You just got back from lunch and are settling down into your office chair. You open up your planner to check your schedule, and then wake your PC from sleep. Time to check emails. But wait, something’s wrong. You’re…waiting. Your computer is moving as slow as a brontosaurus and the problem appears to go deeper than internet speed. What happened? When a PC slowdown strikes, there can be a number of culprits. Here are a few ideas to alleviate the problem, so you can get back to business in no time.

slowPCRestart

The most obvious but often overlooked fix is to simply restart your PC. Many people get into the habit of leaving their PC on 24/7 and, instead of turning it off, just leave it in sleep mode when they’re not using it. However, restarting it is like vacuuming a carpet or mopping a floor. If you let either of them sit for a while, a lot of temporary gunk builds up. A simple restart can help clean your computer up but, unlike with household chores, you won’t get dirty in the process.

Uninstall new stuff

Did you recently install new hardware or software? If you did, this could be causing your slowdown and, if you don’t need it, it’s worth uninstalling it. Here’s how:

  1. Go to your Control Panel’s Programs and Features section.
  2. If you think a driver is slowing you down, open Device Manager and double click the new driver.
  3. A dialog box will open. Click the Driver tab followed by the Roll Back Driver button.
  4. If that button is grayed out, it means the problem isn’t with that driver. If not, you can continue with uninstalling.

Using the Device Manager, you can also uninstall new hardware.

Free up hard drive space

A lack of hard drive space can slow your PC down as well. To run your system smoothly, it’s recommended you have 15% hard drive space free. Having this extra space gives room for temporary files and swapping.

If you don’t have the space, you may need to purchase a new hard drive or transfer some of your files and programs over to an external one.

Search for the bloated program that’s eating your memory

Another potential problem could be a dysfunctional program that is using up too much of your PC’s memory. To see if this is the source of your problem, go to Windows Task Manager and click the Processes tab. Then look in the CPU or memory column. Either of these will show you if there’s one program that’s eating all your memory.

To solve this problem, click on the program in Windows Task Manager; and then hit End Process. Keep in mind that this is only a temporary fix. You’ll have to uninstall this program and replace it with something that will run more efficiently.

Scan for viruses

Both viruses and malware can also slow down your computer. To check if you’ve been infected, run a system scan. If you do have malicious software on your PC, and your antivirus software hasn’t effectively detected or removed it, contact a local IT Services Provider who will be able to clean your computer and free it of potentially harmful malware. They can also advise you to a reputable solution to avoid future issues.

Want more tips on how to resolve PC slowness and other computer issues? Worried you may have been infected by a virus? Get in touch with us today for help and advice.

Your old PC may be costing you more than you think

In today‘s era of notebooks, tablets, and smartphones, mobility is a high priority-making small businesses more dynamic and responsive in an on-the-go world.

That reality, however, should not detract from the important role desktop PCs still play in today‘s business environment, delivering more power, more robust upgrade options, and more functionality compared to their portable counterparts.

While large enterprises typically refresh their desktop PCs once every three years, small businesses tend to hold on to their PCs for five to seven years [1]. Older hardware, however, often slows operations and sparks hidden costs. In fact, PCs more than four-and-a-half years old are estimated to cost 50 percent more to support and take 50 percent longer to perform many tasks [2].

So while retaining those still-functioning workhorse PCs purchased during the early-2000s might seem a prudent move, their continued use could be costing you more than you think. Here’s how:

slow-pc-solutionsRevealed Hidden Cost #1: Slow performance

As a PC ages, it slows and struggles to keep pace with current technology and business needs. Applications take longer to load, heat buildup causes Windows, the mouse, or keyboard to be unresponsive. Compatibility issues between older PCs and new software and printers all drain time, frustrate the user, and undermine productivity.

Modern desktops respond to today‘s multitasking, collaborative, and fast-paced business environment with productivity-driving features that allow workers to create rather than wait. New features include: touchscreens, fast-charging USB ports, and solid-state drives that reduce wait times when opening files or switching applications.

Revealed Hidden Cost #2: More maintenance

On average, 42 productive work hours are lost each year while an older computer is being repaired-two times that of a newer model. Annual maintenance costs for an older PC, meanwhile, sit at $561, about the cost of a new, mid-range desktop [3].

New desktops deliver a greater value in the present and the future. Their longer lifespan, platform stability, and increased durability stretch your budget further, and reduce the burden on your IT department.

Revealed Hidden Cost #3: Lower efficiency

Today‘s desktop PCs reflect the modern age with space- and energy-saving features unmatched by their older, bulkier peers, some of which have limited ports or require adapters to accommodate modern needs.

New form factors, such as All-in-Ones and mini desktops, embrace sleek, streamlined construction, reduce wire clutter with integrated components, and adapt to the task at hand. In addition to more efficient use of space, modern desktops also require less energy, as the power needed to perform a task requiring a fixed number of computations continues to fall in half every 18 months [4].

Revealed Hidden Cost #4: Security vulnerabilities

Hackers continue to view small businesses as easy targets, even more so following Microsoft’s end-of-support for Windows XP in 2014. According to Microsoft, existing XP users are “five times more vulnerable to security risks and viruses,” which makes moving to a new PC that can support a current operating system like Windows 8.1 the safest play [5].

Some new PC designs include built-in hardware and software security to help protect your devices, identity, and data. Most new PCs come with bundled tools that offer security from the start, with enhanced protection against virus attacks and other security threats, and is designed to help prevent data loss, and reduce downtime.

Doing the math

While those existing desktops had their time and place, the older hardware may now be hampering your team’s performance. Running a quick cost-benefit analysis addressing issues such as maintenance and lost productivity against the cost of new desktops might prove eye opening and inspire action.

With modern business-oriented desktop PCs, your small business can reap the benefits of technology’s rapid innovation with improved productivity, reduced costs, heightened efficiencies, and stronger security to keep the business running at an optimal level.

If you are looking to learn more about the replacement options that are available today, then let GCInfotech be your first call.

[1] Intel, How much is it costing your business to run old PCs?, 2013
[2] The Legislative Budget Board, Review of Replacement Schedules for Information Technology EquipmentJanuary 2013
[3] Techaisle.com, The Ageing PC Effect–Exposing Financial Impact for Small Businesses
[4] MIT Technology Review, The Computing Trend that Will Change Everything, 2012
[5] Microsoft, Windows XP support has ended

Published with permission from HP.com. SOURCE

FirewallCartoonWith the ever growing number of security threats faced by businesses around the world, the vast majority of business owners have adopted some form of security measures in an effort to keep their organizations secure. But, how do you know the measures you’ve implemented are actually keeping your systems safe? Here are five ways you can tell if your security measures aren’t sufficient.

1. Open wireless networks

Wireless networks are one of the most common ways businesses allow their employees to get online. With one main Internet line and a couple of wireless routers, you can theoretically have the whole office online. This method of connecting does save money, but there is an inherent security risk with this and that is an unsecure network.

Contrary to popular belief, simply plugging in a wireless router and creating a basic network won’t mean you are secure. If you don’t set a password on your routers, then anyone within range can connect. Hackers and criminal organizations are known to look for, and then target these networks. With fairly simple tools and a bit of know-how, they can start capturing data that goes in and out of the network, and even attacking the network and computers attached. In other words, unprotected networks are basically open invitations to hackers.

Therefore, you should take steps to ensure that all wireless networks in the office are secured with passwords that are not easy to guess. For example, many Internet Service Providers who install hardware when setting up networks will often just use the company’s main phone number as the password to the router. This is too easy to work out, so changing to a password that is a lot more difficult to guess is makes sense.

2. Email is not secure

Admittedly, most companies who have implemented a new email system in the past couple of years will likely be fairly secure. This is especially true if they use cloud-based options, or well-known email systems like Exchange which offer enhanced security and scanning, while using modern email transition methods.

The businesses at risk are those using older systems like POP, or systems that don’t encrypt passwords (what are known as ‘clear passwords’). If your system doesn’t encrypt information like this, anyone with the right tools and a bit of knowledge can capture login information and potentially compromise your systems and data.

If you are using older email systems, it is advisable to upgrade to newer ones, especially if they don’t encrypt important information.

3. Mobile devices that aren’t secure enough

Mobile devices, like tablets and smartphones, are being used more than ever before in business, and do offer a great way to stay connected and productive while out of the office. The issue with this however is that if you use your tablet or phone to connect to office systems, and don’t have security measures in place, you could find networks compromised.

For example, if you have linked your work email to your tablet, but don’t have a screen lock enabled and you lose your device anyone who picks it up will have access to your email and potentially sensitive information.

The same goes if you accidentally install a fake app with malware on it. You could find your systems infected. Therefore, you should take steps to ensure that your device is locked with at least a passcode, and you have anti-virus and malware scanners installed and running on a regular basis.

4. Anti-virus scanners that aren’t maintained

These days, it is essential that you have anti-virus, malware, and spyware scanners installed on all machines and devices in your company and that you take the time to configure these properly. It could be that scans are scheduled during business hours, or they just aren’t updated. If you install these solutions onto your systems, and they start to scan during work time, most employees will just turn the scanner off thus leaving systems wide-open.

The same goes for not properly ensuring that these systems are updated. Updates are important for scanners, because they implement new virus databases that contain newly discovered malware and viruses, and fixes for them.

Therefore, scanners need to be properly installed and maintained if they are going to even stand a chance of keeping systems secure.

5. Lack of firewalls

A firewall is a networking security tool that can be configured to block certain types of network access and data from leaving the network or being accessed from outside of the network. A properly configured firewall is necessary for network security, and while many modems include this, it’s often not robust enough for business use.

What you need instead is a firewall that covers the whole network at the point where data enters and exits (usually before the routers). These are business-centric tools that should be installed by an IT partner like us, in order for them to be most effective.

How do I ensure proper business security?

The absolute best way a business can ensure that their systems and networks are secure is to work with an IT partner like us. Our managed services can help ensure that you have proper security measures in place and the systems are set up and managed properly. Tech peace of mind means the focus can be on creating a successful company instead. Contact us today to learn more.

Published with permission from TechAdvisory.org. SOURCE

Your small to medium-sized business is just as dependent on IT as a large company is. You need the right technology, to have it work, to have it fixed quickly when a problem arises, and to know what that will cost. At some point, all small-to mid-size business owners face this dilemma: form their own in-house IT support group or hire an outside IT consulting firm.

IT has become the lifeblood of any business, large or small. That being said, it is essential for businesses to have their computer systems up and running 24 hours a day 7 days a week and 365 days a year – reliability, securely and efficiently. Whether you have 10 employees or 1000, any business owner has no time to deal with daily IT issues or unreliable IT support personnel. In the event of a disaster, you need to get your business back on track ‘now’.

Full-Time In-House IT

Having a dedicated, full-time staff person in-house seems like a sensible and secure option. The person knows your systems and technologies, understands the nuances of your business and staff preferences, and in many cases has been a part of the legacy of technical development within your organization so he “knows where the bodies are buried”.  Additionally, the in-house solution only has one client, you. This provides business owners with a great deal of comfort – knowing that “my guy” is always here, in-house, and at the ready to respond to the little annoyances and huge disasters that are commonplace.

While on the surface this solution seems to be a good choice, there are a number of negatives associated with in-house IT staffing solutions that make it a risky proposition:

  • Cost: In house requires a constant budget item for IT staff in salaries and benefits
  • Most IT departments in small-to medium size firms are 1-2 people, so when key IT person “leaves with the keys” – business can come to a halt.
  • Not scalable and costly when expanded – getting more IT staff becomes costly – and under-capacitated
  • In House IT need to be trained on newer technology -they don’t always do it on their own or want the company to pay for the certifications – which are costly.
  • Transitioning off and on is a very cumbersome process.

 

IT Consulting Firms

What if we told you that you could receive better IT support for a fraction of the cost that it would take to hire an onsite IT department?  Hiring an outside IT services firm is a wise decision for most small to medium sized businesses.

The two main benefits in hiring an outside firm are costs and expertise/knowledge.

We see too often smaller firms who come to us after having had one dedicated IT person on staff.  This person typically was responsible for selecting and setting up all of the basic IT functions and system choices.  Invariably we find that many of these choices were poorly vetted, require tweaking, fixing and/or replacing. This is mainly due to the fact that inside IT do what they know or are familiar with. “This is the solution that I use for all of my clients”. This comfort and fluency can easily be mistaken for expertise.  Outside firms are constantly upgrading their system offerings, training their tech staff on the most cutting edge solutions and have the resources to provide all of the proper certifications.  As a result, there is a greater likelihood that you will be getting the best possible range of solutions – that are built for the current state of technology. This is critical.  Swapping out old dead tech is a massive and costly disruption.

Second, and probably most important is cost.  With in-house staff, there are salaries and benefits. With an outside firm, you only pay either a fixed retained fee, or an hourly rate, so the costs are more manageable.  Plus, the outside firm is incentivized to do a better job in the hours allotted then someone who knows can rely on a salary and benefits.

Whether you’re looking for a preventative maintenance solution to keep IT costs predictable and avoid expensive computer problems, or a disaster recovery plan to get you back online quickly after an emergency, our technical support experts will meet with you to understand your business, and your IT needs, so that we can find the solution that’s right for you.

Proactive IT Services – Flat-rate, round-the-clock maintenance and monitoring to prevent problems before they turn into downtime

Remote Backup & Disaster Recovery – GCInfotech provides not only reliable automatic backups and archiving, but also a rock-solid plan of action for recovery in the event of a disaster.

Cloud Solutions – Anytime, anywhere access to your data and business applications including cloud online data backup.

Anti-Spam Solutions – Say goodbye to spam and hello to dramatically increased productivity

Help Desk Software – A turn-key, hosted service desk and ticketing system for assessing, assigning, and resolving service issues related to your small business

Outsourced IT Support – Focus on running your business instead of troubleshooting your network with GCInfotech custom IT services designed to fit your business and your needs. GCInfotech is proud to provide local businesses with professional IT Solutions in CT, New York City and beyond.

Contact us now to schedule your FREE Business Technology and Security Assessment

As 21st century companies, we’ve all settled into the information age quite nicely. We save all of our important company data on our file servers. We send and receive our corporate communications through email.  We even source vendors and do our banking online. With all of this data going back and forth, it’s no wonder available storage space on our hard drives gets pretty tight.

Most of us would rather give up an arm, than give up our computers but we don’t really give them the TLC they need.  Getting rid of outdated or useless files and programs, or just learning the best way to organize all our stuff can make a big difference to the storage space as well as the processing time of the computer.  Simple things like keeping a clean desktop on your Mac, can really make a difference.

Has your file server become the digital equivalent of that drawer in your kitchen where you put all the stuff you don’t have a place for?

Even if you were forward thinking when you installed your server and you have plenty of space, don’t pat yourself on the back yet because that extra data may cost you in the long run. If you are including that data in your backup, it may end up costing you. And if you need to upgrade your server, it’s going to cost you for the additional storage space and time required migrating all that data to the new server.

So now you are wondering what to do. Just remember that data is only as good as its relevance. Information related to any of your important clients is always relevant. Let’s focus on the information for those clients that you haven’t done work with in years, or might not exist anymore. Here are some tips for getting a handle on your data:

  • Clean up or delete draft copies.
  • Clean up old, out of date information. Chances are you will Google something for the latest information anyway.
  • Clean up your email. Junk mail is just that, junk. Delete it.
  • Organize your files. By creating yearly sub-folders, you will be able to clearly see the age of some of your data.
  • Uninstall unused programs. When a program is installed, it creates connections between the program and the operating system. Even if you don’t use these programs, they can slow down your system.

In the case of data on your computer, more is not always better. Organize, prioritize, and then purge.

As always, GCInfotech can walk you through the process, ensure your business has the least amount of disruption and set up a structure that will keep you organized in the future. We can help you with data backup and protection, as well as moving your data to the cloud.

Contact GCInfotech IT Professionals today to talk about your data organization and protection. Call us 203 327 5700

Information Technology Services

An I.T. Manager’s New Year’s Resolution

The beginning of the year is the perfect time to review your systems maintenance program, tweak your plans and processes and optimize your overall I.T. strategy.

Review, Evaluate and Optimize.
More than likely, your business could live or die based on your IT strategy. We have all become dependent on our technology both in our personal and professional lives, so be sure to give it the TLC it needs. Review your key procedures and plans such as network failure testing, disaster recovery, business continuity, virus protection and data backup (for an integrated, online backup, storage and sharing application, click here). For those of you with an on-site backup solution, now is the perfect time to run those backups with a test recovery. With erratic weather on the rise and winter around the corner, taking the time to be sure you have a tight, foolproof strategy in place to keep both your systems and your information protected from loss or damage.

Be Smart About Your Data.
Inadequate protection or spotty management of critical data can have a profound effect on sustainability. Regularly scheduled testing of your backup strategy and implementing a daily backup routine will help prevent the disasters that prove fatal for many companies.

  • 31% of PC users have lost all of their files due to events beyond their control.
  • 34% of companies fail to test their onsite backup solution, and of those that do, 77% have found back-up failures.
  • 60% of companies that lose their data will shut down within 6 months of the disaster.
  • Every week 140,000 hard drives crash in the United States.
  • Simple drive recovery can cost upwards of $7,500 and success is not guaranteed.

We recommend assessing your existing data protection strategy and learn what data repository and storage medium options are available. It’s important to understand traditional backup methods as well as the benefits of developing an enhanced protection solution that meets the needs of your particular business.

Think of it as a Flu Shot for your Systems.
There are lots of people out there determined to infect your computers with viruses. Optimize your security with new or updated anti-virus, Spyware and Malware software. Be wary of free anti-virus software that sounds too good to be true because it often is.  You get what you pay for, and software that protects your computer needs regular and consistent updating to stay useful because viruses are constantly being generated. This is especially important if you use a networked computer system. Do your homework,  invest in effective software and keep it updated. (For an easy-to-use, simple, and effective anti-malware application, try Malwarebytes)
Give your Computer a Tune Up.
Straight out of the box, computers have often been loaded with unnecessary programs at the factory.  So, from day 1, your computer is accumulating software programs, update reminders, “bonus” software, and random files that you don’t need and over time it will become increasingly sluggish. By taking a few important steps, you can get it running efficiently again, for a lot longer. The first thing you should do is disable the programs that start up when your computer boots.  While there are many places this can occur, the easiest one to check is the Startup menu in your Programs menu. Additionally, simple tasks such as clean out your Windows Registry, remove unneeded files and programs, empty your recycling bin or trash, and perform a disc defragmentation can make a huge difference.  Even if your computer has been performing slowly for some time, beginning this regimen is sure to produce results.

Email – a Blessing or a Burden?

Most of us are guilty of being slaves to our inbox, whether we like to admit it or not. We keep every thing that has ever been sent to us out of some sort of unfounded fear of not having it should we ever need it. And the “reply all” function makes it exponentially worse. Well, each of those emails, particularly the ones with large attachments, take up space on your computer  – and space in your head when you are actually trying to find something. Email is the third largest culprit of workplace interruptions and email mismanagement costs you money.   Take charge and clean up that clutter by creating folders and subfolders to organize your communications. Save the attachments that you will need later onto your hard drive in a logical place, then delete the email if its unnecessary. Set your computer to delete your Trash after 30 days. Anything you can think of to reduce the number of emails in your actual inbox will save you time and money down the road.

GCInfotech can get you started on the path to a leaner, more efficient IT strategy. If you don’t have an IT Manager to make a New Year’s Resolution for you, then give us a call. 

GCInfotech is your total business IT solutions resource for Cloud Computing

Everybody’s talking about “the cloud.” But what does it all mean?

Cloud computing is nothing new. But boy does everyone love a new and exciting buzzword. The key, really, is knowing if sending your data into the cloud is a sound business decision for you. GCInfotech can help you avoid the pitfalls and find the clearest path to the cloud, while weighing the risk vs. reward and the value vs. cost of moving your vital business processes into a cloud-based, hosted environment.

So, what is the cloud anyway? It’s really nothing more than third party management of your data, allowing for easy access from any portal or device that’s connected to the internet. Sounds simple enough, but this in and of itself doesn’t necessarily mean you should make the leap into a cloud-based system.

Ask yourself a few questions first:

Do you have a good way to protect and back up your data regardless of where and when you access it?

Do you have sufficient bandwidth to access the cloud efficiently?

Are your emails kept confidential?

Will the cloud provider stick around if you have a financial meltdown?

Do you have ballooning technical infrastructure costs that you’d like to address?

What are the benefits?

1. Reduced space. Physical hardware can take up a lot of space. Take for example your servers. If you virtualize these, you can probably fit all of them onto one or two units. This will reduce the space your hardware takes up, freeing up extra storage capacity or possibly another desk.

2. Reduced overhead. Having hardware and servers in an office can be expensive to maintain. Cloud computing will often reduce overhead costs and save you money.

3. Quicker backup and recovery.  This means that your vital data is always backed up and protected. Beyond that, the backups ‘are in the cloud’, meaning that if there is a disaster, you can recover lost data quickly and easily.

4. Longer hardware replacement cycles. Virtualized solutions and platforms often require lower computing resources because they are hosted on the provider’s servers. This means that you won’t have to replace existing tech hardware.

5. The cloud is scalable. If your company is growing, you will eventually have to add new systems. In an already cramped office this means finding the space for hardware or servers needed to support your growth, not to mention investing in systems that are compatible with existing hardware. Virtualization is highly scalable, and can grow with your company, often without the need for extra services.

We assure you, the cloud is nothing new and nothing to feel overwhelmed about, but there are indeed a variety of links in the chain of services that can often lead to a cloud-based solution that’s just plain cloudy.

Let GCInfotech help  you clear the fog and find a solution that makes sense for you and your business.

GCINFOTECH

One of the most frequent threats on the Web today.

Since we wrote an article on the imminent threat posed by rogue security software (scareware) and cyber criminals, we have received numerous inquiries requesting more information on how to protect computers and networks from these elusive intruders. We would like to share notable examples of fraudulent system alerts and expand on a few known malware manifestations in order to help you better identify security risks. 

Critical Security Measures

  • Keep Java & .NET up-to-date, as both are used in almost all platforms.
  • Schedule Windows Updates to install automatically, or periodically check your system to ensure there are no critical patches requiring action (Start Menu/ Control Panel/ Windows Update).
  • Maintain Anti-Virus & Malware protection.
  • Install a firewall and keep it turned on.
  • Use caution when you click links in email, on social networking websites, or on pop-ups.
  • Make sure you and your fellow co-workers are familiar with common phishing scams.

Fake Virus AlertCiti Phishing Scam

Windows Security Alert  This fake security alert is deceptively similar in appearance to a legitimate system alert, though pay close attention to its language. Are words misspelled? Are there errors with basic grammar? It’s important to examine these alerts for telltale signs of fraud.

Citi Email Phishing  Common phishing scams frequently appear to come from financial institutions and can be difficult to identify especially if you happen to have an account with that institution. Again, look for language inconsistencies and examine the link provided to determine where it actually goes. As a general rule, banks will never ask for personal information in an email, so the best defense is to use common sense.

Spyware Software WarningFake task bar security alert

Common fake task bar alerts  Learn what security software you have installed on your computer. This will help you determine the validity of pop-up alerts warning you of infections on your system. Remember, they’re designed to scare and lure you into a fraudulent scheme that ends with you inputting your credit card or other personal information.

If you have any questions or concerns regarding the safety of your computers and networks, or scareware in general,  do not hesitate to give GCInfotech a call today and one of our technical consultants will be happy to assist you.

GCINFOTECH

Beware of Scareware

Fake Anti-Virus and Rogue Security Software – One of the most frequent threats on the Web today.

Have you ever experienced a random pop-up on your computer warning you of an egregious security risk to your system? It may even appear disguised as one of the legitimate Windows security updates that you’re accustomed to seeing. That’s exactly the illusion that cyber criminals intend to create.

What is fake anti-virus?
Also known as scareware or rogue security software, fake anti-virus is a form of social engineering that lures users to malicious sites and scares them into purchasing fake threat removal tools. This brand of trickery garners big bucks for cyber criminals. Once your system is infected, common manifestations include incessant displays of false alert messages that won’t cease until payment is made or the malware is removed, fake Facebook application invitations, 9/11 scams, and ads for fake comprehensive anti-virus packages. In most cases, the malware pretends to find dangerous security threats on your system and offers a free scan while simultaneously compiling folders of junk on your hard drive that the scan can then detect. From the authentic looking pop-up warning to the professionally crafted website it directs you to, it’s an elaborate ruse to scare you into purchasing a fake anti-virus software.

What can it do to my computer?
Malware authors program certain behaviors to make your system errors seem real and believable, which increases the likelihood that you will purchase a fake anti-virus program. Some of those behaviors include:
  • Prevent anti-malware programs from running
  • Disable automatic system software updates
  • Block access to websites of anti-malware vendors
  • Download other types of malware, like banking trojans
  • Interfere with or corrupt normal system activity and critical processes
  • Disable the task manager and make use of the registry editor
  • Redirect web requests from legitimate websites to error pages or malicious websites
  • Deny access to certain programs
  • Disable parts of the system to prevent an uninstall

How can I protect myself?
Cyber criminals employ a huge variety of tactics to compromise your system– to name a few, SEO poisoning, imbedding code in legitimate websites and advertising feeds, and email spam campaigns (i.e. “you have received an e-card”, account suspension and password reset scams). According to a 2010 study by Google, 11,000 domains hosting fake anti-virus software were found, which accounts for 50% of all malware that’s delivered via internet advertising. These lucrative criminal networks grow daily and their contrivances will only continue with time.

Protection begins with a comprehensive and layered security solution. Whether you’re an individual user or a network of users, always adhere to internet use best practices. Keep your browsers and version of Windows up-to-date. Configure your pop-up blockers and familiarize yourself with what anti-virus solution you have installed so you’re able to recognize inconsistencies.

Information Technology Services

Clean up your IT strategy.  Spring is a perfect time to revisit your plans for those critical IT systems you use to keep your business data safe and secure. Review key procedures and plans like network failover testing, disaster recovery, business continuity, and data backup. Loss of data interrupts your business continuity and can be very costly. Studies show that 1MB of data is worth approximately $10,000 and the cost of having to rebuild 20MB of data could be more than $17,000 and could take up to three weeks to complete (For an integrated, online backup, storage and sharing application, tryIBackup). For those of you with an on-site backup solution, now is the perfect time to run those backups with a test recovery.

Clean up your data storage.  Consider adopting a plan utilizing Data Lifecycle Management (DLM) to remove the day-to-day and budgetary headaches:

  • DLM is the comprehensive approach that organizations use to deal with data throughout its lifecycle, from creation and initial storage to eventual archival or disposal.
  • Options vary depending on need, but some useful storage systems to consider include Storage Area Networks (SAN), Network Attached Storage (NAS) and Hierarchical Storage Management.


Clean out the bugs. 
To be sure  your computers, tablets and smartphones are protected, optimize your security this spring with new or updated Anti-virus, Spyware and Malware software. (For an easy-to-use, simple, and effective anti-malware application, try Malwarebytes)

Clean out your Email. Email mismanagement costs you money. Email is the 3rd largest culprit of workplace interruptions, which cost the U.S. economy $900 billion per year. Take charge and clean up that clutter!

Clean your keyboard. Get yourself an ozone-friendly compressed gas duster and give your keyboard the deluxe treatment it so desperately needs. (Warning: Keyboards are not dishwasher safe.) Your mouse and phone handset can be cleaned with a paper towel and some window cleaner!