Two Important Aspects of Your Backup Strategy

Posted by Dionne on November 15, 2018 at 10:52 AM

As we pointed out in our blog post earlier this month, while backups are essential for the health of your business, there are many details which often remain overlooked in a basic backup plan. These oversights can render any strategy useless just when you need it the most…even if there are backup files available somewhere.

Read More

Topics: Backups, Technology Services, Information Technology

How to Create a Backup Plan for Your Business

Posted by Dionne on November 8, 2018 at 2:13 PM

Having the right backup solution can save your company from losing important data, having to pay a ransom to retrieve it, or potentially costing your business the valuable secrets that keep it competitive. At the very least, nobody wants to re-key all of their accounting data if something goes wrong after, say, a long period-end process. These are all real consequences that have brought clients to us for help and a plan.

Still, it’s difficult to know how to begin developing a backup plan without some guidance. Here are some key questions we ask when helping customers design a new backup strategy…or evaluate the effectiveness of a current one:

Read More

Topics: Information Technology, Business Technology, Technology Services, Backups

Managing Updates for Your Computer and Phone

Posted by Dionne on October 15, 2018 at 12:57 PM

When it comes to technology, everyone seems to want the latest and greatest. This desire applies to the software we use just as much as the hardware we install that software on. However, it’s not always the best idea to update your software as soon as new versions become available. Updates are usually great, because they allow vendors like Microsoft and Apple to patch security holes, fix buggy issues, and rollout new features. Nevertheless, a few recent cases have demonstrated that taking some time to manage your computer or phone’s update schedule, rather than immediately installing every update that pops up, can save you some headaches!

Read More

Topics: Information Technology, Windows Automatic Updates, iOS Updates

Bennett/Porter’s conference returns! Join us for Connections 2018

Posted by B/P News & Notes on February 13, 2018 at 3:53 PM

In 2017, we here at Bennett/Porter took a year off from hosting our annual Connections conference to focus on expanding our software and service offerings. This year we return with Connections 2018  and we invite you and your colleagues to join us.

Read More

Topics: connections 2018, Business Technology, Business Essentials, Customer Success, ERP, People. Ideas. Technology., Conferences, Information Technology, News Alert, Human Capital Management

Meltdown and Spectre, One Week Later

Posted by Technology Watchdogs on January 17, 2018 at 1:32 PM

It's been just over one week since Microsoft, Apple, and numerous software vendors released updates to patch their operating systems and applications with the goal of mitigating the impacts of Meltdown and Spectre. As those efforts were getting underway, we reported on what these threats are, things you might need to know, and what Bennett/Porter was focusing on to keep our data center secure. So where are we now? Here's a rundown.

Read More

Topics: Information Technology, Network Security, News Alert

Important Information about Meltdown and Spectre

Posted by Technology Watchdogs on January 8, 2018 at 3:22 PM

Today we notified our customers about important security updates available for computers and servers using Intel processors; as well as for the VIPRE antivirus program. As you may be aware, the recently announced security vulnerabilities, known as Meltdown and Spectre, can be found in virtually all modern CPUs, and they represent possible information leakage based on unauthorized access to shared memory space. For those who haven't heard about this new type of network security threat, we thought it would be helpful to get the word out more broadly via this brief post so that people have at least the basic information about Meltdown and Spectre.

Read More

Topics: News Alert, Information Technology, Network Security

Why use a Managed Services Provider for your IT Services?

Posted by Ryan Wroblewski on December 27, 2017 at 11:51 AM

Using a Managed Services Provider (MSP) to assist your company’s Information Technology needs has several advantages. If your business is like most, you have technology that is in constant need of updating, maintenance, and even replacement. Many companies will hire an IT person to handle these tasks, and in many cases that company will either outgrow that person or - on the opposite end of the spectrum - not have enough for the hire to do.

Read More

Topics: Information Technology

Data Backups and Off-Site Replication: IT Insurance for Your Business

Posted by Ryan Wroblewski on May 15, 2017 at 10:19 AM

No one likes talking about backups. No one is going to bring up the topic of “off-site replication” at the next bonfire. Small businesses often don’t see the need to spend money to ensure that their vital data is backed up. After all, you just bought new hardware last year. Why would it fail? Sending data off-site? Why would I pay for that when it is perfectly secure here? 

Read More

Topics: Business Technology, Information Technology, Network Security

How to create a great password

Posted by Brian on March 28, 2017 at 11:16 AM

New web leaks are being reported regularly. In the last month Google uncovered what is likely the most troubling leak in 2017. So far. And we're just past halfway through March. The CloudBleed bug may have exposed passwords and other sensitive data from a multitude of sites, including major services like FitBit, Uber, and 1Password. We recommend clients change their passwords at least every six months, and immediately after discovering any vulnerabilities to your accounts.

When changing their passwords, clients often ask what the requirements are. I respond with the common minimum requirements: it must include at least two numbers, two upper case characters, and it must be a minimum of 12 characters long. Unfortunately, that question often indicates an intention to meet the minimum and no more. Although meeting those basic requirements is a good practice, the best practice is having a unique password that exceeds the minimum, that is also personal enough to remember, and that only you will know.

Read More

Topics: Information Technology, Network Security

How to Be Aware of Email Imposters that Threaten Network Security

Posted by Tom on October 18, 2016 at 2:11 PM

Undoubtedly, you’ve seen news reports about scams where someone cold calls phone numbers, claiming to be from Microsoft or the IRS, and dupes their victims out of money or their identity. What most people don’t realize, however, is that it’s just as easy for scammers to pretend to be someone else over email.

Using compromised or poorly secured email servers anywhere in the world, scammers can make an email appear as if it came from a recognized contact or company VIP. In many cases, these emails will take the form of a request for a wire transfer.

Read More

Topics: Network Security, Information Technology

Subscribe to B/P Impressions

Impressive Impressions

a blog that is also a resource for businesses

Bennett/Porter's Impressions blog provides sensible insight into the places where technology and business intersect. Yet beyond practical reflections, you'll find actual resources to help keep your business operations optimized. These resources include:

  • critical announcements about the ERP systems we support
  • efficient strategies for network management
  • tips and tricks on using business software
So read on, and get the inside track from the Pacific Northwest's premier experts in ERP software and Managed IT & Cloud Hosting services.

Recent Posts