Need Assistance? Call us at (512) 814-8044, or submit a ticket

The ABCs of a Business Continuity Plan

Image of replicated computer system to enable business continuity.

The ABCs of a Business Continuity Plan: How To Stay in Business After an Extended Outage

You’ve probably heard this sermon a million times, but we will keep harping on it until small business owners start taking the issue of business continuity and disaster recovery planning more seriously. Especially in this new era of daily reports of ransomware attacks.

Those in the trenches know the familiar drill: you get a call about a failed hard drive, a system that is down, a lost laptop, a folder encrypted by a former employee, or the worst, an inaccessible office. Of course the first statement you make is “no problem, we’ll just restore from backup“. That is until you see the guilty look on the client’s face and the reality hits you: there is no backup or if there is one, it is either not up to date or has never been verified.

Business continuity is about having a plan to deal with difficult situations, so your organization can continue to function with as little disruption as possible. (more…)

Share

0 Comments

5 Critical Facts You Must Know Before Hosting Your Business In The Cloud

A laptop user connecting to multiple devices using cloud computing

Cloud hosting seems to be the rage these days, and for very good reasons.

When you decide to look into transitioning the computer network and operations of your business or organization to  cloud hosting, you will probably be faced with conflicting advice, confusion and no real answers to your questions and concerns over security, cost and whether or not it’s appropriate for your organization.

Besides that, the simple fact is, cloud hosting is NOT a good fit for every company, and consequently, if you don’t get all the facts or fully understand the pros and cons, you can end up making some VERY poor and expensive decisions that you’ll deeply regret later. (more…)

Share

Comments Off on 5 Critical Facts You Must Know Before Hosting Your Business In The Cloud

How Businesses Can Protect Their Wireless Access Points

Image of Wireless Access Points The current high rate of mobile users warrants that wireless access users, especially business users, should know how to protect their wireless access points.

First of all, regular business travelers, high-tech adventurers, or those who just love traveling are increasingly vulnerable to unique cyber security threats. This is even more dire in the case of busness travelers because they often carry sensitive data that may be personal or business related.

And most noteworthy, this sensitive data reside on a variety of devices from laptops, tablets, and smartphones to other smart devices such as wearables and home appliances.

A recent survey of financial districts found a high percentage of Wi-Fi clients actively probing for “Free Public WiFi”, and cyber criminals create fake wireless access points (SSIDs), hoping that unsuspecting users will log into one of these.

Fraudulent SSIDs Can Lead To Wireless Access Points Attack

It can be tough to convince users — especially those challenged by shrinking travel budgets — to avoid the temptation and draw of free wireless Internet access. When employers can’t or won’t pay for unlimited wireless Internet, employees get creative. Why should they waste thankless hours waiting for planes and trains when they could be using Free Public WiFi to catch up on mail, download iTunes, or watch a little Slingbox? (more…)

Share

Comments Off on How Businesses Can Protect Their Wireless Access Points

Credential Management Vulnerabilities Exposed By Breaches

Credential Management BreachThe recent breach of OneLogin is once again shining the spotlight on the safety and sanity of entrusting sensitive data to cloud-based credential management services. OneLogin provides single sign-on for cloud-based applications.

What Is A Credential Management Service?

Credential management services that offer Single Sign-On or SSO are great, but as we are beginning to find out, it could also be a single point of entry to a treasure trove of sensitive data for cyber criminals.

How Does A Credential Management Service Work?

The way credential management services work is that after a user of these Identity and credential management services sign into their account, the service takes care of remembering and supplying the customer’s usernames and passwords for all of their other applications. It pretty much attempts to save the user the pain and stress of trying to remember numerous passwords, security questions and other hoops people normally have to jump through just to access some online services.

What Is The Problem With Credential Management Services?

While a lot of these services promise secure access to, and a simplified Identity and Access Management (IAM), the recent spate of multiple breaches of LastPass and now OneLogin makes us wonder just how efficient and  secure these credential management services really are. And here is why: a single compromise exposes the credentials of all users, especially if that data theft includes the ability to decrypt encrypted data [thanks to Mark Maunder of Wordfence for that emphasis].

A breach that allows intruders to decrypt customer data could be extremely damaging for affected customers.

The vulnerabilities in credential management services like LastPass were so bad that Tavis Ormandy, a security researcher at Google’s Project Zero wondered if people were “really using this lastpass thing” because he took a quick look and could see “a bunch of obvious critical problems”. (more…)

Share

Comments Off on Credential Management Vulnerabilities Exposed By Breaches

Mobile Device Safety Tips For Commercial Printing Executives

Image of a mobile phone with a chain and padlock on it as a symbol of mobile device safety

Mobile Device Safety Tips For Commercial Printing Executives

It is safe to say that most executives of commercial printing businesses are tied to their mobile phones. Given the sensitive nature of the customer data they sometimes have to manage and communicate, mobile device safety is very important.

Commercial printing executives sometimes have a crazy schedule, and usually have to deal with the erratic demands from customers who want the job done now, on the fly – even when Print-on-Demand customers submit design materials late, or approve proofs at the last minute.

Mobile devices come in handy for looking up requests for quotes, proof approvals, sending files to customers, and browsing websites. At times, when there is a little break from the hectic schedule, mobile devices allow us to keep in contact with friends and family, buy stuff, and pay bills.

Mobile devices can be a double-edged sword. They allow us to store data, contact information, photos, emails and files; and when we can afford to take breaks, provide a source for entertainment.

They could also be a major source of headaches by exposing users to malicious software.

Not managing their usage properly can lead to situations where all that personal information and valuable data, not to mention the information of customers and partners, could be at risk. (more…)

Share

Comments Off on Mobile Device Safety Tips For Commercial Printing Executives

Prevent Downtime, Keep Cyber Thieves At Bay, and Prepare For Disaster

How Organizations Can Prevent Downtime And Ensure That Even If Cyber Thieves Keep A-Knockin’, They Can’t Come In

Image of icons of security shield, bug prevention, and secure laptop

Small businesses and organizations in Round Rock, Texas and surrounding cities can prevent downtime, keep cyber thieves at bay, and prepare for disaster by implementing simple backup and disaster recovery strategies.

A study presented at the International Conference on Dependable Systems and Networks showed that small-business networks are attacked every 39 seconds by some type of hacker or malicious software. Thankfully, having the proper firewall and office network security tools can prevent even the most determined cyber hacker from getting his hands on your network. Are your systems covered?

Does your organization have someone looking after the network who knows what they’re doing? Or is the IT position assigned to the so-called “Accidental IT Person” – an ad hoc position taken on by whoever knows the most about computers? The danger  of not being able to prevent downtime here is that if this person has a full-time job, perhaps as the office manager, or graphic designer, they won’t necessarily be keeping everything locked down and updated.

A good way to prevent downtime is to have a dedicated IT person on staff, or outsource the task to a local computer service company. By leveraging an IT services provider, you will have access to a team of qualified experts. (more…)

Share

Comments Off on Prevent Downtime, Keep Cyber Thieves At Bay, and Prepare For Disaster
Close Menu
Share
Share