, or for the data to be corrupt without any visible signs.

  • RECOMMEND WAYS TO SPEED UP YOUR COMPUTER NETWORK

    while cutting support costs.

  • OUTLINE A POWERFUL AND COMPREHENSIVE LINE OF DEFENSE

    against even the most evasive and deadly computer viruses, hackers, and spam for your specific network.

reCAPTCHA
Sending

Your Computer Network Is Being Hacked!

Your small business is under attack. Right now, extremely dangerous and well-funded cybercrime rings are using sophisticated techniques to hack into thousands of small businesses to steal credit cards, blackmail you to recover data and swindle money directly out of your bank account.

82,000 NEW malware threats are being released every single day and HALF of the cyber-attacks occurring are aimed at small businesses just like yours. You just don’t hear about it because it’s kept quiet for fear of bad PR, lawsuits and sheer embarrassment.

The National Cyber Security Alliance reports that 1 in 5 small businesses have been victims of cybercrime in the last year and this number is growing rapidly as businesses continue to move to cloud computing and mobile device, and to store more information online.

 

Here are 7 critical security measures your business must have in place to have any chance of fending off these criminals:

  • 1. Train Employees On Security Best Practices.

    The #1 vulnerability for business networks is the employees using them. If they don’t know how to spot infected e-mails or online scams, they could infect your entire network.

  • 2. Create An Acceptable Use Policy (AUP) And Enforce It!

    An AUP outlines how employees are permitted to use company-owned PCs, devices, software, Internet access and e-mail. Having this type of policy is critical if your employees are using their own devices to access company e-mail and data.

  • 3. Require STRONG passwords throughout your company.

    Passwords should be at least 8 characters and contain lowercase and uppercase letters, symbols and at least one number.

  • 4. Keep Your Network Up-To-Date.

    New vulnerabilities are found almost daily on common software programs you use all the time; therefore it’s critical you patch and update systems frequently.

  • 5. Have An Excellent Backup.

    A quality backup can foil even the most aggressive ransomware attacks, where a hacker locks up your files and holds them ransom until you pay up. If your files are backed up, you don’t have to pay to get your data back.

  • 6. Don’t Allow Employees To Download Unauthorized Software.

    One of the fastest ways to access your network is by embedding malicious code in seemingly harmless apps.

  • 7. Don’t Scrimp On A Good Firewall.

    Your firewall is the frontline defense against hackers, so you need a really good one, with monitoring and maintenance done regularly.

about the author

ashleypic01

Ashley Smith-Jenkins

Ashley has vast experience in the information technology field relating to computer and network services, including web development. For the past 20 years, Ashley has provided computer consulting and implementation for his customers. Ashley’s educational experience includes a Bachelor’s in Business Administration at the California State University of Fresno, as well as a being a Fluke Networks Certified Cabling Test Technician (CCTT), and CompTIA A+ Certified. | LinkedIn

 

Fill Out The Form Below To Schedule Your Network Health Check.
This service (normally $197) is FREE if you act TODAY!!

 

Our FREE Network Health Check will look for any problems in your IT network and make recommendations. At no charge, a senior technician will come to your office to perform a thorough 27-point network audit to look for security loopholes, hidden viruses and spyware, and other lurking problems. During the health check, we will:

  • PINPOINT ANY EXPOSURE OR RISK

    to potential lapses in security, data backup, power outages, and system down-time.

  • REVIEW YOUR CURRENT BACKUP TO MAKE SURE THE DATA ISN’T CORRUPT.

    It’s not uncommon for backups to fail, or for the data to be corrupt without any visible signs.

  • RECOMMEND WAYS TO SPEED UP YOUR COMPUTER NETWORK

    while cutting support costs.

  • OUTLINE A POWERFUL AND COMPREHENSIVE LINE OF DEFENSE

    against even the most evasive and deadly computer viruses, hackers, and spam for your specific network.

reCAPTCHA
Sending

Does The Thought Of Your In-House Computer Expert Leaving Scare You To Death?

Here’s an scary question most businesses don’t think about: what would happen if your computer guy suddenly quit? Most business owners think it would only be a temporary inconvenience when, in fact, the opposite is usually true. Want to know how much you are at risk? Ask yourself the following 6 frightening questions:

 

  • 1. Do you have written network documentation about your computer network?

    What software licenses do you own? What are the critical administrator passwords to your systems and devices? How is your computer network structured? What hardware do you own and when do your equipment warranties expire? Are there cloud vendors for email, online storage, hosted line of business applications, etc. that you don’t currently have? You should NEVER allow a single IT person or company keep this information under their full control over your network and company. If they suddenly left for any reason, this could lead to huge consequences for your company.

  • 2. Do you know where your backup files are stored and if they are being stored properly?

    If you are like most business owners, you’re too busy dealing with the “crisis of the day” to think about system backups and probably leave tasks to your internal expert. If your database gets fried and your tech is nowhere to be found, you might be in a lot of trouble.

  • 3. Do you have a written plan for restoring your network fast in the case of a disaster?

    If you don’t have a fully tested disaster recovery plan for your office, you could be at serious risk without ever knowing it until something happens.

  • 4. Do you know where all of your software is stored?

    Bad things can happen to computers and servers, and the situation can be made worse if you are not prepared. Taking a minute to organize and store your software in a secure place can save you a considerable chunk of money in the event that you need to restore a program on your systems. If you don’t have access to the software or don’t know where it is located, you might be forced to buy the software again.

  • 5. Do you know what routine maintenance is being done on your network?

    I know that the very idea of learning about and keeping track of all the servers, workstations, and peripherals on your network is about as welcome as a black cat crossing your path, but it is important information to maintain. If your in-house expert leaves, who will take over?

  • 6. Do you know how to protect yourself from an ugly security breach if your in-house computer expert leaves?

    What happens if your in-house expert splits with no warning AND has access to your company’s network? As soon as humanly possible, you should disable his or her access, including remote access to your network and all cloud based applications.

So how did you do? If you answered “NO” to even one of these questions, you need to get the answers now before it’s too late.

 

about the author

ashleypic01

Ashley Smith-Jenkins

Ashley has vast experience in the information technology field relating to computer and network services, including web development. For the past 20 years, Ashley has provided computer consulting and implementation for his customers. Ashley’s educational experience includes a Bachelor’s in Business Administration at the California State University of Fresno, as well as a being a Fluke Networks Certified Cabling Test Technician (CCTT), and CompTIA A+ Certified. | LinkedIn

 

Fill Out The Form Below To Schedule Your Network Health Check.
This service (normally $197) is FREE if you act TODAY!!

 

Our FREE Network Health Check will look for any problems in your IT network and make recommendations. At no charge, a senior technician will come to your office to perform a thorough 27-point network audit to look for security loopholes, hidden viruses and spyware, and other lurking problems. During the health check, we will:

  • PINPOINT ANY EXPOSURE OR RISK

    to potential lapses in security, data backup, power outages, and system down-time.

  • REVIEW YOUR CURRENT BACKUP TO MAKE SURE THE DATA ISN’T CORRUPT.

    It’s not uncommon for backups to fail, or for the data to be corrupt without any visible signs.

  • RECOMMEND WAYS TO SPEED UP YOUR COMPUTER NETWORK

    while cutting support costs.

  • OUTLINE A POWERFUL AND COMPREHENSIVE LINE OF DEFENSE

    against even the most evasive and deadly computer viruses, hackers, and spam for your specific network.

reCAPTCHA
Sending

Could The Dog Days Of Summer Be A Threat To Your Business?

 

How To Ensure The Heat Doesn’t Fry Your Server (And Your Profits!)

With the “dog days” of summer upon us, most business owners are looking for ways to keep their company’s sales and profits HOT, while keeping their IT expenses COOL. But if proper attention is not given to your server and network equipment during the summer, all that heat outside can actually bring your company’s growth to a grinding halt and increase your IT expenses significantly.

Excess heat can be a big problem for small to mid-sized business servers, since a server that becomes overheated usually costs more in energy, fails more often and is more likely to crash. For most companies, a server crash can mean hours or days of downtime, unproductive employees, HUGE amounts of stress and thousands of dollars in lost opportunity.

7 Steps Every Business Owner Must Take To Prevent a Heat-Induced Server Crash

Here are a few simple things you can do to prevent your server and network equipment from overheating and crashing this summer:

  • 1. Tidy up the server room; a neater room will increase airflow.

  • 2. Keep the doors to the server room closed and seal off the space.

  • 3. Make sure cold air reaches all the equipment.

  • 4. Have a redundant A/C unit that is specifically designed for computers.

  • 5. Buy a rack enclosure where the cooling is built into the bottom of the rack.

  • 6. Keep the temperature at no more than 77 degrees Fahrenheit.

  • 7. Consider virtualization or cloud computing so that you are generating a lower amount of heat in the first place.

about the author

ashleypic01

Ashley Smith-Jenkins

Ashley has vast experience in the information technology field relating to computer and network services, including web development. For the past 20 years, Ashley has provided computer consulting and implementation for his customers. Ashley’s educational experience includes a Bachelor’s in Business Administration at the California State University of Fresno, as well as a being a Fluke Networks Certified Cabling Test Technician (CCTT), and CompTIA A+ Certified. | LinkedIn

 

Fill Out The Form Below To Schedule Your Network Health Check.
This service (normally $197) is FREE if you act TODAY!!

 

Our FREE Network Health Check will look for any problems in your IT network and make recommendations. At no charge, a senior technician will come to your office to perform a thorough 27-point network audit to look for security loopholes, hidden viruses and spyware, and other lurking problems. During the health check, we will:

  • PINPOINT ANY EXPOSURE OR RISK

    to potential lapses in security, data backup, power outages, and system down-time.

  • REVIEW YOUR CURRENT BACKUP TO MAKE SURE THE DATA ISN’T CORRUPT.

    It’s not uncommon for backups to fail, or for the data to be corrupt without any visible signs.

  • RECOMMEND WAYS TO SPEED UP YOUR COMPUTER NETWORK

    while cutting support costs.

  • OUTLINE A POWERFUL AND COMPREHENSIVE LINE OF DEFENSE

    against even the most evasive and deadly computer viruses, hackers, and spam for your specific network.

reCAPTCHA
Sending

5 Smart Tips To Know Before Moving Your Data To A Cloud-Based Application

Cloud computing is all the rage these days, and while some companies are moving their whole IT infrastructure to the cloud, many others are choosing to streamline their businesses by moving individual business applications.

If you are considering moving any of your company’s software applications “to the cloud,” make sure to consider these 5 tips BEFORE pulling the trigger:

 

  • 1. Back It UP!

    Migrating data to any new location is a mess, and anything can (and usually does) go wrong. Therefore, make sure you have good, recent backup copies of everything before you make the move.

  • 2. Maintain An On-site Copy

    At first, moving to the cloud can be a bit scary. What can help mitigate the risk (and the fear) is keeping a local, on-site copy of your data and network image on an NAS (network-attached storage) device. That way you have a local on-site copy in addition to the working cloud copy.

  • 3. Have A “Plan B” To Access The Internet

    One of the biggest questions about moving IT to the cloud is “What if the Internet goes down?” To mitigate that fail point, have a business-class Internet connection as your initial and main way to connect, and then also have a second Internet connection service as a backup. If Comcast is your main connection, for example, you might consider AT&T as a secondary connection.

  • 4. Use It As An Opportunity To Do Some Housekeeping

    You could just copy and paste your files from your local machines into the cloud, but why not take this as an opportunity to reevaluate the structure and organization of that data? This might include re-evaluating your file organization structure, updating permission levels on files and even archiving of old files and data that are currently cluttering up your server and costing you money by storing and backing them up.

  • 5. Phase The Move

    Don’t try to migrate everything all at once. Create a transition plan and implement it. Make sure you move your files in bite-size pieces so the changes are easy to digest for your clients, employees, partners and everyone else involved. This also gives you the opportunity to test the water before taking the plunge, and it allows you to put out one fire at a time instead of having all systems down or broken.

about the author

ashleypic01

Ashley Smith-Jenkins

Ashley has vast experience in the information technology field relating to computer and network services, including web development. For the past 20 years, Ashley has provided computer consulting and implementation for his customers. Ashley’s educational experience includes a Bachelor’s in Business Administration at the California State University of Fresno, as well as a being a Fluke Networks Certified Cabling Test Technician (CCTT), and CompTIA A+ Certified. | LinkedIn

 

Fill Out The Form Below To Schedule Your Network Health Check.
This service (normally $197) is FREE if you act TODAY!!

 

Our FREE Network Health Check will look for any problems in your IT network and make recommendations. At no charge, a senior technician will come to your office to perform a thorough 27-point network audit to look for security loopholes, hidden viruses and spyware, and other lurking problems. During the health check, we will:

  • PINPOINT ANY EXPOSURE OR RISK

    to potential lapses in security, data backup, power outages, and system down-time.

  • REVIEW YOUR CURRENT BACKUP TO MAKE SURE THE DATA ISN’T CORRUPT.

    It’s not uncommon for backups to fail, or for the data to be corrupt without any visible signs.

  • RECOMMEND WAYS TO SPEED UP YOUR COMPUTER NETWORK

    while cutting support costs.

  • OUTLINE A POWERFUL AND COMPREHENSIVE LINE OF DEFENSE

    against even the most evasive and deadly computer viruses, hackers, and spam for your specific network.

reCAPTCHA
Sending