The Top 5 Network Security Mistakes

  1. Weak Passwords.You know you need to have a stronger password, yet “password” is still the #1 password used by computer users. For maximum security, your password should contain numbers and letters, both upper and lowercase combined.
  2. Lack of Education. Most viruses and spyware are invited by the user; therefore, if you want to make sure your employees don’t download viruses, take the time to educate them on what new viruses are circulating and about common scams.
  3. Lack of Maintenance. No software is perfect, which means security loop holes will be exploited by hackers the minute they are discovered. That’s why it’s critical to keep your security patches up to date.
  4. Plug and Surf. Computers are NOT designed “ready to go” out of the box. Before a phone line, ethernet cable or wireless card is anywhere near a new computer, certain security needs to be installed and/or configured. Ideally, this should include virus protection, multiple spyware scanners and a program that runs in the background to prevent malicious software from ever being installed.
  5. Do It Yourself. Setting up a network, applying proper security measures and downloading and installing software can be tricky. Large companies have IT departments. Small business owners should also ask for advice or even hire help. It’s worth the extra cost.

Who Else Wants To Win A $25 Gift Card?

Take my monthly Trivia Challenge and you could win too!

The Grand Prize Winner of last month’s Trivia Challenge Quiz is [name of winner and town]! They were the first person to correctly answer my quiz question from last month:

According to legend, what did St. Patrick drive out of Ireland?
a-Witches, b- Leprechauns, c-An SUV, d-Snakes

The correct answer is (d) – “Snakes.” Congratulations, [winner name], you’ve won a [25 Gift Card];! Now, here’s this month’s trivia question. The winner will receive a gift card to [NAME OF STORE OR RESTAURANT].

In a 1980 April Fools’ Day hoax, the BBC reported that the iconic Big Ben will undergo a drastic transformation. What was the transformation?

a) Becoming a Swiss watch
b) Double the size of the clock
c) Go digital

Call me right now with your answer! XXX-XXX-XXXX

Posted in Draft | Tagged , , | Leave a comment

Could You Be Breaking The Law By Not Archiving E-mails?

It’s 4:30 on Friday afternoon when you get the message that a key vendor will not be able to deliver what they promised on time, which will in turn cause YOU to miss a critical deadline for your most important client. Frustrated, you call the vendor, who instantly denies ever being told about the deadline. You know deadlines were discussed but can’t find it in your original written agreement. You then turn to your e-mail only to be forced to dig through hundreds of messages to try and find the e-mail where you conveyed the importance of this project being delivered on time, but you can’t find it because it was deleted.

Sound familiar? Or perhaps you’ve been in a similar situation where you’ve had to “dumpster dive” for old e-mail communications? Think about it – almost all of your business communications and negotiations are performed via e-mail, making them important documents to keep for reference. And since you send and receive hundreds if not thousands of e-mail messages annually, it just makes sense to have a simple and easy way to find old communication threads. But this isn’t just a convenience issue, it’s a legal one.

What Every Business Is Required By Law To Do

Some industries have strict federal guidelines on storing e-mail communications (financial institutions for example). But what most people don’t realize is that ALL businesses must comply with the Federal Regulations on Civil Procedures, or FRCP. In this instance, ignorance is far from bliss – it could put you and your organization in serious legal trouble.

The amendments, which went into effect on December 1, 2006, mandate that companies be prepared for “electronic discovery.” Simply put, that means you must know where your data is and how to retrieve it. Failure to do so can lead to fines or loss of a lawsuit.

But I Have A Backup…That Means I’m Okay, Right?

Wrong! E-mail archiving is not the same as conventional e-mail backups. Backups only enable you…

…to restore your e-mail servers to a previous point in time in the event of a disaster. An e-mail archive (unlike a backup) is indexed and searchable, which means you can find e-mail communications based upon various criteria, such as date, subject, sender or receiver address, attached files, or any combination of the above.
Aside from the legal issues, e-mail archiving just makes sense. Murphy’s law dictates that you’ll need an e-mail the minute you permanently delete it; that’s why it’s smart to archive your inbox. Plus, it will make searching your inbox infinitely faster (not to mention easier) AND prevent your inbox from getting so overblown that it stops working due to file size limitations.

If you want to set up an e-mail archiving solution for your company, give us a call at: xxx-xxx-xxxx or e-mail us at: [email protected]

Posted in Draft | Tagged , , , | Leave a comment

How To Spot An E-mail Hoax

With the Internet and e-mail providing a free, viral platform for online scammers, hackers and cyber criminals, there’s no doubt that at some point you’ll receive an e-mail hoax. Some are harmless, but many can lead to virus infections, identity theft or worse. Here are some common themes to watch out for:

  • Supposedly free giveaways in exchange for forwarding e-mails
  • Bogus virus alerts
  • False appeals to help sick children
  • Pointless petitions that lead nowhere and accomplish nothing
  • Dire, and completely fictional, warnings about products, companies, government policies or coming events

Probably the most common indicator that an e-mail is a hoax is the “Send this e-mail to everyone in your address book” request. Hoax writers want their material to be spread as far and wide as possible, so almost every hoax e-mail will have this request built into the message. In some cases, e-mail hoaxes will even give you a specific number of people to send the message to in order to collect a prize or get something for free.

Another surefire indicator that an e-mail is a hoax is that they don’t provide a checkable reference to back up claims. Genuine competitions, promotions, giveaways or charity drives will almost always provide a link to a company website or publication. Real virus warnings should only come from your installed anti-virus software. E-mails containing government or company policy information are likely to include references to checkable sources such as news articles, websites or other publications.

A third indicator is often the actual language used. E-mail hoax writers have a tendency to use an emotive, “over-the-top” style of writing peppered with words and phrases such as “Urgent,” “Danger,” “Worse virus ever,” and so on. Another indication is that these messages contain ALL CAPITAL LETTERS for added emphasis. When in doubt, don’t forward the message or take the action requested.

Client Spotlight: ABC Insurance
[Insert story about this client and what you did for them: If you are looking for a company to take the headache out of your insurance needs and save you a bundle too, look no more! We were recently introduced to them through a mutual client, Bob Smith of XYZ Corp. They were having some problems with their network which we fixed immediately.]

Would you like your company highlighted here in our “Client Spotlight?” Then give us a call today at XXX-XXX-XXXX

Posted in Draft | Tagged , , , | Leave a comment

When Can You Retire?

Here are some interesting facts about Social Security and saving for retirement that we thought you would find interesting as you file your taxes this year.

  • “By 2037, all the social security reserves will have been drained and the income flowing into the program will be only enough to pay 75% of the schedule benefits. If that sounds tolerable, consider that two-thirds of seniors rely on Social Security as their main source of income. The average annual benefit is $14,000.”
    – Washington Post
  • “Nearly eight in ten small business owners prior to the recession in 2007 thought they would have enough money to live comfortably when they retire. By 2010, fewer than two in three felt this way.” – Dennis Jacobe, gallup.com
  • “The average life expectancy was only 63 years when Social Security was first created, and there were 40 workers supporting each retiree. We now have about 3.1 workers for each retiree. And by the time I reach my mid-60s, there will be about two workers supporting me – and I don’t think they’re going to want to do that.” – Ken Dychtwald, New York Times
  • “56% of retirees had outstanding debt when they left the workforce, and 96% refused to delay retirement because of the outstanding debt. In addition, 59% had saved less than $50,000 towards retirement.” – Survey, nonprofit CESI Debt Solutions
Posted in Auto Publish | Tagged , , | Leave a comment

3 Reasons To Have A Blog (Even If Nobody Reads It)

Building a massive following online is no easy task. But before you give up on your company blog due to the disappointing number of people who read and comment on it, here are 3 reasons to reconsider:

  1. Search Engine Optimization. If for no other reason, blogging weekly about a particular topic will work wonders for your search engine optimization. Make sure your blog entries frequently include the keywords that people are likely use when searching for your services online, but avoid spamming the blog (overusing the words). There’s no scientific percentage here; just don’t repeat them so often that your writing seems unnatural to your readers.
  2. Free PR. The media is constantly surfing the web for content and for experts who can provide content and commentary. All it takes is one reporter to find you online and you could get tons of free publicity. You can bolster your chances of getting mentioned by writing about current events in the world or local news. For example, if you sell insurance and a hurricane or other natural disaster hits your town, you should blog about useful tips for people submitting claims to their insurance agents or how to determine how much insurance you should have, etc.
  3. Indirect Selling. Writing stories about projects you are working on, clients you’re serving or case studies is a great way to showcase your expertise and “indirectly” sell services. Of course, you can also use your blog for new product or service launches and get direct input from clients and prospects on new products and services they want to see.

Client Spotlight: ABC Insurance

[Insert story about this client and what you did for them: If you are looking for a company to take the headache out of your insurance needs and save you a bundle too, look no more! We were recently introduced to them through a mutual client, Bob Smith of XYZ Corp. They were having some problems with their network which we fixed immediately.]

Would you like your company highlighted here in our “Client Spotlight?” Then give us a call today at XXX-XXX-XXXX

Posted in Draft | Tagged , , | Leave a comment

Life’s Little Truths

Going to church doesn’t make you a Christian any more than going to a garage makes you a mechanic.

If you must choose between two evils, pick the one you’ve never tried before.

My idea of housework: Sweep the room with a glance.

Artificial intelligence is no match for natural stupidity.

No husband has ever been shot while doing the dishes.

Junk is something you keep for years then throw away 3 weeks before you need it.

By the time you can make ends meet, they’ve moved the ends.

Blessed are those who can laugh at themselves for they shall never cease to be amused.

Don’t forget Daylight Saving Time Begins Sunday, March 13th.

Spring forward! Be sure to set your clocks an hour ahead when you go to bed.

Posted in Auto Publish | Tagged , , , , | Leave a comment

The Lighter Side… Funny And Odd Quotes On Computers:

“To err is human, but to really foul things up requires a computer.” – Farmer’s Almanac

“Imagine if every Thursday your shoes exploded when you tied them the usual way. This happens to us all the time with computers and nobody thinks of complaining.” – Jef Raskin

“Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning.” – Rick Cook, The Wizardry Compiled

“To err is human – and to blame it on a computer is even more so.” – Robert Orben

“If the automobile had followed the same development cycle as the computer, a Rolls-Royce would cost $100, get a million miles to the gallon and explode once a year, killing everyone inside.” – Robert X. Cringely

“Where a calculator on the ENIAC is equipped with 18,000 vacuum tubes and weighs 30 tons, computers in the future may have only 1,000 vacuum tubes and perhaps weigh 1.5 tons” – Popular Mechanics Magazine, 1949

Posted in Auto Publish | Tagged , | Leave a comment

Can Criminals Use Your GPS To Burglarize Your Home?

GPSThe Story: A couple of weeks ago a friend told me that someone she knew had their car broken into while they were at a football game. Their car was parked on the green which was adjacent to the football stadium and specially allotted to football fans. Things stolen from the car included a garage door remote control, some money and a GPS which had been prominently mounted on the dashboard. When the victims got home, they found that their house had been ransacked and just about everything worth anything had been stolen. The thieves had used the GPS to guide them to the house. They then used the garage remote control to open the garage door and gain entry to the house. The thieves knew the owners were at the football game, and they knew when the game was scheduled to finish, so they knew how much time they had to clean out the house. It seems they even brought a truck to empty the house of its contents.

True Or False? While there are cases in which GPS devices have been used in crimes against their owners, this particular story is a “friend of a friend” e-mail legend according to www.Snopes.com. That said, there is a valuable lesson here: Don’t leave valuables in the car! GPS devices, like cell phones and laptops, are expensive electronic devices that are attractive to thieves. Plus, you should always make it a habit to lock your electronic devices using a strong password (one that contains upper and lowercase letters and numbers).

Posted in Auto Publish | Tagged , , | Leave a comment

4 Questions About Backups That Business Owners Should Know The Answers To

backupsThe old saying, “Pack your own parachute,” comes to mind when I think of data backups or, more specifically, data RECOVERY. However, how many people actually know how to pack their proverbial data backup “parachute” and instead rely on someone else – be it an employee or vendor?

If that’s you, read on. Since the absolute WORSE time to check your backups is AFTER a data disaster, all company CEOs ought to know the answers to the following questions NOW so they aren’t unpleasantly surprised later when data gets erased and they’re scrambling to get back up and running:

  1. Where EXACTLY is your data being backed up, and how do you get access to it? If it’s being hosted in a remote place, you ought to have the account information and a direct contact you can call if your vendor or employee goes missing with this information. Ideally, it should be in your network documentation that is kept in your operations manual or somewhere you can easily access it if necessary.
  2. Who’s responsible for monitoring the backups to make sure they are working? When data is lost, the finger pointing starts. It’s not uncommon to hear, “Well I thought (they/he/she) was in charge of our backups!” only to discover that this person (be it a vendor or employee) actually has no idea that they had such an important responsibility. Keep in mind that many offsite backup companies allow you to store your data there, but they won’t agree to ANY responsibility for whether or not the data is being backed up correctly, completely or in a format that can be restored.
  3. How often do you run a test restore? The only way to know if your backups are working properly is to…
  4. conduct a test restore or “fire drill” of your data. We recommend running this once a month at a minimum to verify that you can actually restore from your backups in an emergency.

  5. If your data is lost, what’s the process required to restore it? Some business owners don’t realize that their raw data backups would take a LOT longer to restore than they imagine. If you are not “imaging” your data (a process that takes a snapshot of your server as is) you will have to reload all of your software, set up the network, reconfigure your settings and THEN restore the data – a process that can take the better part of a week PROVIDED you still have your original software discs and licenses.

Our Free Backup Audit will give you the answers to these critical questions. If you don’t know the answers to these questions, give us a call to schedule a FREE inspection of your backup process. At a minimum you’ll know for sure that your data is safe and in a format that can get you back up and running again FAST. Call: xxx-xxx-xxxx or email us at: [email protected]

Posted in Draft | Tagged , , , | Leave a comment

Social Media Policies In The Workplace

Back in November, the National Labor Relations Board issued a Complaint alleging that an employer illegally terminated an employee who posted disparaging remarks about her supervisor on her personal Facebook page. The posting referred to her supervisor as a “psychiatric patient” and used several vulgarities, which resulted in other employees chiming in (Associated Press, November 2010).

While the Complaint is only an accusation and not a formal ruling from the NLRB, the repercussions of this action are critically important for employers of both unionized and non-unionized employees alike. Many employers are now reviewing their social media policies with a view to determining what they can lawfully prohibit employees from posting online.

Although we cannot provide any legal advice, one of the things we can help our clients with is establishing an acceptable use policy that outlines how employees can use company resources, such as their e-mail, Internet and electronic equipment. We can also help by setting up monitoring software that can either allow management to govern employee access to certain web sites, such as gambling, porn, career sites, etc., or block employees from those sites all together. If you want to keep employees focused on being productive at work, then give us a call for a free consultation and trial of this software.
Who Else Wants To Win A $25 Gift Card?

“Take my monthly Trivia Challenge and you could win too!”

The Grand Prize Winner of last month’s Trivia Challenge Quiz is…drum roll please… [name of winner and town]! They were the first person to correctly answer my quiz question from last month:
In 1657 the first chocolate shop opened up in what city?
a-London, b-Vienna, c-Amsterdam, d-All of the above
The correct answer is (a) – “London.” Congratulations, [winner name], you’ve won a [$25 Gift Card]! Now, here’s this month’s trivia question. The winner will receive a gift card to [NAME OF STORE OR RESTAURANT].
According to legend, what did St. Patrick drive out of Ireland?
a-Witches, b- Leprechauns, c-An SUV, d-Snakes

Call me right now with your answer! XXX-XXX-XXXX

Posted in Draft | Tagged , , , | Leave a comment
  • Categories

  • Categories

  • Archives