Archive

What is Business Continuity and Why is it Vital?

Whether you have 5 employees or 5,000, you want sustained uptime. That means the infrastructure that houses your company’s most critical data and the people who run it are invaluable, regardless of size. Do your employees know what to do in the event of an emergency? No matter how many of them do, a business continuity plan is essential for an unanticipated disaster. Last week we talked about six disasters likely to impact your data center. However, this list is far from exhaustive. Though it’s true that no one plan can protect you from every possible scenario, having a plan…

Read more

Three Key Considerations Regarding Network Security

Now more than ever, the concern of network security should be one of the top priorities of small business owners. With accounts of unsuspecting startups devastated by cyber attacks becoming more and more common, network security is a concern that can no longer be ignored. Three Key Considerations Regarding Network Security: 1. Smaller doesn’t necessarily mean safer. Although some businesses assume that because their network is small it will escape unwanted attention, this assumption is incorrect. According to PC World, the idea that smaller networks are harder to crack is one of the top five myths of Wi-Fi security. While some network administrators assume that weakening…

Read more

The Latest E-Mail Scams Target CEOs and Cost Businesses Billions

It seems you’re always reading about a new email scam every week that fools office employees. Some of those, however, have a lot of clues now that indicate they’re phishing scams. In that regard, employees are a little more on guard on catching email scams while working. Yet, the creators of those emails are always finding new ways to evolve their dirty work so it keeps fooling more people. One of the most recent email scams targets CEOs rather than employees. You can see the devious nature of this type of email based on the idea that it doesn’t use the typical…

Read more

SANS Policy Templates: Clean Desk Policy

The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for developing a clean desk policy as a part of overall network security. A clean desk policy largely revolves around keeping company information confidential. This may be, but is not limited to customer information. Certainly there are examples of both customer and non-customer information becoming public which would,…

Read more

IBM Servers

As small, medium and large enterprises have increasingly complex storage, data and network needs, they continue to invest in more sophisticated servers.  An IBM server provides a cutting edge solution with extremely powerful, reliable service. A typical IBM server has either 8, 10 or 12 cores with 2 all the way up to 16 terabytes of memory.  It also has 8 SFF bays and 2 to 16 sockets. Users have advanced customization and integration options as well.  It is one of the leading server providers on the market. With all of this power and functionality, a good data center is crucial. For…

Read more

Email Security: Five Tips to Protect Yourself

E-mail can be a terrific form of communication for keeping in touch with family, friends, and business associates. However, using it unwisely may make you and your computer susceptible to spam, scams, and viruses. Here are five tips to avoid these problems: Utilize Security Software A decent security program with a firewall should be your first line of defense when using a PC. It should come as no surprise that comprehensive security programs are necessary to protect PCs against spam, viruses, worms, Trojans, etc. Even for email, security software can protect against the malicious software hiding in email attachments. Be Smart…

Read more

6 Disasters Likely to Impact Your Data Center

Mitigating risk is a good practice for any business. When it comes to protecting your IT infrastructure, it’s as mission-critical as the data and applications it powers. Though downtime can arise from multiple seen and unseen factors, in a third of cases (33.9%) it can be attributed to one cause: natural disaster. But which are the most likely disasters to impact your data center? Familiarize yourself with this list to better form your business continuity plan and ensure uninterrupted up time. Hurricane or Tornado High winds from hurricanes and tornadoes can create devastating effects on your data center. Authorities like…

Read more