Categories
Casserly Consulting Blog

No Business Should Be “Happy” to Lose 24 Hours’ Worth of Data

network_attached_backup_400.jpg

A new study by Disaster Recovery on the state of data backup for enterprises yields some rather disappointing results, particularly when it comes to the percentage of companies not enacting data backup best practices. Companies that fail to continuously backup their data, or fail to even back it up at all, are gambling with their future.

For starters, one of the most shocking finds from the study is how 72 percent of businesses are “happy to lose” more than 24 hours’ worth of data after a cyber-incident. When one looks behind the scenes as to why this is, they may find it in a company’s data backup practices. This is especially the case if a business is utilizing tape backup–a data backup procedure that typically backs up a company’s files once every 24 hours.

Admittedly, a business having tape backup is better than not utilizing any form of backup whatsoever; a category which 13 percent of businesses find themselves in, according to the study. However, being “happy” that your data backup needs are covered vs being “happy” about losing 24 hours’ worth of data should be viewed as two entirely different forms of “happiness.”

To clarify our point, consider your SMB in the following IT scenario: At the end of the work day, a designated employee goes to perform a backup of the day’s work by swapping out the old tapes for new ones. The following day, an employee responds to a spam message by clicking on a malicious URL contained within the message. This dumb move ends up infecting your entire network with ransomware, completely disabling operations. Thankfully, you’re able to deal with the ransomware by pulling out the backup tapes and restoring the data from the previous day. While such a move may make you “happy” that you’re able to resume operations, the inconvenient fact remains that your company just lost an entire day’s worth of data, plus several hours (if not more) to restore the data from a backup.

Now, some businesses may operate in an industry that doesn’t handle a ton of data on a daily basis. For example, think of a small retail storefront that’s operated entirely by the owner and all the business dealings take place on a single PC. A small business like this might not take too hard of a hit by losing 24 hours’ worth of data, but it would nevertheless be a costly inconvenience.

For the modern SMB leaning heavily on technology and utilizing enterprise-level solutions, the amount of data generated in a single day can be significant, and more so for companies whose business model revolves around generating digital content, like marketing firms, schools, hospitals, etc. If such an organization were to lose 24 hours’ worth of data, the consequences could range from very expensive to catastrophic.

It’s not overly complicated to do the math and put numbers to such a data-loss scenario. Consider how many payroll dollars are spent on paying employees to generate and handle data, then factor in how much money is made in a single day thanks to all of the data that’s generated. You’ll also want to consider how much money you’ll lose from having your company’s operations miss out on an entire day’s worth of work. Chances are, you’ll be making up the progress lost from that day over the course of several work days. When all of these calculations are compiled, there’s an extremely high chance that you won’t be “happy” with the results–and hopefully be much more motivated to backup your files multiple times each day.

To that end, COMPANYNAME offers a cloud-based data backup solution that makes copies of your files as often as every 15 minutes. Plus, unlike tape backup, the entire data backup process is automated, meaning that you don’t have to make a nightly task out of swapping out tapes. To equip your business with a backup solution that you can truly be happy with, give COMPANYNAME a call at PHONENUMBER.

Categories
Uncategorized

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

facebook_followers_400.jpg

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

This feature is called “follow,” which limits who can send you actual friend requests while still allowing some users to view your public posts. This is important primarily because hackers and scammers will often create fake profiles in an attempt to connect with potential victims. Their target might be sensitive credentials or other important information, so it’s important to avoid friend requests from people who you may not know.

To allow users to follow your profile and prevent users who don’t know who you are from sending friend requests, follow these instructions.

First, log into your Facebook account. If you’re using a desktop, select the down-arrow in the top right corner of Facebook. Once you’ve done so, click on Settings, which will be at the bottom.

Doing so will open up the General Account Settings. In the left column, notice the sub-categories for Facebook’s settings. You want to click on Privacy first.

In the Privacy Settings and Tools page, you’ll see sections that allow you to control who sees what you post on Facebook. The first option you want to find is the Who can contact me? Section. Click the Edit option and change the setting to Friends of friends. By doing so, you’ll be safe from friend requests from all but those who are currently on one of your friends’ rosters, and you’ll be able to send your own invitations in the same way as before.

If you want to give someone the ability to see what you post without accepting a friend request, you can enable public posts. This lets you share what you post, such as articles from your industry or professional development, without sharing personal posts that are meant for only your friends–effectively allowing you to split up your personal and professional posts. Just scroll down to Public Posts in the left column and open up the Public Post Filters and Tools page. Next, in the Who Can Follow Me section, select Public. Now you can select Public to make posts available to Followers, or Friends for posts meant only for your friends.

Granted, even with all of these measures, you still need to practice healthy skepticism when dealing with users on social media platforms. You never know who your latest friend could be, as it’s easy enough to hide behind the facade of an online account and pretend to be someone else. To learn more about how you can protect your business from online threats, reach out to us at PHONENUMBER.

Categories
Uncategorized

Employees Spend Nearly 80% of Their Time Communicating About Work. You Can Change That

more_efficient_meetings_400.jpg

How much time is wasted in your workplace just trying to communicate about potential projects? The notable difference between productivity and stagnation is that one is making you money, while the other is costing you money. Employees spend about 80 percent of their time in meetings, on the phone, or responding to emails, so it falls on the business owner to ensure that communications are as easy as possible so minimal time is wasted.

There are different approaches to this problem. The first place where you can cut down on wasted time is the one that you likely have the most control over: meetings.

Let’s face it; sometimes meetings aren’t as productive as they should be. One way to keep this from happening is to consider how you can make more efficient use of everyone’s time. Start by making a plan and considering what exactly is on the agenda. Ask yourself what the purpose of the meeting is, and if the goal of the meeting could be fulfilled more effectively in another way. If the goal of the meeting can be achieved without collecting your entire workforce into the same room, consider doing so.

Once you have determined that the meeting is the most efficient way to achieve this goal, you want to ensure that you communicate the purpose of the meeting to all of those who must attend. This way, everyone knows what they need to get out of the meeting, and nobody will be confused about why the meeting is being held. This keeps wasted time to a minimum.

By remaining cognizant of what your meetings should accomplish, you’ll inevitably save time and even wrap your meetings up earlier. This can even change the way that employees view meetings. Instead of keeping a meeting going long enough to fill in the space on their schedules, they will see that they can get more done since the goal was achieved earlier than expected.

Another way that you can make your meetings more effective is by creating an outline and then sending the agenda out to everyone at least 24 hours in advance. This way, your workforce knows what they can expect, as well as put together their own notes for quality input throughout the meeting. Another way that you can use this to your advantage is send them something to have read before the meeting starts–in essence, assigning homework. By using these methods, your meetings will be less improvised and more focused.

Once the meeting has ended, you can ask your employees for feedback regarding the process. If you take the time to listen to all participants’ feedback, you can then use it to improve the process and meet goals even more effectively next time. Eventually, it will lead to a chain reaction where meetings go by faster and faster, to the point where you have the process down.

When it comes to streamlining any processes in your office, the right technology can make or break the effort. Technology can help you make your meetings more efficient by utilizing video conferencing or voice chat technologies, so that your team doesn’t have to be in the same place all at once. They can even dial in with their mobile devices from their current location.

This strategic approach to collaboration technology can help your organization thrive, as well as focus on creating more opportunities for profit. To learn more about how there are technology solutions specifically designed to improve collaboration, reach out to us at PHONENUMBER.

Categories
Uncategorized

5 Security Threats that Spell Doom for Any Organization

you_face_security_threats_400.jpg

Fact: your business will always be susceptible to various security threats in at least some capacity. It’s up to you to counter these threats before falling victim to them. To help you with this, we’ll go over the top five threats that you need to be prepared for.

Viruses
Viruses are bits of code that plant themselves in your system and cause a myriad of problems. Viruses can cause system slowdown, problems with performance, and can even open the way for data theft or downtime. Security software like antivirus is usually enough to keep simple viruses out of your network, but more dangerous variants may be sneaky enough to dodge discovery and cause damage.

Malware
Also known as “malicious software,” malware infects a system and performs whatever its programmed function is. There are all sorts of variants out there, including spyware to watch the infected PC and capture keystrokes, and ransomware that can lock down files until a fee is paid. Malware complicates operations and can potentially put your business at risk of further data breaches.

Spam
Spam messages are both annoying and dangerous. Spam is the hacker’s preferred way of spreading viruses, malware, ransomware, and phishing scams, among other threats. They can effectively use spam to send out countless instances of the same attack to recipients all over the world. Thankfully, you can prevent the majority of spam simply by implementing a spam blocking solution. This can keep spam out of your inbox in the first place, eliminating the opportunity for user error or otherwise.

Phishing Scams
Hackers and identity thieves will use whatever tools they can to steal information from whole organizations, or specific individuals via targeted attacks. They may take advantage of the people or organizations with whom individuals associate themselves with, masquerading as vendors or close personal friends in order to gain their trust. The end result could be someone you think you know stealing sensitive information, like financial credentials or personally identifiable information. Take the time to understand some of the symptoms of these attacks, like poor spelling in messages or out-of-the-blue outreaches from the sender. Other common giveaway signs are unexpected urgent final notices or calls requiring immediate action. COMPANYNAME can help your business successfully identify these scams.

CEO Fraud
Whaling is a trend in which CEO fraud occurs by hackers stealing the identity of a C-level employee. For example, a hacker using the identity of a CEO could send legitimate-looking emails to the finance department asking for an immediate wire transfer. In these cases, the one on the receiving end of the message might not think anything of it and go ahead with the transfer. If you receive such a message, take a moment to question the legitimacy of the request by consulting official records regarding email addresses and telephone numbers associated with the message, or simply contact the CEO yourself. 

Does your business want to take network security to the next level? If so, reach out to COMPANYNAME at PHONENUMBER.

Categories
Uncategorized

Tip of the Week: Make Chrome Run Faster With These 3 Adjustments

google_chrome_issues_400.jpg

If Google Chrome is your preferred web browser, then you might notice that, just like any other application, its performance may fluctuate. When you experience issues with Chrome, it’s important to keep in mind that you can take steps to remedy the problem.

Here are three ways that you can make Google Chrome work better.

Make Use of Chrome’s Task Manager
Much like your computer’s task manager, Chrome has a feature that allows you to view your computing resources and programs at a glance. With Chrome’s built-in task manager, you can see information on browser tabs and extensions, and how much processing power they are using up. This information can help you diagnose which tabs are slowing down your browser. To open it, click the three-dot menu in the top right corner of the browser and click More Tools. Next, select Task Manager. Or, if you want a more straightforward path, just use the shortcut Shift + Escape.

Once the window opens, you’ll see all of the tabs and extensions that are currently in use, along with statistics concerning just how much resources they are consuming. If you find the offending tab, you can select it and click End Process. If you use this method to end an extension or an open tab, it will stop functioning until you reload Chrome.

Take Advantage of Hardware Acceleration
Before digging too deep into this, we want to make sure that you’re aware that it’s not always recommended that you implement hardware acceleration for your browser, as it depends on how powerful your computer is. If you’re unfamiliar with hardware acceleration and want to know how it can improve your browsing experience, reach out to your IT department or contact COMPANYNAME.

Hardware acceleration works by moving some of the burden off of your PC’s CPU onto the GPU, which can potentially resolve some processing problems by placing the page-rendering burden on the CPU. For this setting, click on the three-dot menu and open Settings. Then go down to the bottom of the window and find Show Advanced Settings. Go down from here and find the System section. Select Use hardware acceleration when available and restart Chrome to activate it.

Reset Google Chrome
If you’re not sure if your efforts have actually led to a better performance from Google Chrome, you can try resetting the browser’s settings. To do so, go past hardware acceleration and you’ll see the option to Reset Settings. Confirm your choice. Keep in mind that Chrome might not reset things like bookmarks, browsing history, or saved passwords, but it will get rid of settings like your default start page, your new tab page, your pinned tabs, and your default search engine.

Does your business have problems making the most of its technology? For more great tips and tricks, reach out to us at PHONENUMBER.

Categories
Uncategorized

When Investigating the Root Cause of an IT Issue, Remember to Check Company Policy

root_cause_400.jpg

Downtime is something that no business wants to imagine, but it’s something that is practically inevitable if you don’t prepare for it. You’ll be forced to wonder how long it will take to get back in business, but how this problem occurred is also important to discuss. Understanding how IT downtime occurs within your organization is the first step toward making sure that it can’t happen again.

It’s clear that being able to diagnose IT problems is a great asset to your organization since the issue will be identified and resolved in a timely manner. This information can help you keep issues to a minimum moving forward. The act of getting to the bottom of a problem is called a root cause analysis. An analysis of this variety focuses on basic troubleshooting practices, which begin by looking at the functionality and performance of your technology infrastructure. Since networks typically expand and become more complex over time, your root cause analysis will only grow more challenging to pull off.

Let’s consider how much work goes into performing a root cause analysis for a small business with only one server and a few workstations, compared to a larger organization that implements more advanced solutions such as desktop virtualization or cloud computing. Chances are that finding the root of a problem for a larger business will be more of a problem, as there is simply more ground to cover than with a smaller organization. Plus, ensuring the quality and accuracy of your root cause analysis will be more challenging without an IT expert on-hand to oversee the process.

In these situations, it’s also important to involve IT in the decision-making process when upper-level executives are making technology-related choices. Since IT outages often extend much farther than simple equipment malfunctions, the problem area is frequently a poor IT policy–something that a trained IT professional will be able to identify and resolve as the need arises.

Even something as simple as a hardware replacement policy could be a problem if it’s not up to the requisite standards. Any good IT technician knows that hardware cannot and will not last forever and that it will start to show signs of degradation. Therefore, the need to replace technology before it breaks down and hampers progress is of the utmost importance, so as to avoid data loss and the expensive unexpected costs of replacing servers, workstations, and other major components. If these solutions are being monitored properly by trained technicians, chances are that they will see the problem and address it before it becomes a major concern.

A proper IT technician can identify and resolve the issues on your network so that they don’t grow too large and become major problems. Unfortunately, smaller organizations with less flexible budgets often can’t support this proactive maintenance in house. In situations like this, COMPANYNAME is glad to help with our managed IT services. We can monitor your network and minimize the damage that your organization experiences from hardware failures, downtime, and data loss. To learn more, reach out to us at PHONENUMBER.

Categories
Casserly Consulting Blog

Microsoft OneNote May Be the Best Note-Taking Tool on the Market

one_note_benefits_400.jpg

Most modern PCs come pre-installed with a handy tool by Microsoft called OneNote (and it’s also included with Office 365). Today, we’ll run through the features that OneNote offers that make it a useful business tool.

Keep in mind, we’ll be focusing on OneNote 2016. Older versions of OneNote have some of the same features, but if you are running an older version of Office, you may want to consider upgrading.

Benefits of OneNote
OneNote was clearly designed with collaboration in mind, as you can save your Notebooks either to your local network drive, or to Microsoft’s OneDrive. You are able to share your Notebooks with others in your organization and work together, letting you collaborate on projects and share notes in the cloud.

While OneNote on its own isn’t the best word processor, spreadsheet app, or presentation software, it offers what can be described as the highlight reel of the other Office 365 applications. You can write, build simple tables, show charts and graphs, and even draw, but it won’t replace your other Office 365 applications.

Note Taking Capabilities
OneNote offers an impressive number of features that make it an excellent choice for quick note creation and organization. As you create a Notebook, you can divide it into tabs, and then divide those tabs into pages. OneNote also has premade templates for you to utilize, or you can create your own, to best arrange the particular information that note is to contain.

Of course, your notes can include more than just text. OneNote allows you to take clippings from web pages and insert them into your note. Another great thing about OneNote is you to pull text directly from images by right-clicking them, or search for text that appears in included images, with a considerably high level of success.

Plus, with the right equipment, OneNote supports handwritten note-taking, and is able to convert it into font-based text with good accuracy. The same can be said of its math function. By typing out or drawing a simple equation, the formula can be both converted to text and solved, as long as it was properly formatted. 

You can format your pages to suit your needs, and OneNote also offers a very handy feature that allows you to link content on one page to content elsewhere in OneNote for quick access. Finally, for added security, notes can be password protected, so if they are shared with someone they shouldn’t be, your data is still safe.

OneNote offers plenty of highly usable features to improve your business’ organization and collaboration. So, tell us, will you try it out in your company? Would you try it out for personal use? What do you use to stay organized? Let us know in the comments!

Categories
Uncategorized

Tip of the Week: How to Automatically Open a Windows App in Fullscreen

windows_apps_full_screen_400.jpg

If you’re a regular user of Windows applications, you’ll notice that they will, by default, open into smaller windows, allowing users to customize the size of their windows as need be. Usually, when you want to increase the size of the app, you have to click the maximize button in the top-right corner. However, you can save a little bit of time each time you do this by setting Windows to default to full-screen mode for this application.

First, you’ll want to pick the application, and find it’s shortcut on your desktop. When we say “shortcut,” we are referring to the little icons on your desktop that open a program, like Microsoft Word or your preferred Internet browser.

Select the app’s icon and right-click it. Go to the bottom of the dropdown menu and you’ll see Properties. Click it and you’ll open a Properties window, which will open up to the Shortcut tab.

You’re looking for the Run drop-down menu. It will be just a few selections down from the top of the tab. Currently, you’ll notice that it’s set to Normal window. However, if you click on the down arrow, you’ll be shown choices for Normal Window, Minimized, or Maximized. Click on Maximized, and whenever you open the program in the future, it will default to full screen mode. Once you’ve done this, click Apply to save the changes.

ib app full screen 1

While it might not seem like it saves a lot of time, it will certainly be more convenient. Just take a moment to optimize your settings now and you’ll save a lot of time and frustration in the future. To learn more about how to save time and optimize your business technology, subscribe to COMPANYNAME’s blog.

Categories
Uncategorized

You Can Now Generate Power By Literally Folding Laundry

new_feng_technology_400.jpg

Wouldn’t it be convenient if you could charge your smartphone just by walking down the street? How about turning your tie into a voice-recognizing security system? Michigan State University has been working toward creating some great new tech that makes these suggestions seem like real possibilities, in the form of a small device.

Nelson Sepulveda, an MSU Associate Professor of Electrical and Computer Engineering, along with his team, developed a device that can create power as it is bent or folded–which means it can be used as fabric for clothing. These devices are called biocompatible ferroelectret nanogenerators, or FENG.

Power is created by the device’s layers as energy is received through other sources; for example, the user’s physical motion. This allows for countless possibilities, including the ability to charge a device through only using FENG technology.

There are other ways that this technology can be used, including security applications. FENG material is very sensitive, so it could make it almost impossible to trick a voice recognition system. FENG could also be used as a speaker, adding to its versatility. In other words, it can work from both sides of the spectrum.

It’s also likely that FENG technology can be used to aid in discovering new ways to make technology more efficient for longer periods of time. This can help businesses achieve much more overall than they were previously able to, all without losing the ever-important battery charge. Read more about FENG here

What are your thoughts on FENG? Do you think that this will become a new standard for building new devices? Let us know in the comments, and be sure to subscribe to our blog for even more great business technology information.

Categories
Uncategorized

How the Convenience of The Internet of Things Can Come Back to Bite Us

internet_of_things_issues_400.jpg

While the Internet of Things has made many common tasks much easier through automation, it has also increased the potency of particular cybersecurity threats. For an excellent example, one only has to turn to the increasing prevalence of botnets that are powered by IoT technology.

An Overview of the IoT, and Why It’s Great For Botnets
If you wear a fitness tracker that automatically syncs to your phone, or have an Internet-connected security camera watching your house, you are utilizing the Internet of Things. Usually labelled as ‘connected’ or ‘smart,’ these devices collect data and process that data via a connection to the Internet.

While these devices have proven to be very useful, there is a major problem with them that seems to be present throughout the IoT: a noticeable lack of security measures. Combining this lack of security precautions with their need to connect to the Internet creates the ideal conditions for a botnet to gather.

A botnet pools the resources of a large network of infected devices to overcome the target’s security through a brute force attack. The attack on Dyn that made dozens of the web’s most popular sites go dark was a botnet, proving that this method of attack is no joke.

A New-ish Face on the Scene
While there is no shortage of botnets already, a new derivative of the infamous Mirai is using the same IP cameras to infect thousands of devices in China. This particular botnet has been named Persirai, and is just one of many that warrant concern.

For example, there is another botnet that Kaspersky Lab has concluded to have infected about 300,000 IoT devices. While this botnet, codenamed Hajime, is still dormant, it could potentially rival Mirai if it were to meet the expectations of security experts and become active.

Keeping Your Business Safe
Luckily, there are a few ways you can help to reduce the impact that a botnet can have on your business. A good rule of thumb is to follow business continuity best practices. As an example, your business data shouldn’t only be kept in one place. An offsite backup solution will allow you data to be preserved if you ever are assaulted by a botnet. It always helps to have a firewall solution in place as well, as they can mitigate some botnet attacks.

If you need help protecting your business against the vulnerabilities that the IoT creates, give us a call at COMPANYNAME. Call us at PHONENUMBER to get started.