Need Assistance? Call us at (512) 814-8044, or submit a ticket

The ABCs of a Business Continuity Plan

Image of replicated computer system to enable business continuity.

The ABCs of a Business Continuity Plan: How To Stay in Business After an Extended Outage

You’ve probably heard this sermon a million times, but we will keep harping on it until small business owners start taking the issue of business continuity and disaster recovery planning more seriously. Especially in this new era of daily reports of ransomware attacks.

Those in the trenches know the familiar drill: you get a call about a failed hard drive, a system that is down, a lost laptop, a folder encrypted by a former employee, or the worst, an inaccessible office. Of course the first statement you make is “no problem, we’ll just restore from backup“. That is until you see the guilty look on the client’s face and the reality hits you: there is no backup or if there is one, it is either not up to date or has never been verified.

Business continuity is about having a plan to deal with difficult situations, so your organization can continue to function with as little disruption as possible. (more…)

Share

0 Comments

Is Your Computer Network Killing Your Business?

Is Your Computer Network Killing Your Business?

Your computer network is more important than ever. When it slows down, your business slows down. When it’s under attack, your business is under attack.

In the past, you could use a simple consumer WiFi router. Today, that’s like having your front door open 24 hours a day. Disaster will strike – the only question is when.

You are losing money when your network is not managed. Here are a few ways it happens:

Employees Wasting Time

When a network isn’t managed, your staff can reach any website at any time. They can use company resources – like your computer and internet connection – to chat on Facebook and play games. How much time have they wasted already? (more…)

Share

Comments Off on Is Your Computer Network Killing Your Business?

How Businesses Can Protect Their Wireless Access Points

Image of Wireless Access Points The current high rate of mobile users warrants that wireless access users, especially business users, should know how to protect their wireless access points.

First of all, regular business travelers, high-tech adventurers, or those who just love traveling are increasingly vulnerable to unique cyber security threats. This is even more dire in the case of busness travelers because they often carry sensitive data that may be personal or business related.

And most noteworthy, this sensitive data reside on a variety of devices from laptops, tablets, and smartphones to other smart devices such as wearables and home appliances.

A recent survey of financial districts found a high percentage of Wi-Fi clients actively probing for “Free Public WiFi”, and cyber criminals create fake wireless access points (SSIDs), hoping that unsuspecting users will log into one of these.

Fraudulent SSIDs Can Lead To Wireless Access Points Attack

It can be tough to convince users — especially those challenged by shrinking travel budgets — to avoid the temptation and draw of free wireless Internet access. When employers can’t or won’t pay for unlimited wireless Internet, employees get creative. Why should they waste thankless hours waiting for planes and trains when they could be using Free Public WiFi to catch up on mail, download iTunes, or watch a little Slingbox? (more…)

Share

Comments Off on How Businesses Can Protect Their Wireless Access Points

Password Strength is Key in Business and Personal Information Security

In today's technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong passwords is to leave the door wide open to identity theft and corporate piracy. Your passwords must be a robust combination of all the characters that are available, must be unique for different applications and must…

Comments Off on Password Strength is Key in Business and Personal Information Security

How To Cut Costs With Hosted Digital Phones

This is the Internet Age. Broadband and high-speed connections in the small to midsize business environment is now the norm as opposed to the exception it was a few years ago. What does that mean for the small and midsize business owner? Huge cost savings for one, in the area of communication. With the many offerings available today, it is not uncommon for businesses to reduce telephone costs by as much as eighty (80) percent. Here’s the rundown.

VoIP is a term that refers to Voice over Internet Protocol. It is a technology that allows phone calls to be made using high-speed Internet connections like cable, T1 or high-end DSL. Other common names for VoIP are IP, digital and Internet phones. The unique thing about digital phone technology is that it works with regular analog phones and this is important because since not everyone may have this technology in place, your calls will still be received whether the party you are calling has VoIP in place or not. (more…)

Share

Comments Off on How To Cut Costs With Hosted Digital Phones

How To Fix QuickBooks Error 3371 statuscode-11118

If you recently ran into a strange Quick Books error, specifically Error Code 3371 “Quickbooks could not load license data. This may be caused by a missing or damaged file.”,  with a status code of 11118, you are not alone. And it looks like this headache has been plaguing the users of the accounting software for several years.

The symptoms are usually that you are unable to open your company file in Quick Books and resolution attempts like repairing the installation fail, and you get prompts for a mysterious html file. (more…)

Share

7 Comments
Close Menu
Share
Share