Tag Archives: Business

Top 4 Threats Attacking Your Network And What To Do About Them

Top 4 Threats Attacking Your Network
And What To Do About Them

#1 Overconfidence

User overconfidence in security products is the top threat to your network. Failure to “practice safe software” results in nuisance attacks like porn storms (unstoppable rapid fire pornographic pop-ups) and more subtle key loggers that steal passwords. Surveys promising free stuff, result in theft of information like your mother’s maiden name, high school, etc. used to answer common security questions leading to theft of otherwise secure data. Think before you click!

#2 Social Networking Sites

Social networking sites like Facebook are exploding in popularity. Threats range from malware (eg. viruses, worms, spyware) to scammers trying to steal your identity, information and money. Many businesses and government agencies are using these sites to communicate with clients and constituents, so simply blocking access is no longer reasonable. Defending your company while allowing employee access requires social network education for your employees and the enforcement of strong acceptable use policies. We can help you develop a policy, then monitor compliance using a Unified Threat Management device that controls and reports on network access.

#3 Attacks On Mobile Devices

Everyone is going mobile these days not just the “road warriors.” Once limited to laptop computers, mobile network devices now include PDAs, handheld computers and smart phones, with new appliances appearing in the stores every month. Mobile devices often contain sensitive data yet they are easily lost or stolen. Be sure to password protect and encrypt data on all mobile devices whenever possible. Include mobile devices in your acceptable use policy.

#4 Cloud Computing

“The Cloud,” in its most simple form, involves using the Internet to access and store your data. When you access email using a web browser, you are working in “the cloud.” Using the cloud for automated off site backup is rapidly gaining popularity and is just the beginning. Companies like Microsoft, IBM and Google envision the day when we will use inexpensive terminals instead of computers to run programs and access data located somewhere on the Internet. You need to be sure that any data you store and access across the Internet is secure not just where it is stored, but during the trip to and from the Internet.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Top 4 Threats Attacking Your Network And What To Do About Them

Apple Picking?

Apple Picking?

Apples are picked on crowded subways, in quiet parks, on busy street corners, in loud bars. Apples are picked while people are talking on the phone, the picker dashing past and doing the deed in midstride.

I’m not talking about Red Delicious apples. I’m referring to the Apple iPhone. Many major cities have seen an increase in the crime rate because of the Apple iPhone. In New York City alone in 2012 there were 16,000 Apple “pickings”, or 14% of all crimes.

Here are 5 simple things you can do to take the “drama” out of your life and maybe avoid having your phone stolen.

Be Aware – When texting or listening to music you may “zone” out of your recent reality. You become unaware of your surroundings. That makes you a perfect target.

Get Insurance – If you live in an urban area or travel a lot, consider getting “specialized device insurance.” You may also be able to add it through your renters or homeowners for a small yearly cost.

Install Device Recovery Applications – There are several available for Android phones and Apple’s “Find My iPhone” app is pre-installed. You can track it, and as a last resort “wipe” all of your personal data, but cannot render the phone unusable.

Back Up Your Device – While the phone may have monetary value, it also contains much personal information such as your contacts, and photos. So back it up.

Don’t Argue, Give The Thief The Phone! – You can buy a new phone. You, on the other hand, are irreplaceable.
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on Apple Picking?

Tips For Handling, Storing, and Disposing Of Confidential Documents

Tips For Handling, Storing, and Disposing Of Confidential Documents

In the past 10 years, over 10,000 new regulations have been placed on the books by local, state and federal agencies pertaining to the handling, storage, and disposal of confidential client, patient, and employee documents.
A few examples are:

• SEC Rule 17a-4 Electronic Storage of Broker Dealer Records Graham-Leach-Bliley Act
• Financial Services Modernization Act
• Sarbanes-Oxley Act
• DOD 5015.2 Department of Defense
• Health Insurance Portability and Accountability Act (HIPAA)
• Fair Labor Standards Act
• Occupational Safety and Health Administration (OSHA) Act
• Payment Card Industry Data Security (PCI DSS)

No matter how small your business is, you are surely going to be affected by one or more of these new government regulations. Naturally some industries are more regulated, such as financial or medical, but all companies that hold information such as employee social security numbers, credit cards, financial statements (credit applications, bank statements, order forms) fall under these new regulations.
While we cannot cover every single aspect of protecting your company, here are a few tips that will go a long way in making sure you don’t end up fined, sued, or with a bad reputation for not securing your clients information:

• Seek professional help. If you think you are holding confidential information that should be secured, ask a qualified attorney who specializes in data confidentiality in your industry about what you must do to meet new government regulations.
• Shred all documents that contain confidential information. A good shredder should do a cross cut or diamond cut versus a simple strip shredder to make it more difficult for someone to piece together a shredded document.
• If you have to keep a copy of contracts or other documents that contain confidential information, contact a high-security document storage facility and they will store your documents in a high-security location.
• Keep a fire-proof safe with a lock and key for employee documents you need to keep onsite.
• Make sure your offsite backups have 32-bit encryption (ask your provider). Also make sure the facility where the information is stored is under lock and key with security camera and access-controlled security.

Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on Tips For Handling, Storing, and Disposing Of Confidential Documents

Why Your Laptop Needs An “Instant Kill” Switch

Why Your Laptop Needs An “Instant Kill” Switch

It’s lunch time and you stop by your favorite café to check e-mail and grab a bite to eat. You settle in at a table when your pickup number is called. Returning to your table, you find your laptop and appetite—has disappeared!
Okay, maybe you’re not foolish enough to leave your laptop unattended in a public place, but one of your employees might think it’s okay to leave a laptop or PDA in their car, a hotel room, or in their gym bag and end up exposing your company’s data and network to thieves.
If it hasn’t happened to you or someone you know, according to the FBI, it will. Maybe you have a backup of the data, but now detailed information about you, your family, your business and your clients is in the hands of a criminal intent on stealing your money, identity or worse. There is a lot of software and hardware that protects your data from being stolen by online criminals, but how do you protect your data when someone steals your physical laptop or PDA?
Until now, your only recourse was to change the passwords to your network, financial websites, etc., watch your credit report and cross your fingers hoping for the best. But thanks to new security software, you can instantly erase all of the data on your laptop or PDA preventing thieves from accessing the data.
Here’s how it works: Special security software is installed on your laptop that checks for your “kill” command whenever it connects to the Internet. This happens even before Windows prompts for the user name and password. If it receives the “kill” message, the data on your computer is instantly destroyed. You may not get your laptop back, but you’ll prevent the thief from stealing the information it contains.
If you’re a business, check out Absolute Software’s Computrace and Novell’s ZENworks. Both should be installed and configured by your system administrator or a computer consultant. If you want to protect your home computer or personal laptop, use zTrace’s zControl. Although designed for the general public, it can be confusing to install and configure so seek the help of a professional.
In the PDA world, there’s remoteProtect from sCPsOFT for Windows CE, Windows Mobile and Pocket PC devices or Bluefish’s Central for the Palm Treo. If your PDA is stolen, you simply text a message to it that includes your password and the PDA is reset it to its blank factory default condition. What could be easier?
As with all theft and hacker deterrents, thieves can circumvent this software by downloading your data before connecting the device to the Internet. Surprisingly, the typical thief isn’t smart enough to know this. So, for absolute security, data encryption remains the most reliable form of protection. Encrypted data is unreadable to thieves unless they have your encryption key. There are pros and cons to both approaches, but it’s important for you to have SOME protection. For help in determining the best solution for you, give us a call: 985-871-0333.
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Comments Off on Why Your Laptop Needs An “Instant Kill” Switch

Is Anything In Life Really Free?

Is Anything In Life Really FREE?

Warning: If You’ve Downloaded Free Software
From The Internet, Your Computer May Be At Risk For
Viruses, Hackers, and Spyware!

We’ve all heard the saying that the best things in life are free, but I’m not sure they were referring to software.

Freeware (free software, not to be confused with open source software) such as the AVG anti-virus free edition, Spybot, and Ad-Aware are all programs you can download to your PC for the ultimate discount: free. However, you get what you pay for.

While these programs may work just fine for someone’s home computer, they are not business class tools and should not be trusted to completely protect your computer or network from viruses, spyware, hackers, and other problems.

Every month we receive calls from clients whose computers are infected with a nasty virus or a boatload of spyware who had these programs installed and running, and were under the false assumption that they were protected.

Why Freeware Doesn’t Protect Your Computer

In most cases, freeware is a light version of a software program that you pay for. Take the AVG free edition for example. AVG offers a free edition of their licensed product as a way of introducing you to their fully-featured product. However, this software does not come with any online, e-mail, or phone support. It is also illegal to use it on multiple machines or in a commercial, non-profit, or educational environment (single home users only).

You’re On Your Own

As you might expect, freeware comes with zero guarantees or promises to function correctly, to be compatible with your system, or to safeguard you from threats. You’re not a paying customer so you’re on your own to resolve any technical problems you encounter, and you certainly won’t get support if your computer gets infected.

Since many free applications are plagued with bugs and incompatibilities, you may end up with a mess on your hands and no one to blame but yourself.

Additionally, freeware programs are not always current with the most up-to-date protection, and don’t always update themselves automatically or perform scans and tasks on a regular schedule. That means you could be operating with a false sense of security; and since the sophistication and number of threats circulating are only increasing, you need a comprehensive solution that you can trust especially if your computer or network holds data and files you don’t want to lose or make available to a cyber-criminal.

Bottom line: you get what you pay for. If the files, data, pictures, and functionality of your computer or network is of high-importance, then investing in a trusted, industrial-strength software program to protect it is a smart and worthwhile investment.

Continue reading

Posted in Uncategorized | Tagged , , , , , , | Comments Off on Is Anything In Life Really Free?

“Great by Choice”

Great by Choice

I would like to recommend “Great by Choice” by Jim Collins. This book and all of the books Jim Collins has written are invaluable to building a Great company. Mr. Collins has many insights and observations that can help take your business from being a “Good” company to a “Great” company. This year we sent all of our clients “Great by Choice” on audio CD as a Christmas gift. Now everyone is talking about 20-Mile Marches, oxygen canisters and triangles and how they will help make their businesses more successful. I hope you decide to take your business and life from Good to Great. Mr. Collins can help you with the first step if you choose to read his book.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!
Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , | Comments Off on “Great by Choice”

“Why You Should Avoid Using A Debit Card “

Why You Should Avoid Using A Debit Card When Shopping Online

If you shop online (and these days, who doesn’t?), you’ll want to make sure you use a credit card instead of a debit card to protect yourself from online scams and rip offs. The biggest advantage credit cards offer is a buffer for payment. By law, your maximum loss if your credit card number is stolen is $50, and most credit card companies and banks will cover the entire cost.

When you use a debit card, the funds come directly out of your bank account, which means you might have trouble disputing the charge if you get scammed or if you are not happy with the product or service you purchased.
Here are some other tips to make shopping online safer:

• Research your merchant before buying. The Federal Trade Commission maintains a web site (www.consumer.gov) that provides many buyers’ guides, lists of tips, and links to helpful resources.

• Make sure you are on a secure web site before you give your name, address or credit card details. Look for a padlock or a key symbol in the bottom corner of your screen.

• Never send your credit card number in an e-mail because it can easily be stolen.

• Frequently check your credit card statements for suspicious entries. If you spot anything strange, contact your credit card company immediately to question the charge.

• Call the company before placing an order. See if a real person answers the phone and how difficult it is to get someone live. Ask for their return policy for damaged or inadequate goods, expected delivery dates, shipping and handling fees, and after-purchase support.

• Think before you buy. If the online advertisement or junk e-mail offer sounds too good to be true, it probably is! If you have any reason to be suspicious, you are better to err on the side of NOT buying.

• Watch for hidden extras added on at checkout such as postage and packing costs, and handling fees. VAT and Customs charges for goods from overseas can add greatly to the final cost.

• Read the company’s privacy policy carefully. Make sure you uncheck any boxes giving the vendor permission to sell or share your information with other vendors.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Comments Off on “Why You Should Avoid Using A Debit Card “

How To Avoid The Top 5 Budget Busting, Stress-Inducing Mistakes When Moving Your Office

How To Avoid The Top 5 Budget Busting, Stress-Inducing Mistakes When Moving Your Office

Moving is always a pain, but it doesn’t have to be a horrific, expensive experience. The number one lament from someone who’s experienced a “bad” move is, “I didn’t know I needed to…” followed closely by “I completely forgot that…” In other words, it’s what you don’t do that makes the move a disaster.

To make your move easy and effortless, here are the 5 most common mistakes you want to avoid:

Mistake #1 — Not Using A Checklist

This may seem like a no-brainer to those who manage projects, but project management may not be a forte of someone placed in charge of your move (like an office admin). Even those who use a list typically fail to make the list detailed enough.

Mistake #2 — Trying To Save Money By Using Your Employees To Move Your Computer Network

Don’t ask your staff to disconnect, move and reconnect computers, phones and other devices just to save a few bucks. You’ll frustrate them and end up with phones ringing at the wrong extension, lost cables, and workstations that get dropped rendering them useless. You don’t want to let the movers do this job either; they may be great at moving furniture, but a network is a lot more sophisticated and sensitive. Be smart and hire an IT pro to pack and move your network. Doing so will help you avoid communication blackouts and extended downtime.

Mistake #3 — Not Hiring The RIGHT IT Firm To Move Your Network

While we’re on the topic, make sure you know what to look for when outsourcing the move. A few things to look for would include references from other clients, proof of insurance (get them to fax you a copy), and a professional, organized approach to quoting the move. A real pro will insist on visiting your current location as well as your new location to conduct a detailed site survey. NEVER hire anyone who wants to quote moving your network over the phone. Additionally, look for an IT company that will apply the charges for conducting your site survey against the total cost of the move if you choose them.

Mistake #4 — Not Giving Your Phone, Internet And Cable Vendors Enough Advance Warning

Eighty percent (80%) of unexpected communications blackouts and cost overruns on network moves are caused by failure to properly plan voice, data and electrical installation in advance. Just because the prior tenant had computers and telephones is no guarantee that the cabling is suitable for your phones and your computer network. Advance planning will help you avoid emergency rush fees or band aid fixes to make things work.
Internet and telephone connections require as much as six weeks advance notice to be installed, tested and ready the day you move in.
And if you are building a new office, don’t leave it up to the builder to decide how many power outlets, network and phone connections you will need. Remember, changes and additions after the walls are up are at your expense. With printers, scanners, faxes, and other technologies connecting directly to the network these days, the rule of thumb of one electrical outlet, one phone and one network connection per employee is woefully outdated. Consult your IT provider in the early planning stages to ensure you have what you need before the drywall goes up.

Mistake #5 — Poor Communication With Vendors And Employees Prior To, And During The Move.

Failure to communicate changes before and during the move results in confusion, downtime and increased expense. Remember, your computers and phones will be unavailable for a period of time before, during and immediately after the move. A little planning can minimize the impact on your business.
• Give your employees, customers, and vendors the anticipated downtime schedule.
• Make a cell phone list of important phone numbers (like tech support contacts, the phone company, cable company, etc.) and give it to your employees. You may also want to provide vendors and customers with a list of employee cell phone numbers to use during the communication blackout that will take place during the move.
• Confirm, confirm, confirm! Call your vendors several times to make sure they have the move on their schedule and planned; don’t assume anything!
• Ask your IT provider to temporarily reroute important e-mail and phones to another location during the move, or set up a web portal to enable you to access e-mail from a laptop or home computer so you’re not completely disconnected.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on How To Avoid The Top 5 Budget Busting, Stress-Inducing Mistakes When Moving Your Office

How to Electronically Sign Documents

How to Electronically Sign Documents

In today’s fast pace world, signing documents electronically can help you keep up with the pace. So what is an electronically signed document, anyway? An electronically signed document will not allow changes to be made to the document after you have signed it.

So if someone sends you a contract via email. You can review the contract and electronically sign the document and return it via email. You do not need to print the file out, sign it with a pen, scan it and email the file back. You can sign it without paper and pen. You will have a copy of the document as you agreed to it as well as any other party that is involved. All parties will know that it was your signature, by third party verification.

To sign a PDF here are some simple steps to follow:

Inside Adobe Acrobat choose the “sign” icon. Then choose “place signature”. Choose a location for your signature. You now have a signed document.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , | Comments Off on How to Electronically Sign Documents

“3 Lessons From Hurricane Isaac”

“3 Lessons From Hurricane Isaac”

As we are just getting over the aftermath of Hurricane Isaac, I wanted to share 3 of the lessons that we confirmed as we helped our clients get back up and running. Hurricane Isaac confirmed 3 of Ener Systems’ best practices.

1. Having a backup internet connection does make a difference. Having both Charter and AT&T internet connections, kept us from being totally out of commission during Isaac’s aftermath. Our clients with redundant internet connections had the same experience.

2. Having a generator even if you plan to evacuate can help your business get back up and running sooner. Some of our clients evacuated, to come back and find their offices were still without power. Generators help them continue to run their business and help their clients sooner.

3. Having RADAR kept our clients receiving email, even when their email servers were offline due to a power or internet outage. As long as they had an internet connection where they were staying, they were able to send and receive all of their emails. They were never without email communication. This helped with client communication as well as employee communications.

We recommend that all clients have a redundant internet connection, if business continuity is important to their business. Ener Systems has a portable generator that is available to our EnerCare Total Control clients. RADAR is part of our best practices and offered to all clients as an email archive and business continuity solution.

I hope you will find this post informative and useful. I am looking forward to hearing your comments. That’s all I have for today, until next time make it a great day!

Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , | Comments Off on “3 Lessons From Hurricane Isaac”