Blog

October 16th, 2014

Productivity_Oct16_CEmail is an essential tool for a business's productivity. While there are a wide variety of email programs out there, almost all of them rely on one of two major protocols: POP or IMAP. As a business owner, it would be a good idea to know what these protocols are and which of the two is better for your business.

Difference between POP and IMAP

POP, or Post Office Protocol, was first developed in early 1984 and is currently in its third version (POP3). POP works by allowing users to retrieve email and download it onto their computer. Because this protocol was developed before constant Internet connections, it is meant to allow users to interact with their email on their computer and then connect to the server to send it.

What this means is that usually, you connect to the server and download all of your messages onto your computer and then disconnect from the server with all messages being deleted from the server. When you connect to the server again, the messages are uploaded from your computer to the server which then sends the messages to the recipients.

IMAP, or Internet Message Access Protocol, is a newer protocol that was designed for faster and constant Internet connections. Essentially, the email messages live on the server and the user downloads copies to their computer. When the copy is sent, it is uploaded to the server which then overwrites the message and sends it to the recipient.

Which protocol should my company be using?

While most email servers will support POP, many experts agree that it is best if companies use newer email protocols. The reasons for this are:
  • POP is largely outdated. As stated above, this protocol was first introduced in the '80s. The current, and most popular, version was introduced in 1989.
  • POP can be less secure. By default, older protocols can transmit password and login data unencrypted, which means anyone with access to your network and tools could gain access to the data.
  • POP can't support multiple devices. Due to the way POP works, only the currently connected client can see email messages. If you are on your mobile device, but logged into your email client at work, you won't get messages on your device.
  • POP lacks important business features. Most of us rely on calendars, address books, and task lists that are integrated into most email clients. With POP, these are most likely third-party solutions that live on local machines. This makes it difficult to access this information from other locations.
There are some really great newer email systems out there, including servers that run IMAP protocols, and even Web-based email solutions that pretty much negate the need for email servers in the office. If you are currently using POP, it may be worthwhile to contact us to see how we can help upgrade your email solution.
Published with permission from TechAdvisory.org. Source.

Topic Productivity
October 15th, 2014

BusinessValue_Oct13_CBusiness has become a much more mobile affair, thanks largely in part to the various mobile devices and operating systems currently available. These systems all rely on apps to operate and there are a near limitless number of apps, that business users can benefit from. To help, here are five of the most common types of apps business users install on their devices.

1. File creation, management, and collaboration

Many small to medium businesses are implementing cloud-based document systems. These systems enable easy file creation, storage, and collaboration between users in the office, coincidentally they also have mobile apps.

If you have cloud-based document systems like Google Apps or Office 365 in your office, it would be beneficial to install the mobile apps for the system that you use. The reason for this is because the mobile apps have the same functionality as their Web-based versions. From your device you can access files, create new ones, share them, and even edit files which means you can be productive on the go.

2. Lists

A good lists app can go a long way in helping to keep you organized. From creating a daily to-do-list to creating a list of long-term tasks or goals, you can create lists when you think of them and easily sync them with other devices and even colleagues.

Lists apps also help because we often come up with things we need to do while away from the office. Because our mobile device is always with us, we can simply add it to an existing list, or create a new one. No having to track down paper that may be lost, or trying to remember things.

While there are many list apps out there, one of the most useful is any.do which allows users to create both work and personal lists and share them with other users. Wunderlist is also great, as it allows users to create lists with sublists and even assign tasks to other people.

3. Notes

Like a list app, a good note app is essential. If you come up with an idea outside of the office, you can jot it down and have the note sync with other devices for action when you are back in the office. Apps of this type are also useful in meetings outside of the office because many of them allow users to record conversations and even add notes quickly. So, if an important idea comes up or is talked about it is recorded and not missed.

Some of the best Notes apps include Google Keep which syncs with your Google account and allows you to quickly create notes. If your office uses Microsoft Office, or Office 365, the best choice would be OneNote which can sync with your Microsoft account, bringing notes to any system. For those who want a powerful notes suite, the best option is Evernote, which works on almost every system and Web browser.

4. CRM

Customer Relationship Management (CRM) tools have become one of the most essential ways for business owners and managers to manage their relationships with their customers. Companies that have integrated a CRM solution have found that overall satisfaction and customer retention has improved.

Because these solutions allow you to quickly view customer data (e.g., contact information, sales history, etc.) it makes sense for mobile apps to be created for anyone working out in the field. In fact, most CRM solutions now have mobile apps that allow you to access customer databases from any mobile device. If you have a CRM solution, especially a cloud-based one, it is worthwhile checking with your provider if there is a mobile app too.

5. Communication

When out of the office, you need a way of keeping in touch with those back at base, or other employees who may also be out of the office. While email is usually enough to cover most communication needs, there are times when you need something more immediate. That's where apps like Google Hangouts, iOS Messages, Microsoft Lync, and even Facebook Messages can help. These chat-oriented apps enable communication wherever you have a data, or Internet, connection.

Beyond this, there are a wide number of VoIP solutions that offer mobile apps. When you install these on your device, you can turn your mobile into your office phone which will function exactly like your desk-based phone. This makes it easier to keep in touch with the office, so be sure to ask your VoIP provider if there is a mobile app you can install on your device.

If you have a favorite business app, let us know. And, if you are looking for a way to increase the value your business can provide customers, contact us to learn how a mobile solution can help.

Published with permission from TechAdvisory.org. Source.

October 10th, 2014

BusinessValue_Oct08_COne of the keys to business success is your staff. If you as a manager or business owner treat your employees well, your business has a better chance of running far more smoothly and will be far easier to manage too. While this is certainly easy to say, it can be a challenge to effectively manage employees in reality, and that's where systems like Enterprise Resource Planning, or more specifically HR modules, can really help.

What are Human Resource modules?

ERP, or Enterprise Resource Planning, is a suite of integrated business software applications (often called modules) that allow companies to track and manage data and even automate some business functions, including Human Resources.

Human Resource modules in particular are used to track different people-related functions, such as planning, payroll, administration, development, hiring, and more. Business services, like Standard Operating Procedures, job postings, news, forums, tracking of work hours, and benefits, etc., can all be unified into one module, which makes overall management and decision-making easier.

Benefits of using HR modules

Businesses that have integrated ERP and more specifically HR modules, have been able to benefit in a number of ways. Here are 5:

1. Automated processes that free up management

A large function of HR, as with many other business processes, is data entry and reporting. If you are trying to develop reports without an integrated ERP system, you probably need to pull data from numerous sources which takes time. This is time that can probably be better spent on more relevant tasks.

An ERP module data, once set up, will be more accessible. This simultaneously makes it easier to enter and pull data together into reports. And because large parts of daily tasks can be automated, you can ensure that what you need to complete is actually achieved.

2. Enhanced sharing of information and collaboration

Because HR is a central function of any business, data related to HR needs to eventually be shared with other teams or departments. Without ERP this likely means you will need to ask different people to share their data and then compile it into a useable format.

With ERP for HR, data is stored in a central location, or brought together to a central location, which means that data from different sources can be shared faster and easier. This also ensures that the right data is shared, thus enhancing overall outcomes and making it simpler for other teams to work together.

3. Management gains a clearer picture of HR

It can be tough to gain a short-term picture of your employee resources, especially when it comes to identifying potential resource shortfalls (e.g., double-booked holidays, employees who are constantly late, etc.) and where improvements can be made. For example, in most modules you can track overtime hours of employees, and receive alerts when overtime is past a certain threshold.

If you spot that one department is consistently banking extended overtime hours, you can move quickly to address this.

4. Data is kept up-to-date

As we've stated above, HR systems usually involve data from various locations. This means that there is always a chance of duplicate or incorrect information. A healthcare ERP module can help ensure that the data is not only correct, but also not duplicated, which can in turn speed up decision-making and enable better decisions to be made.

5. Reduced licensing expenses

Without ERP, your HR team could need five or more systems in order to keep track of everything. Each of these systems will need to be licensed, which can often be a serious investment on your behalf, not to mention the costs of setting up and maintaining these systems.

Because HR ERP modules offer an integrated solution, you pay for one license to cover all of your needs. This reduces overall expenses while also making it easier to budget and maintain.

If you are looking to integrate an ERP solution in your business, contact us today to learn more about how we can help.

Published with permission from TechAdvisory.org. Source.

October 9th, 2014

Security_Oct07_CWhen first announced in April of 2014, Heartbleed was one of the biggest security issues ever uncovered. Companies scrambled to patch systems and ensure they were protected from this problem. While big news, there is a recently uncovered security flaw called Shellshock which could make Heartbleed look relatively small in comparison, and it is a potential problem you should be aware of.

What exactly is Shellshock?

Shellshock is the name applied to a recently uncovered software vulnerability which could be exploited to hack and compromise untold millions of servers and machines around the world. At its heart, the Shellshock vulnerability is based on a program called Bash. This is a Unix-based command program that allows users to type actions that the computer will then execute. It can also read files called scripts that contain detailed instructions.

Bash is run in a text-based window called a shell and is the main command program used by OS X and Unix. If you have a Mac computer and want to see what Bash looks like, simply hit Command (Apple Key) + Spacebar and type in Terminal. In the text-based window that opens in Bash you can enter commands using the Bash language to get your computer to do something e.g., eject a disc, connect to a server, move a file, etc.

The problem with Bash however is that it was recently discovered that by entering a specific line of code '() { :; };)' in a command you could get a system to run any following commands. In other words, when this command is used, Bash will continue to read and execute commands that come after it. This in turn could lead to a hacker being able to gain full, yet unauthorized, access to systems without having to enter a password. If this happens, there is very little you can do about it.

Why is this such a big issue?

To be clear: Shellshock should not directly affect most Windows-based machines, instead it affects machines that use Unix and Unix-based operating systems (including OS X). So why is this so big a deal when the majority of the world uses Windows-based computers? In truth, the majority of end-users will be safe from this exploit. However, the problem lies with bigger machines like Web servers and other devices such as networking devices, and computers that have had a Bash command shell installed.

While most users have Windows-based computers, the servers that support a vast percentage of the Internet and many business systems run Unix. Combine this with the fact that many other devices like home routers, security cameras, Point of Sale systems, etc. run Unix and this is becomes a big deal.

As we stated above, hackers can gain access to systems using Bash. If for example this system happens to be a Web server where important user information is stored, and the hacker is able to use Bash to gain access and then escalate themselves to administrative status, they could steal everything. In turn this could lead to the information being released on to the Web for other hackers to purchase and subsequently use to launch other attacks - even Windows-based systems. Essentially, there are a nearly unlimited number of things a hacker can do once they have access.

If this is not dealt with, or taken seriously, we could see not only increased data breaches but also larger scale breaches. We could also see an increase in website crashes, unavailability, etc.

So what should we do?

Because Shellshock mainly affects back-end systems, there is little the majority of users can do at this time. That being said, there are many Wi-Fi routers and networks out there that do use Unix. Someone with a bit of know-how can gain access to these and execute attacks when an individual with a system using Bash tries to connect to Wi-Fi. So, it is a good idea to refrain from connecting to unsecured networks.

Also, if you haven't installed a Bash command line on your Windows-based machine your systems will probably be safe from this particular exploit. If you do have servers in your business however, or networking devices, it is worthwhile contacting us right away. The developers of Bash have released a partial fix for this problem and we can help upgrade your systems to ensure the patch has been installed properly.

This exploit, while easy to execute, will be incredibly difficult to protect systems from. That's why working with an IT partner like us can really help. Not only do we keep systems up-to-date and secure, we can also ensure that they will not be affected by issues like this. Contact us today to learn how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
October 9th, 2014

BusinessValue_Oct07_CSmall to medium businesses, like restaurants, fashion boutiques, salons, and service-based businesses are constantly looking for ways to minimize expenses. One way to do this is by implementing a mobile payment solution. This form of payment is set to take off in the coming months, especially when you take into account the number of new systems introduced and available already.

What exactly is mobile payment?

Most people would define mobile payment as either using your mobile device as a wallet, or using mobile devices to accept payment. Many services allow users to link credit cards to their mobile device and simply scan it over a pay terminal to have their account charged.

Companies on the other hand usually pay a set per-transaction fee in order to use the system; something along the lines of, or slightly cheaper than, most credit or debit-based payment terminals.

If you are considering switching over, here is a brief overview of the most common payment solutions.

PayPal

In late September Internet auction giant eBay announced that they will be spinning off their popular Internet payment system PayPal sometime in 2015. While many users will utilize PayPal to pay online, there is actually a mobile payment solution called PayPal Here, which is expected to grow immensely.

With Here, you get a payment solution app with a card reader that plugs into most smartphones (Android, iPhone, iPad, Android tablets) and allows you to accept multiple types of payment from anywhere you have an Internet connection. You can even track cash payments and record checks.

Vendors can use this app free of charge, however they are charged a 2.7% per swipe fee, based on the amount of the transaction.

Apple Pay

Apple Pay is Apple's recently announced mobile payment system that utilizes NFC (Near Field Communication) on the iPhone 6. Users with an iPhone 6 will be able to link their credit cards to their phone and then will hover their device near a terminal and press their thumb on the device's fingerprint reader to pay.

Your payment information (an account number linked to your card. Apple has noted that actual card numbers are not stored) is stored in the Passbook, and will be accepted at an initial 220,000 stores in the US when it launches sometime in October. There is a good chance that small to medium businesses will be able to integrate this solution into their business in the near future, so it would be a good idea to keep an eye on this.

What is interesting is that many banks have announced that they are considering accepting, or will accept Apple Pay as a method of payment. This means that businesses with an existing NFC payment terminal - which is often provided by a bank - should be able to accept payment (if the bank does of course).

Rumors have it that merchants will not be charged a transaction fee to use this service; details will be solidified when the system goes live.

Square

Square is arguably the most popular, or at least the most well known, mobile payment system. With a card reader that is compatible with most popular mobile devices (Android, iPad, iPhone) users can set up a whole Point of Sale system via the Square Stand and accept a wide variety of payments.

To use this solution, you need either the card reader (which is free) or the Square Stand (which costs around USD $99). For each transaction there is a fee that starts at 2.75% for credit and debit cards.

Amazon's Local Register

Introduced in mid August, this new card reader is aimed at both PayPal and Square solutions. As with these, there is a card reader that can be plugged into most devices (Android, iPad, iPhone) and an app that goes along with it. Businesses with the reader can then use the device to accept payment.

Where this solution differs is that the reader costs USD $10 to purchase. That being said, the USD $10 is refunded towards your first transaction fees upon signing up. The transaction fees are also quite a bit lower. For businesses that sign up before October 31, 2014, there is a flat rate of 1.75% per swipe until January 1, 2016. Any business that signs up after this date will pay a flat rate of 2.5% per transaction (based on the total transaction amount).

Google Wallet

Google Wallet is a hybrid mobile and online payment solution that allows users to add credit cards to their wallet and pay for things either online, or at stores with NFC payment terminals (also called contactless terminals).

While most users who have made a purchase on Google Play, or have used their Google Account to make a payment have used Wallet, this hasn't been the most popular of solutions when it comes to customers using it to pay in-store. The reason for this is because there are only a limited number of devices with the required NFC radio (two to be exact). This system is also currently limited to the US only. Customers around the world can use Google Wallet to pay online however.

There is a good chance that with the recent new announcements and upcoming mobile payment products, Google will be pushing this out to more devices in the near future.

There are other mobile payment system options available, so it is a good idea to contact us before you implement one. We can help you not only find a solution that works for your business, but ensure that it can be integrated into your existing systems.

Published with permission from TechAdvisory.org. Source.

October 6th, 2014

15983306_ml_Trick_or_Treat_decoHalloween is just around the corner. Have you picked the perfect pumpkin yet?

Pumpkins galore.  Here in the U.S. growers produce over 1.5 billion pumpkins each year. Originally grown in central America, pumpkins are now farmed in 6 countries and there are over 30 varieties of pumpkins. The worlds largest pumpkin weighs more than 1,700 lbs.

What’s inside?  Every pumpkin is filled with about 500 seeds. These seeds are a rich source of protein. Pumpkins are actually very healthy. One serving of pumpkin has about .5 grams of fat and a boatload of potassium, vitamin A, and fiber too.

Carve it up!  The tradition of carving vegetables on All Hallows Eve has been a common practice in many parts of world. Originally, it started a with rutabagas, turnips, gourds and potatoes. Carving them up and leaving them on the porch with a burning candle inside at night was said to ward off evil spirits and bring good luck to the household. We didn’t transition to the use of pumpkins until the 19th century.

Carving competitions.  Over the past decade, pumpkin carving contests have evolved into a highly competitive pastime. In Florida, there is even an underwater pumpkin carving contest.

Pumpkins soar.  Aside from carving, many people today find other fun traditions with pumpkins too. Delaware celebrates a whole festival devoted to launching pumpkins in the air. The World Championship Pumpkin Chuckin festival was recently dubbed one of the Top 100 Events in North America.

Chuckin.  For three full days festival goers enjoy chucking 8-10 pound pumpkins as far as they can. There are over a dozen categories to enter including air cannons, catapult, and human powered. Visit: punkinchunkin.com to learn more.

Happy Halloween!

Topic Article
October 6th, 2014

“Thank you for calling…” Take a look at this surprising news about our beloved telephone network. Surely, Alexander Graham Bell never saw this coming.

Public Switched Telephone Network (PSTN), also known as the wired telephone network, is widely used by people all over the world. However, with such rapid technological advancements, the use of PSTN has become rare, and people right now are more comfortable with the digital or wireless networks which are more efficient, stable, and secure than the PSTN.

The shift to new technology.  Before the advent of digital technologies such as ISDN (Integrated Services Digital Network) or FDDI (Fiber Distributed Data Interface), PSTN was the most popular telephone network. This network is based on copper wires that carry analog our voice data. The main problem with PSTN is that the network is not robust. Due to hurricane Sandy, the PSTN network was completely destroyed in the Mantoloking Island in New Jersey in 2013. In addition to this, the voice quality is often not satisfactory in the PSTN system, causing serious problems. Unfortunately, this is not the only notable natural disaster to disrupt services. Due to the structure of the system, PSTN is physically vulnerable where its new competitors are untouchable.

People have already started to use digital or IP telephony using the Internet.  All of the telephone operators today unanimously agree that an Internet-based telephone network is the only efficient option to satisfy the demands for their large number of customers. Within a very short time, the PSTN network will be completely abandoned by users, who prefer the ease of use and efficiency of the robust mobile broadband or IP-based telephone network systems.

The governments stance.  Government regulations will keep the PSTN network from being completely turned off. Despite the availability of better and cheaper alternatives, the PSTN network will be available no matter how few users it has. However, people have become more conscious, so the use of PSTN continues to decrease in a rapid fashion.

Go ahead… slice your phone bill in half!  There is no easy way to break this to you, but you’ve been paying way too much for your communication needs. Take a few minutes to pull out your telephone bill and give us a call for a FREE Phone Comparison. Carefully evaluate apples to apples so you can truly see how the cost of using PSTN telephone service is often much higher than its counterparts in the long run. Most business owners are shocked at the cost advantages, the included features, and the flexibility of Voice over Internet Protocol (VoIP) systems. It’s time to do a little price shopping.

Give us a call today for more information about reducing your telephone bill.
Autopilot Marketing
(855) 229-6862

Topic Article
October 6th, 2014

We all use the Internet these days for work and our personal lives. It is conveniently accessible on our smartphones, tablets, and computers. However, this also puts us one click away from prying eyes with malicious intentions.

Be aware of the dangers.  Sometimes ads have funny pictures or interesting stories, so be careful. Don’t click “Like” or “Share” on these types of sidebar or banner ads because they may be filled with a nasty virus or lead you to a malicious website.

Web trackers.  One of the most common issues you’ll see online is the web ads that track your browsing and show advertisements based on your viewing history. While you may always be tracked in some way, make a habit of clearing unnecessary plug-ins from your browsers to keep you safe and never download anything from a website you don’t know.

Firefox tracking and plug-in tips.
To make these changes in Firefox, click on the three grey lines in the upper right corner of your browser, that’s the “menu” button. Then click on the “privacy” tab and select an option under the “tracking” section. To edit your plug-ins click on the “menu” button again and select “Add-ons”. Deactivate or disable any plug-ins or extensions you don’t recognize or use.Explorer tracking and

plug-in tips.  For Internet Explorer 11, Point to the lower-right corner of the screen and move the mouse pointer up, then select “settings”. Click on “privacy” and under “tracking protection” select “add tracking protection lists” to install the current list from Microsoft. To remove add-ons, click on the “tools” button and select “manage add-ons”. Under “show” click “all add-ons” and you will see the “remove” option next to each one.

Take security into your own hands.  Make sure your antivirus program is up to date and your firewall is turned on. Their main purpose is to keep your systems safe from infections and unauthorized access.

Need a Firewall or Antivirus? Give us a call today. Don’t wait another moment to boost your security with these two essential tools for every computer user.

Autopilot Marketing
(855) 229-6862 
   http://www.komando.com/tips/267814/3-free-privacy-add-ons-for-your-browser/all

 

Topic Article
October 6th, 2014

cpuAs many of you may remember from Mary Shelley’s Frankenstein story, some creations just aren’t meant to be. Do you feel like your network is raging against you?

Network nuances.  While many business owners have computers, printers and servers not all networks are created equal. Often times they look so much alike from the outside that the type of machine labeled on the front is the only subtle difference from one office to another. However, the way your network operates proves its true worth.

“When falsehood can look so like the truth…”  — Mary Shelley’s Frankenstein.
Recently, a business came to us with network security concerns. They were fighting tooth and nail to use their network each day. It was almost as if it were attacking them. We found that many of the programs they used to keep their network running and their company data secure were not working properly. They had all the right tools, but no one to manage them regularly and keep them up-to-date. They had invested wisely in the right technology, but the miserable state of their network kept them from being able to use it efficiently.

What is network security?  It is a combination of provisions and policies setup to prevent and monitor unauthorized access, modification or other general misuse of your computer network. Generally, network security is developed in layers to create a secure platform for computer users and programs to operate at their maximum potential.

It’s alive! Your IT security policy. There are three primary components to keep your network safe; an IT security policy, enforcement, and auditing. An IT security policy is a principle document that outlines exactly how your company plans to ensure the security of your assets. This policy will always be a “living document”, meaning it is never finished. You will continually update it as your company changes and grows. Your IT Security policy will include things like an acceptable use policy, how employees are trained, what protection programs are in place and how your security will be carried out or enforced.

Strong enforcement for a stable network.  There are three primary areas of focus with enforcement; confidentiality, integrity and availability. Confidentiality involves the security of your assets from unauthorized use. Integrity ensures your network modifications and updates are in good hands. The overall state of your network access is the availability portion.

Can everyone access what they need?  If not, it’s time for an audit. Sometimes untamed networks just need more management to get back on track. A little fine tuning can go a long way.

“Who can assure themselves of certain happiness?”  — Mary Shelley’s Frankenstein.  You can! Don’t let your network become a malicious machine your fighting daily to get your work done. Calm the beast with proper policy, enforcement and auditing to keep your network healthy and operational.

Topic Article
October 2nd, 2014

Security_Sep29_CIt's probably safe to say that the security of your networks and systems is something you are concerned about. In truth, the majority of businesses do have security measures in place. The question you therefore need to ask yourself is if the measures you have implemented are sufficient enough. To help answer that question, here are five common security flaws business owners should be aware of.

1. Open wireless networks

Wireless networks are one of the most common ways businesses allow their employees to get online. With one main Internet line and a couple of wireless routers, you can theoretically have the whole office online. This method of connecting does save money, but there is an inherent security risk with this and that is an unsecure network.

Contrary to popular belief, simply plugging in a wireless router and creating a basic network won't mean you are secure. If you don't set a password on your routers, then anyone within range can connect. Hackers and criminal organizations are known to look for, and then target these networks. With fairly simple tools and a bit of know-how, they can start capturing data that goes in and out of the network, and even attacking the network and computers attached. In other words, unprotected networks are basically open invitations to hackers.

Therefore, you should take steps to ensure that all wireless networks in the office are secured with passwords that are not easy to guess. For example, many Internet Service Providers who install hardware when setting up networks will often just use the company's main phone number as the password to the router. This is too easy to work out, so changing to a password that is a lot more difficult to guess is makes sense.

2. Email is not secure

Admittedly, most companies who have implemented a new email system in the past couple of years will likely be fairly secure. This is especially true if they use cloud-based options, or well-known email systems like Exchange which offer enhanced security and scanning, while using modern email transition methods.

The businesses at risk are those using older systems like POP, or systems that don't encrypt passwords (what are known as 'clear passwords'). If your system doesn't encrypt information like this, anyone with the right tools and a bit of knowledge can capture login information and potentially compromise your systems and data.

If you are using older email systems, it is advisable to upgrade to newer ones, especially if they don't encrypt important information.

3. Mobile devices that aren't secure enough

Mobile devices, like tablets and smartphones, are being used more than ever before in business, and do offer a great way to stay connected and productive while out of the office. The issue with this however is that if you use your tablet or phone to connect to office systems, and don't have security measures in place, you could find networks compromised.

For example, if you have linked your work email to your tablet, but don't have a screen lock enabled and you lose your device anyone who picks it up will have access to your email and potentially sensitive information.

The same goes if you accidentally install a fake app with malware on it. You could find your systems infected. Therefore, you should take steps to ensure that your device is locked with at least a passcode, and you have anti-virus and malware scanners installed and running on a regular basis.

4. Anti-virus scanners that aren't maintained

These days, it is essential that you have anti-virus, malware, and spyware scanners installed on all machines and devices in your company and that you take the time to configure these properly. It could be that scans are scheduled during business hours, or they just aren't updated. If you install these solutions onto your systems, and they start to scan during work time, most employees will just turn the scanner off thus leaving systems wide-open.

The same goes for not properly ensuring that these systems are updated. Updates are important for scanners, because they implement new virus databases that contain newly discovered malware and viruses, and fixes for them.

Therefore, scanners need to be properly installed and maintained if they are going to even stand a chance of keeping systems secure.

5. Lack of firewalls

A firewall is a networking security tool that can be configured to block certain types of network access and data from leaving the network or being accessed from outside of the network. A properly configured firewall is necessary for network security, and while many modems include this, it's often not robust enough for business use.

What you need instead is a firewall that covers the whole network at the point where data enters and exits (usually before the routers). These are business-centric tools that should be installed by an IT partner like us, in order for them to be most effective.

How do I ensure proper business security?

The absolute best way a business can ensure that their systems and networks are secure is to work with an IT partner like us. Our managed services can help ensure that you have proper security measures in place and the systems are set up and managed properly. Tech peace of mind means the focus can be on creating a successful company instead. Contact us today to learn more.
Published with permission from TechAdvisory.org. Source.

Topic Security