Posts

Showing posts from January, 2019

The threats out there: Have you considered their impact?

Image
The threats out there: Have you considered their impact?

Oct 28, 2012–Hurricane Sandy hit New York, America’s largest city. The consequences were disastrous and resulted in a shutdown of a city of 8.6 million people. Places that weren't supposed to ever close, such as major hospitals, had to be evacuated. It was from the intense flooding of the city that many large corporations and hospitals discovered an unanticipated vulnerability many had never considered: the massive banks of batteries that support uninterruptible power systems and backup generators are located on the lowest floors of buildings at risk of flooding. The flood waters that poured into underground tunnels and subways also poured into the basements of downtown buildings, incapacitating what was a key part of standard disaster recovery plans. Electricity to Manhattan was not fully restored until six days had passed and many emergency power sources were disabled.*

Think you are not subject to hurricanes? Far from a flo…

Be Proactive: How to Avoid Potential Network Failures

Image
Be Proactive: How to Avoid Potential Network Failures For small- to medium-sized businesses (SMBs), an IT network failure can be devastating because they don't have the resources of large corporations to bounce back from such disasters. Preparation against such devastation may be the only course for them to avoid failure and survive with the least damage if failure occurs. SMBs must be proactive in recognizing the eventuality of a cyberattack or human error that can cause data loss and disrupt business continuity. This is what needs to be done to help prevent a potential failure. Be prepared: Being proactive is an essential step for preparation against a disaster. There are two ways to determine how to best prepare to prevent potential failure of your infrastructure. First, you need to identify the weaknesses throughout your systems, and second, determine how you are going to eliminate those weaknesses and protect your network. Identify the weaknesses: Determine how and why your syst…

It is Heaven! Using the Cloud to Challenge Big Business

Image
It is Heaven! Using the Cloud to Challenge Big Business Has anyone suggested you begin moving your business to the cloud? Cloud data storage or cloud computing? What is this, anyway? And isn't it something for huge companies? In the last post we explained what cloud computing is. Simply put, it is the offsite storage of your data, and perhaps even the software packages you use. The primary benefit is pretty straightforward. Somebody else pays for all the hardware and support costs needed to store your data. You pack up all your own servers, wiring, etc. and take them to the recycling center, and save money. But is that all it is? There is a much stronger case for a small business to incorporate the cloud in their business model. The cloud allows you to become competitive with the big players in your industry. The traditional issue holding back small business: they do not have the capital to create the infrastructure to compete with large firms. They are too small to enjoy economies o…

5 Ways SMBs Can Save Money on Security

Image
5 Ways SMBs Can Save Money on Security Small-to-medium sized businesses and large enterprises may seem worlds apart, but they face many of the same cyber-security threats. In fact, in recent years, cyber-criminals have increasingly targeted SMBs. This is because it’s widely known that SMBs have a smaller budget, and less in-house expertise, to devote to protection. Thankfully, there are several things SMBs can do today to get more from even the most limited security budget. And, no, we aren’t talking about cutting corners. Far too often, SMBs cut the wrong corners and it ends up costing them more money in the long run. It’s a matter of taking a smarter approach to security. Here are five smart approaches to take
Prioritize - Every business has specific areas or assets critical to its core operations. Seek the input of valued staff and team members to determine what these are. Is there certain data that would be catastrophic if it was lost or stolen? If hackers compromise a network, or p…