2018 Newsletters

What To Look For When Purchasing A Computer

computer_browsing_small

At Christmas Time, people are looking to give presents that are practical. Those who are tech savvy know that some of their friends who also tech savvy would like to have a new computer under the tree this Christmas. 

Note: Every Four Years is the usual point in time that you should look into purchasing a new computer. By this time, the current operating system has had many service packs and updates and sometimes this will slow down the performance of the computer, whether it is a laptop or desktop. Also, viruses and/or malware can cause damage to the operating system, requiring a complete system reload. If you are at the four year mark, you might want to consider upgrading.

Here some things to look for when purchasing a new computer:

CPU Speed: The Central Processing Unit is the “brains” of the computer and is in charge of how much data flows through the unit. The slower the CPU, the slower the data flow. Many times CPU bottlenecks of older systems prevent the unit from operating at an optimum level.

Hard Drive: The hard drive is where the operating system, programs and data reside on (unless the data is saved and backed up elsewhere). An older hard drive that uses platters for reading and writing data to it will be slower than a later model solid state device. Newer hard drives have very fast access speeds compared to older units.

Memory: Random Access Memory (RAM) determines how quickly the operating system, programs and data loads into the “memory” of the computer. Later model computers can handle and usually have greater amounts of memory to facilitate more robust computer operations.

System Board: The system board (otherwise known as the “motherboard”) will have different components on it (cache, chipset, etc.) that will help the computer to run more smoothly and efficiently. The newer the board, the better.

IT Security: Security for the computer(s) is of the upmost importance. Having the right security measures in place is absolutely necessary, especially with the rise of Ransomware. This includes Windows 10 being the dominant operating system.

These are the different items to look for when purchasing a computer. The operating system and applications always will run better on a newer system. Also, you can take advantage of newer programs (both cloud and non-cloud) that will work better on a newer system as well. Please let us know if you would like to speak to someone about recommendations for purchasing a laptop or desktop.

When purchasing or upgrading a computer be sure to get best deal you can get from the store (in-store or online). Also, you may want to get an extended warranty for the unit as well if it is in your budget to do so.

If you would like to know more, please contact us at 1-800-871-9683 for a free consultation. Also, if you still have Windows 7 or 8 Computer(s) in your business, please give us a call to help you upgrade to Windows 10 and Office 365. Our email address is: markhuffman@creativebusinesstechnologies.com

Choosing The Right Disaster Recovery Solution

Online Backup

Are We Back Up And Running Yet?

It’s an all too familiar occurrence for businesses today: something goes wrong – from the simple accidental deletion, to the loss of an entire building’s worth of data – and IT is supposed to make it all better. Right now. (Is it done yet?)

This is not always the easiest task to accomplish. Why? It may be worth considering that you are using the wrong backup and recovery solution or you are simply using the one you have incorrectly.*

Define The Disasters

It’s impossible to plan your recovery if you don’t know what disaster is you’re protecting against in the first place. Take a look at this list of potential disasters and identify which ones are important to you (or your customers if you’re an MSP).

  • Loss of data—A deleted folder, a case of ransomware that encrypts every file on your server, or a database that becomes corrupt.
  • Loss of an application—Changes to security or system configurations, or even updates that negatively impact services.
  • Loss of a system—A hardware failure, or for those of you with virtualized servers, a crashed OS.
  • Loss of connectivity—When applications hosted inside your walls are used externally.
  • Loss of business location—Electrical outage, fire, flooding, or even a chemical spill outside the building.
  • Loss of operations—Any of the previous disasters can represent a complete stoppage of business operations.

Not All Data Is The Same

It’s crucial to recognize the importance of your data, applications, systems, connectivity, and locations, as you may need to respond with a completely different recovery strategy in different situations.

To truly define the disasters you want to protect against, you’ll need to define the loss instance granularity. Clearly you’re not going to treat all files on a file server with the same level of importance. You need to look at each data set, application, system, etc. and decide just how critical it is to the business.

For example, when thinking about a loss of data, you might be thinking about a specific file server and a few critical client endpoints. But when trying to protect against the loss of a location, you’re considering many more applications, endpoints, business processes, etc. The goal here is to make sure you know which parts of your environment need protecting, and from what disasters they need to be protected.

Getting Specific About RTO And RPO

Putting specifics around the amount of time you have to recover (Recovery Time Objective or RTO) and how much data you are willing to lose (Recovery Point Objective or RPO) on a per-recovery data set basis is key.

For example, a mission critical application may have an RTO of less than 15 minutes, and an RPO of less than 30 minutes, whereas files on a file server can have an RTO of 1 day, and an RPO of anything less than 1 week. Questions like how often to back up and where recovered data will be kept need to be answered for each of these objectives.

Remember, you’ll need to apply these objectives to each combination of “disaster” and data to be protected, because getting a server back up when there’s a loss of data is a completely different backup and recovery exercise than when there’s a fire in the building causing the server to go up in flames.

Defining The Actual Goal Of Recovery  

Finally, this step will yield a set of technical requirements you’ll use to select a disaster recovery solution. By answering the questions mentioned, you’ll start at the actual goal of disaster recovery—Recovery—and work backwards.

Take the example of an Exchange server potentially going up in flames to spec out the backup and recovery. The server room would be gone, and you need that back up and running within 30 minutes, without losing more than 30 minutes of data. Using these criteria, you’re going to need to be able to recover to an alternate location, use image- based backups (or you can’t meet the RTO of 30 minutes), have incremental backups no more than 30 minutes apart, and use some kind of continuous recovery strategy that restores the incremental image backup as it is generated.

Now you create a few entries in your list of disaster recovery solution requirements:

  • Image-level backups
  • Support for Windows
  • Continuous recovery
  • Data compression technology

One Size Does Not Fit All

Your recovery needs will dictate your solution. That means you need to build out the true list of features, support, and capabilities necessary to recover your environment.

By considering the possible disasters, matching them with the data sets to be protected, and identifying what the needed recovery objectives look like, all in an effort to build a tactical requirements list for the actual backup and recovery, you can build the list that specifically meets your organization’s needs. Ultimately, this will help you choose a disaster recovery solution that is sure to meet your needs.

In order to get the most from your managed services contract you must carefully compare all potential providers to ensure they are willing and able to provide the services you need to keep your business moving forward in the future. If your managed services provider cannot supply the following three things (at minimum) keep looking until you find a company that addresses these issues.

*Source: SolarWinds Backup 2017.

If you would like to know more, please contact us at 1-800-871-9683 for a free consultation. Also, if you do not have online BDR (backup-disaster-recovery) and anti-virus/malware protection for your business, please give us a call to help you implement the latest systems. Our email address is: markhuffman@creativebusinesstechnologies.com

10 reasons MSP clients need a layered security strategy to stay safe

www_icon_small

They say recognizing a problem is the first step in solving it. But when it comes to cybersecurity, many small-and medium-sized businesses don’t believe they have a problem. Many simply believe that hackers will focus their attention exclusively on large and well-heeled organizations, and aren’t interested in smaller businesses. Unfortunately, this couldn’t be further from the truth, and this “it won’t happen to me” mentality leaves them highly susceptible to attacks.*

While some attacks do target large corporations, most still do not discriminate based on the size of organization. Hackers just want to compromise the network and its devices to steal any and all data they can sell or use for their own ends. And once they’ve hacked a network server, they can use it to launch attacks on others.

This means that, in our current, constantly evolving threat landscape, simply deploying an antivirus solution isn’t enough. Only a layered security strategy that includes multi-vector protection can successfully fend off advanced, zero-day threats like ransomware, malware, and more.

1. It’s not a matter of if your clients will get hacked, but when.

Many small businesses don’t invest sufficiently in IT security resources and protection. This may be due in part to the fact that they may not know they’re being targeted. According to the Ponemon Institute 2016 State of SMB Cybersecurity Report, hackers have breached 50% of the 28 million small businesses in the United States.

2. The threat landscape evolves constantly.

Trying to keep pace with the changing nature of cyber threats is a full time job in and of itself. Many small- to medium-sized businesses cannot afford the cost of full-time IT security staff, which is why it’s imperative that their MSP keep them protected from zero-day threats.

3. End users may not know security best-practices.

In the last year, phishing was involved in 90% of breaches, which makes end users both the weakest link and the first line of defense for SMBs. The best way to counter this threats to continually train and educate users on the risks their behaviors. A well-trained user base can help prevent threats like ransomware, drive-by downloads, keyloggers, and many more.

4. Lack of effective security policies and protocols.

Ensuring all passwords are strong and regularly changed is a given, but it should be supplemented with strong, two-factor authentication. Access rights to network files, folders, and file shares need to be tightly controlled to avoid malware wreaking havoc on networks.

5. Exposure to multi-vector attacks.

All the ways your clients’ users interact with the internet need to be considered, from emails, attachments, links, and browser, to web browsing and network activity. Effective endpoint security is vital to protecting all these vectors from cyberattacks. It should feature multi-vector protection to defend your clients from threats that use many different exploits to attack.

6. Complex security platforms create administration challenges.

Consider not only the costs of buying cybersecurity software, but also the operational expenses. Systems that integrate best-of-breed solutions and have a high degree of automation make security both more effective and more affordable. Plus, they make the administrator’s job much easier.

7. Out-of-date systems create vulnerabilities.

By following a rigorous patching regime, your clients can avoid many of the application vulnerabilities used to compromise networks. Patching can be an onerous process, but many automated services are available to make it easier, more effective, and more affordable. News-making breaches like WannaCry could have been avoided by simply patching.

8. No network visibility.

Having accurate information about your network (and what is connected to it) is vital in protecting it from both internal and external threats. Effective network monitoring tools can identify network anomalies and counter threats before they do damage.

9. Poor data backup practices.

Faced with attacks like ransomware, SMBs must have an effective back-up regime. Sixty percent of small companies that suffer a cyberattack are out of business within six months. There are many on and off-premise cloud-based backup systems that will help you avoid such a fate, as even paying the ransom these days is no guarantee you will get your data back.

10. Compliance issues.

Regulations affect many industries, and effective endpoint security is a routine compliance requirement. It is vital to understand your clients’ compliance obligations and ensure they have sufficient cybersecurity in place.

Many of the security issues raised in this list are solved by our Managed Services All-in-One Solutions that we provide for our clients. It gives SMBs the peace of mind to know they’re protected from threats like the ones above.

*Source: Webroot, Inc.

If you would like to know more, please contact us at 1-800-871-9683 for a free consultation. Also, if you do not have online BDR (backup-disaster-recovery) and anti-virus/malware protection for your business, please give us a call to help you implement the latest systems. Our email address is: markhuffman@creativebusinesstechnologies.com 

Making the switch To Managed IT Services

Managed Services

When the time comes to make the switch to Managed IT Services, it is important to know what you are looking for from a provider. As most business owners have or are beginning to realize, there are plenty of benefits that can be realized by bringing on a managed services provider to address IT and other needs.*

In order to get the most from your managed services contract you must carefully compare all potential providers to ensure they are willing and able to provide the services you need to keep your business moving forward in the future. If your managed services provider cannot supply the following three things (at minimum) keep looking until you find a company that addresses these issues.

1. Security – The managed services provider that you choose should work with vendors that guarantee security. This is imperative when trusting an outside party to handle and maintain private and confidential data that is crucial to the running of your business. Service providers should provide detailed proof of security procedures as well as how they intend to keep abreast of changes in the industry.

2. Recovery – Managed IT Services providers are not only contracted to help keep the day-to-day running of your business going smoothly. They are also an important part of any recovery situation that follows a natural or man-made disaster. It is important to discuss with potential providers what procedures they have in place to guarantee your downtown will be minimal and that you will be up and running as soon as possible after an emergency. These precious minutes and hours can make or break the recovery of your business.

3. Customer Service – As with any other business, if there is no customer support backing up the products or services, there isn’t much of a commitment from the provider.

Why are these three things important? To understand you must consider the Managed IT Services model. Managed IT Services providers are hired by a company to provide any or all of the following services:

  • Website hosting
  • Network monitoring
  • Network security
  • Remote data backup
  • Recovery services

Originally these services were provided to large corporations while small to medium size companies struggled to maintain an IT budget that was often more expensive then beneficial. Managed services providers charge a flat, or monthly fee, making it possible for smaller businesses to reap the benefits offered at a much lower price than in-house IT staff or outsourcing on an as needed basis.

The Managed IT Services platform continues to grow as many businesses look for ways to reduce costs in this tough economy. By offering technological services that might otherwise be beyond the reach of a small business budget, managed services make it possible for smaller businesses to remain competitive with others in their industry.

Small business owners must take the time to carefully review and research each provider before signing on the bottom line. A good managed services provider can change the way you do business – in a positive direction, whereas the wrong choice could be a costly mistake that does more harm than good to your business.

*Source: SPC International Online, Inc.

If you would like to know more, please contact us at 1-800-871-9683 for a free consultation. Also, if you do not have online BDR (backup-disaster-recovery) and anti-virus/malware protection for your business, please give us a call to help you implement the latest systems. Our email address is: markhuffman@creativebusinesstechnologies.com 

The high cost of recovery from a Security Breach

Managed Services

Small to medium size businesses are what keep this country moving. Unfortunately, for many of these business owners, budgetary needs force them to make cuts that the mammoth corporations do not have to consider. These budget cuts can often result in reduced security and sub-par IT services that in the long run can end up costing the company even more money. Reacting to; and the recovery from, a security breach or attack always costs more after it has happened than what it would have cost to prevent it.*

This fact has been supported by recent surveys, and may come as a surprise to many small and mid-size companies who are under the false impression that hackers and other security threats target larger corporations. It has been discovered that companies that have less than 500 employees are actually more likely to be at risk of an attack or security breach than a larger corporation. Of course, this becomes a problem when the larger corporation has the resources to maintain higher levels of security at a time when smaller companies are dealing with restricted or; in some cases, frozen IT budgets.

The benefits of hiring a Managed IT Services Provider in preventing attacks and security breaches

With a security breach a real concern for small business owners, many are making the decision to bring on outside providers to address their IT needs. Managed services providers can offer an affordable solution to small business owners who are struggling to manage an internal IT staff. In some cases there isn’t even an IT person on staff, which can be just as costly for the small business when they have to bring in a professional on an as needed basis. Considering the money and time spent recovering from a security attack or breech, more business owners are realizing the cost of not having this level of protection is too high to pay. Here we look at how managed services providers can help business owners level the playing field against those who would infiltrate their security systems.

  1. Increased knowledge – Managed services providers are in the business of technology. They have trained staff who are able to prevent security breaches and spot any activity that could be perceived as a threat. Moreover, they have the expertise to stop threats and prevent the loss of sensitive and private information that can lead to costly recovery measures.
  2. Less expensive than in-house IT – Other IT professionals can provide the same security but it will cost much more to the business owner. What many owners are realizing is paying a flat monthly fee for security and other services provided by MSPs is actually much more cost effective than paying an internal IT staff or outsourcing based on incident.
  3. Proactive is better than reactive – The biggest benefit of having a quality managed services provider in your corner is the fact that you are acting in a proactive manner to ensure all of your systems are managed properly. This is less expensive and less time consuming than waiting for something bad to happen and then reacting.

Any small business can benefit from the security provided by a Managed IT Services provider. They can do so at a fraction of the cost, therefore eliminating the fear and unnecessary cost of trying to recover from a breech in security or attack.

*Source: SPC International Online, Inc.

If you would like to know more, please contact us at 1-800-871-9683 for a free consultation. Also, if you do not have online BDR (backup-disaster-recovery) and anti-virus/malware protection for your business, please give us a call to help you implement the latest systems. Our email address is: markhuffman@creativebusinesstechnologies.com

Ransomware: The smart person’s guide

AVG_Icon_Small

In the past, security threats often involved scraping information from systems that could be used for other crimes such as identity theft. Now, criminal organizations have proceeded to directly demanding money from victims by holding their devices—and data—hostage. This trend of ransomware, in which data is encrypted and victims are prompted to pay for the key, has been growing rapidly since late 2013.*

What is ransomware?
Ransomware is a subclass of malware that is characterized by holding device control—and therefore locally stored data—for a ransom, which is typically paid using virtual currencies such as Bitcoin, though often premium SMS messaging and prepaid credit cards are alternative options. Sophisticated ransomware attacks employ disk or file-level encryption, making it impossible to recover files without paying the ransom demanded by the hackers.

Historically, ransomware has invoked law enforcement to coerce victims into paying—displaying warnings such as the FBI logo and a message indicating that illegal file sharing has been detected. More recently, the authors of ransomware payloads clearly indicate that a device has simply been hacked.

Ransomware payloads are typically distributed on file-sharing networks, but have also been distributed as part of a malvertising campaign on the Zedo ad network, as well as through phishing emails that disguise the payload as maliciously crafted images or as executables attached to emails.

For criminal organizations, the use of ransomware provides a very straight line from development to profit, as the comparatively manual labor of identity theft requires more resources. As such, the burgeoning growth of ransomware can be attributed to the ease of deployment, and a high rate of return relative to the amount of effort put forth.

For IT professionals, the risk of ransomware extends beyond desktops and notebook workstations, but has historically included smartphones and other connected computing devices, such as Synology NAS products and Android TV devices. While home users were traditionally the targets of ransomware, business networks have been increasingly targeted by criminals. Additionally, servers have become high-profile targets for ransomware attackers, as unpatched software makes systems vulnerable.

Who does ransomware affect?
In particular, healthcare service providers have been explicitly targeted in recent ransomware attacks, as well as public sector employees. Less sophisticated ransomware attacks purport to be able to restore your files after payment, though in reality the files are deleted whether users pay or not.

Ransomware attacks are generally quite successful for criminal organizations, as victims often pay the ransom. Specifically targeted attacks may result in increasingly higher ransom demands, as attackers become more brazen in their attempts to extort money from victims.

When is ransomware happening?
While the first rudimentary ransomware attack dates back to 1989, the first widespread encrypting ransomware attack was CryptoLocker, which was deployed in September 2013. Originally, victims of CryptoLocker were held to a strict deadline to recover their files, though the authors later created a web service that can decrypt systems for which the deadline has passed at the hefty price of 10 BTC (at the time of publication, the USD equivalent of 10 Bitcoin, or BTC, is approximately $5,787).

While the original CryptoLocker authors are thought to have made about $3 million USD, imitators using the CryptoLocker name have appeared with increasing frequency. The FBI’s Internet Crime Complaint Center estimates that between April 2014 and June 2015, victims of ransomware paid over $18 million USD to restore access to their devices.

How do I protect myself from a ransomware attack?
Ransomware is often spread in file-sharing networks or on websites that purport to provide direct downloads. Other traditional attack vectors have also been used, such as email attachments or malicious links. There are ways to protect against a potential infection. For enterprise workstation deployments, using Group Policy to prevent executing unknown programs is an effective security measure for ransomware and other types of malware.

We can recommend Cybersecurity Solutions that can protect your computers against ransomware or at least mitigate the effects of it.

*Source: Excerpts from TechRepublic’s Ransomware Smart Person’s Guide by James Sanders May 16th 2017.

If you would like to know more, please contact us at 1-800-871-9683 for a free consultation. Also, if you do not have online BDR (backup-disaster-recovery) and anti-virus/malware protection for your business, please give us a call to help you implement the latest systems. Our email address is: markhuffman@creativebusinesstechnologies.com

Reasons Why You Should Upgrade Your Computer

Small Keyboard

Computer users today, including business owners, are hanging onto to their old computer(s) (stand-alone, workstations and servers) when they should upgrade them. Many users are frustrated by the slow, erratic performance of their current systems and call a computer technician to fix the problem when it could be solved by simply upgrading to a later type system. This article will help you decide whether to hang onto what you have or “bite the bullet” and buy another computer.

Every Four Years is the usual point in time that you should look into purchasing a new computer. By this time, your current operating system has had many service packs and updates and sometimes this will slow down the performance of the computer, whether it is a laptop or desktop. Also, viruses and/or malware can cause damage to the operating system, requiring a complete system reload. If you are at the four year mark, you might want to consider upgrading instead of reloading.

Listed below is a list of reasons to upgrade:

CPU Speed: The Central Processing Unit is the “brains” of the computer and is in charge of how much data flows through the unit. The slower the CPU, the slower the data flow. Many times CPU bottlenecks of older systems prevent the unit from operating at an optimum level.

Hard Drive: The hard drive is where the operating system, programs and data reside on (unless the data is saved and backed up elsewhere). An older hard drive that uses platters for reading and writing data to it will be slower than a later model solid state device. Newer hard drives have very fast access speeds compared to older units.

Memory: Random Access Memory (RAM) determines how quickly the operating system, programs and data loads into the “memory” of the computer. Later model computers can handle and usually have greater amounts of memory to facilitate more robust computer operations.

System Board: The system board (otherwise known as the “motherboard”) will have different components on it (cache, chipset, etc.) that will help the computer to run more smoothly and efficiently. The newer the board, the better.

Microsoft Windows 10: If your company is still using computers that have Windows 7 or 8.1 operating systems, companies should upgrade to take advantage of the newest features that Microsoft has to offer. Please contact us if you need your operating system(s) or PC(s) upgraded.

IT Security: Security for your servers, workstations and stand-alone computers is of the upmost importance. Having the right security measures in place is absolutely necessary, especially with the rise of Ransomware. This includes Windows 10 being the dominant operating system within your organization.

These are the main reasons why you should upgrade your computer. The operating system and applications will run better on a newer system. Also, you can take advantage of newer programs (both cloud and non-cloud) that will work better on a newer system as well. Please let us know if you would like to speak to someone about upgrading your laptop, desktop, workstation or server.

If you would like to know more, please contact us at 1-800-871-9683 for a free consultation. Also, if you still have Windows 7 or 8 Computer(s) in your business, please give us a call to help you upgrade to Windows 10 and Office 365. Our email address is: markhuffman@creativebusinesstechnologies.com

The Top 10 Benefits of Outsourcing IT through Managed Services

Managed Services

Immediate benefits can be gained by outsourcing IT services through Managed Services.*

Control IT Costs – Outsourcing converts fixed IT costs into variable costs and allows you budget effectively. In other words, only pay for what you use when you need it.

Reduce Labor Costs – Hiring and training an IT staff can be very expensive, and temporary employees don’t always live up to your expectations. Outsourcing lets you focus your human resources where you need them most.

Trained, Experienced, Qualified, Certified – If you’re not IT trained, how do you assure an employee is qualified? Certifications like Microsoft Certified Systems Engineer (MCSE) are important, but so is experience.

Qualified doesn’t Equal Experienced – Few problems are new for leading IT service companies, which see related problems multiple times. An in-house IT employee leads an isolated existence no matter how much they train. We’d all rather an experienced doctor; the same is true for IT.

Increase Efficiency and Competitiveness – Organizations that try to do all IT Services in-house themselves can have much higher research, development, and implementation time, all of which increase costs and are ultimately passed on to customers.

Quickly Implement New Technology – A quality outsourced IT service organization will have the resources to start new projects right away. Handling the same project in-house might involve weeks or months to hire the right people, train them, and provide the support they need. For most implementations, quality IT companies will bring years of experience in the beginning saving time and money.

Stay Focused on Your Core Business – Businesses have limited resources, and every manager has limited time and attention. Outsourcing can help your business stay focused on your core business and not get distracted by complex IT decisions.

Reduce risk – Every business investment carries a certain amount of risk. Markets, competition, government regulations, financial conditions, and technologies all change very quickly. Outsourcing providers assume and manage much of this risk for you, with specific industry knowledge, especially security and compliance issues. They generally are much better at deciding how to avoid risk in their areas of expertise.

Level the Playing Field – Most small businesses can’t afford to match the in-house support services that larger companies maintain. Outsourcing can help small companies act “big” by giving them access to the similar technology, and expertise that large companies enjoy. An independent third party managed cost structure and economy of scale can give your company a competitive advantage.

Compliance and Security – Is your firewall up to date? Do you have a DMZ installed? Do you audit your Workstations and Servers? Has your company implemented PCI security standards and work to maintain those standards? For example, Businesses have more ways than ever to prosper by taking many forms of payments such as Credit and Debit Cards, Gift Certificates, E-Checks, Wire Transfers to name a few, but with these forms of transacting also comes the need for due diligence. By outsourcing a qualified Manages Services company who is familiar with PCI Compliance standards https://www.pcisecuritystandards.org, you can rest assured that your company is minimizing the risks associated with maintaining client data, credit card numbers, sensitive competitive information and more.

*Sources: © 2017 Essent Corporation

If you would like to know more, please contact us at 1-800-871-9683 for a free consultation. Also, if you do not have online BDR (backup-disaster-recovery) and anti-virus/malware protection for your business, please give us a call to help you implement the latest systems. Our email address is: markhuffman@creativebusinesstechnologies.com

7 Signs Your Small Business Needs IT Support

Small Keyboard

You’re a small business owner and you’ve been doing just fine without a huge staff or a dedicated IT guy. But like everything else these days, your business depends on technology: email, databases, documents and spreadsheets—maybe even software unique to your industry, like a computer-aided drafting program. So how do you know when it’s time to bring in some professional IT support?*

Here are 7 key signs, although we’re sure there are many more: 

1. If your billable hours are down because you’ve been troubleshooting computer/printer/router problems—your business needs IT support

Many small business professionals bill by the hour, including attorneys and graphic designers. But if those billable hours have fallen off because you’re wrestling with a computer that won’t start, or an internet connection that’s spotty, then maybe it’s time to bring in expert IT support for your network — while you get back to doing those things that get you paid.

2. If your computer is down with a virus, but the neighbor kid is still at school—your business needs IT support

Maybe your neighbor’s teenage son is a brilliant computer fixer, but the law says he needs to be in school from 8 to 3, and you can’t put your own business on hold waiting for him to help you after hours or on weekends. If you consider your small business to be professional outfit, then start relying on professional IT support.

3. If you missed an important deadline because your printer malfunctioned—your business needs IT support

You waited until the last minute to print off that important presentation. Then your computer suddenly couldn’t connect to your printer. It’s time to bring in a professional who can troubleshoot your network problems. When you know your system is set up properly and is getting regular preventive maintenance, you can procrastinate with more confidence.

4. If you are ready to spend big bucks on hardware for your business, but the big box salesman doesn’t inspire confidence—your business needs IT support

Computers, servers, routers and printers represent a significant financial outlay. Sure, there’s a danger that you could spend too little, which has its own consequences. But more likely you’ll spend too much. A professional business IT consultant has the know-how to assess your business needs now and in the future, helping you prioritize your spending. Professional IT consultants also have access to custom-built solutions that perfectly fit your situation, something you aren’t likely to find at the big box store.

5. If you just tried to upgrade a crucial software package, only to find it won’t run on your computer—your business needs IT support

Adobe Creative Suite is essential software for graphic designers, but each upgrade seems to demands a lot of the computer that runs it. Maybe your profession requires certain software, and you can’t work without it. When new upgrades are released, they usually demand more memory and more speed, maybe even a new operating system. Don’t lose productivity fighting a losing battle. Call on professional IT support so you can get on with your work.

6. If your data isn’t backed up—your business needs IT support

What are you going to do when your hard drive crashes (and it will) or some sort of natural disaster strikes, and you lose all your contacts, documents, contracts, background research, reports or photos? How much of a disruption to your business will you suffer? Put a dollar figure to that, and it doesn’t take long to conclude that professional IT help in setting up a disaster recovery plan, including a first-rate backup solution, is worth the investment.

7. If you are still using Microsoft XP—your business needs IT support

What is Microsoft XP? It is a very old PC operating system that Microsoft will no longer support after April 2014 (this has already happened). Read our earlier post, The End is Near: Support for Windows XP, for more information. If your business is still using Windows XP, merely upgrading to the latest Microsoft operating system may not be simple. Call in professional IT support to determine which version (Windows 7 or Windows 10) is best for your business, and to ensure all your other software and hardware is ready to make the transition.

*Source: invisionkc.com /7-signs-your-small-business-needs-it-support-and-fast/

If you would like to know more, please contact us at 1-800-871-9683 for a free consultation. Also, if you do not have online BDR (backup-disaster-recovery) and anti-virus/malware protection for your business, please give us a call to help you implement the latest systems. Our email address is: markhuffman@creativebusinesstechnologies.com

8 ways to keep your Small Business Secure

Kaspersky_Anti_Virus_Small

If you own and operate a small business, lowering costs is an important part of keeping your company in the black. Cutting costs on your IT budget could inadvertently compromise your company’s security. Even though small businesses may not have all of the resources that large corporations do, they are still just as vulnerable to the same security threats.*

Here are some ways to help keep your small business secure:

  1. Purchase Anti-virus Software. Every computer is vulnerable to the wide variety of viruses, Trojans, and worms that are on the Internet. These malicious software programs can do anything from damage your computer and files to steal your password and other important information stored on your computer. Purchase a good anti-virus software program and make sure that it is always up to date. Also, check to see that your anti-virus software checks for spyware, adware, and any other type of malware that could be hiding on your computer.
  2. Avoid Phishing Emails. It is important to discuss with your employees the importance of not opening spam email, attachments or forwards that could possibly contain viruses. Make sure that your email has a filtering system that helps to filter out spam and other malicious email. Responding to phishing emails can be another costly mistake. Phishing emails are disguised as legitimate emails that then request login and password information. Changing passwords monthly can help to lessen the damage should an employee accidentally respond to a phishing email.
  3. Minimize Damage from Dishonest or Disgruntled Employees. It is often difficult to predict if one of your employees will become disgruntled or dishonest, but you can put some safeguards in place to help minimize the damage should you find that you have one. Thoroughly screen your employees before hiring them, especially if they will have access to any confidential or financial company information. Limiting the number of employees that have access to this confidential information and changing your company passwords often can help to prevent former employees from accessing company computers.
  4. Secure Your Wireless Network. Make sure that your wireless router is encrypted, and that your business is using WPA2 wireless security. A firewall is another important key to protecting the security of your small business. A firewall will allow access only to authorized users while blocking unauthorized access to the computer.
  5. Have an Internet Use Policy. Aside from the obvious lack of productivity that personal Internet use can cause for your business, it can often be too easy to click on websites that contain malicious software that could easily infect your company computer and shut your system down temporarily or even permanently.
  6. Avoid Having Everything on One Computer. Purchasing computer equipment is costly, so many small businesses will try to get away with fewer computers in order to save money. If you have your financial information on the same computer that your employees are accessing their company emails, you could risk losing everything that is vital to running your business should an infected email slip through.
  7. Have a Data Backup System. Be sure to have some type of data storage and backup system in place in the event that your current system goes down. Having all of your files readily available to you in case of an emergency can ensure that your business will retain customers and continue to run smoothly no matter what the disaster.
  8. Minimize Damage from Stolen Equipment. It difficult to prevent break-ins or equipment from being stolen from your home or office building, but you can have some security by ensuring that all of the information on your computer is encrypted and password protected.

Trying to scrimp when it comes to your small business’s computer security can be a costly mistake. Arm yourself with the knowledge of what your business could be up against and take steps towards prevention. The investment will give your company the security necessary to keep your information secure.

*Source: SPC International Online, Inc.

If you would like to know more, please contact us at 1-800-871-9683 for a free consultation. Also, if you do not have online BDR (backup-disaster-recovery) and anti-virus/malware protection for your business, please give us a call to help you implement the latest systems. Our email address is: markhuffman@creativebusinesstechnologies.com

Social media & sharing icons powered by UltimatelySocial