As we pointed out in our blog post earlier this month, while backups are essential for the health of your business, there are many details which often remain overlooked in a basic backup plan. These oversights can render any strategy useless just when you need it the most…even if there are backup files available somewhere.
Having the right backup solution can save your company from losing important data, having to pay a ransom to retrieve it, or potentially costing your business the valuable secrets that keep it competitive. At the very least, nobody wants to re-key all of their accounting data if something goes wrong after, say, a long period-end process. These are all real consequences that have brought clients to us for help and a plan.
Still, it’s difficult to know how to begin developing a backup plan without some guidance. Here are some key questions we ask when helping customers design a new backup strategy…or evaluate the effectiveness of a current one:
When it comes to technology, everyone seems to want the latest and greatest. This desire applies to the software we use just as much as the hardware we install that software on. However, it’s not always the best idea to update your software as soon as new versions become available. Updates are usually great, because they allow vendors like Microsoft and Apple to patch security holes, fix buggy issues, and rollout new features. Nevertheless, a few recent cases have demonstrated that taking some time to manage your computer or phone’s update schedule, rather than immediately installing every update that pops up, can save you some headaches!
In 2017, we here at Bennett/Porter took a year off from hosting our annual Connections conference to focus on expanding our software and service offerings. This year we return with and we invite you and your colleagues to join us.
It's been just over one week since Microsoft, Apple, and numerous software vendors released updates to patch their operating systems and applications with the goal of mitigating the impacts of Meltdown and Spectre. As those efforts were getting underway, we reported on what these threats are, things you might need to know, and what Bennett/Porter was focusing on to keep our data center secure. So where are we now? Here's a rundown.
Today we notified our customers about important security updates available for computers and servers using Intel processors; as well as for the VIPRE antivirus program. As you may be aware, the recently announced security vulnerabilities, known as Meltdown and Spectre, can be found in virtually all modern CPUs, and they represent possible information leakage based on unauthorized access to shared memory space. For those who haven't heard about this new type of network security threat, we thought it would be helpful to get the word out more broadly via this brief post so that people have at least the basic information about Meltdown and Spectre.
Using a Managed Services Provider (MSP) to assist your company’s Information Technology needs has several advantages. If your business is like most, you have technology that is in constant need of updating, maintenance, and even replacement. Many companies will hire an IT person to handle these tasks, and in many cases that company will either outgrow that person or - on the opposite end of the spectrum - not have enough for the hire to do.
Topics: Information Technology
No one likes talking about backups. No one is going to bring up the topic of “off-site replication” at the next bonfire. Small businesses often don’t see the need to spend money to ensure that their vital data is backed up. After all, you just bought new hardware last year. Why would it fail? Sending data off-site? Why would I pay for that when it is perfectly secure here?
New web leaks are being reported regularly. In the last month Google uncovered what is likely the most troubling leak in 2017. So far. And we're just past halfway through March. The CloudBleed bug may have exposed passwords and other sensitive data from a multitude of sites, including major services like FitBit, Uber, and 1Password. We recommend clients change their passwords at least every six months, and immediately after discovering any vulnerabilities to your accounts.
When changing their passwords, clients often ask what the requirements are. I respond with the common minimum requirements: it must include at least two numbers, two upper case characters, and it must be a minimum of 12 characters long. Unfortunately, that question often indicates an intention to meet the minimum and no more. Although meeting those basic requirements is a good practice, the best practice is having a unique password that exceeds the minimum, that is also personal enough to remember, and that only you will know.
Undoubtedly, you’ve seen news reports about scams where someone cold calls phone numbers, claiming to be from Microsoft or the IRS, and dupes their victims out of money or their identity. What most people don’t realize, however, is that it’s just as easy for scammers to pretend to be someone else over email.
Using compromised or poorly secured email servers anywhere in the world, scammers can make an email appear as if it came from a recognized contact or company VIP. In many cases, these emails will take the form of a request for a wire transfer.