Information Technology Services

Clean up your IT strategy.  Spring is a perfect time to revisit your plans for those critical IT systems you use to keep your business data safe and secure. Review key procedures and plans like network failover testing, disaster recovery, business continuity, and data backup. Loss of data interrupts your business continuity and can be very costly. Studies show that 1MB of data is worth approximately $10,000 and the cost of having to rebuild 20MB of data could be more than $17,000 and could take up to three weeks to complete (For an integrated, online backup, storage and sharing application, tryIBackup). For those of you with an on-site backup solution, now is the perfect time to run those backups with a test recovery.

Clean up your data storage.  Consider adopting a plan utilizing Data Lifecycle Management (DLM) to remove the day-to-day and budgetary headaches:

  • DLM is the comprehensive approach that organizations use to deal with data throughout its lifecycle, from creation and initial storage to eventual archival or disposal.
  • Options vary depending on need, but some useful storage systems to consider include Storage Area Networks (SAN), Network Attached Storage (NAS) and Hierarchical Storage Management.


Clean out the bugs. 
To be sure  your computers, tablets and smartphones are protected, optimize your security this spring with new or updated Anti-virus, Spyware and Malware software. (For an easy-to-use, simple, and effective anti-malware application, try Malwarebytes)

Clean out your Email. Email mismanagement costs you money. Email is the 3rd largest culprit of workplace interruptions, which cost the U.S. economy $900 billion per year. Take charge and clean up that clutter!

Clean your keyboard. Get yourself an ozone-friendly compressed gas duster and give your keyboard the deluxe treatment it so desperately needs. (Warning: Keyboards are not dishwasher safe.) Your mouse and phone handset can be cleaned with a paper towel and some window cleaner!

 

security

Cyber thieves target SMBs….are you safe?

  • It’s estimated that small businesses have lost $250 million due to various forms of cyber attacks.
  • A 2010 survey by Symantec Corp. of small and medium-size companies showed that about 73% of businesses reported they had been targets of cyber attacks in the last year.
  • 63% of data breaches reported in 2010 were at companies with 100 or fewer employees.
  • 95% of credit card breaches that Visa has discovered have been hits on small businesses.
  • Less than 50% of small businesses are estimated to assess and test their security safeguards.

The facts don’t lie, friends. The myth that any business is too small to get hit, is just that – a myth. Cyber security is not just for big businesses anymore. Hackers can steal data from at least a dozen small businesses in the same time that it takes for them to hack into one large corporation. And experts believe that the situation will only get worse before it gets better.

As more businesses hook into high speed internet, hackers are able to expand their target base and take advantage of small businesses that have weak security safeguards. Cyber criminals are taking notice– companies that store data in electronic form, or rely on computerized systems and digital records as many companies are now doing, are putting themselves at great risk. Cyber thieves are no longer discriminating, making it ever more important to take precautions to protect your business from online intruders.

How are they getting into your system?  

Though a broadband connection offers blazing internet speed, it can also mean greater susceptibility to cyber attack. Broadband is a direct connection to the internet that is always on, so because broadband usually has a static IP address with open, unprotected ports, a browser or your email does not have to be up in order for a hacker to enter your system. Hackers can locate these unprotected ports through a port scan, after which there’s no telling what they can do. This is particularly critical for businesses that do credit card transactions, as hackers can get their hands on the private financial information of customers.
Another way they might enter your system is through attachments or links sent to employees that implant computer code onto your computer. Once in, they can use your systems and your bandwidth to launch attacks on other businesses. The banks do in fact have security measures in place to help you protect against these types of cyber intrusion, but unfortunately due to inadequate regulations many banks are skirting this legal responsibility and only providing a bare minimum of protection, leaving many businesses open to fraud. For a growing number of small businesses, this system vulnerability often leads to significant financial loss, as most lawsuit complaints never even go to trial or only reproduce pennies on the dollar to make up for stolen money.

What can you do about it?

  • Make yourself invisible to the bad guys by installing and regularly updating an electronic firewall.
  • Don’t rely solely on your anti-virus software. It’s helpful, but not fail-proof.
  • Audit the data on your network, especially financial information.
  • Implement and explain an acceptable use policy for web browsing.
  • Educate your users on the dangers of open surfing while connected to the company network.
  • Remember basic security measures such as changing default passwords and creating secure passwords! Your last name, birthday, or 1234567 are NOT going to keep cyber criminals out!

Bottom line, cyber thieves are constantly on the prowl for the weakest link. Data security is not just important, it’s absolutely essential to the sustainability of your business. Give GCInfotech a call today to discuss how we can help you take the necessary precautions to keep your business data safe and secure!