Failure is Not an Option: Getting Rid of Single Points of Failure

You might think that your business is going to be OK even if a single device goes down. After all, there are other devices your employees can use. It’s not as if the entire system is going to fall like dominoes. Or is it? Get rid of single points of failure to make sure one vulnerability doesn’t take down your network.

A single point of failure (SPOF) can be a design, implementation, or configuration weakness. Without proper design considerations, unintentional SPOFs may be introduced into computing environments.

Yet, cybercriminals don’t need super powers to target IT fatal weaknesses. SPOFs for technology include:

Having only one server that runs an essential application. Without that server, your employees can’t use that particular business tool.

Solution: Plan for the worst with built-in server redundancy. Have multiples of any hardware that is business critical. Consider a standby backup server or migrate to the cloud so …

Are You Due? What to Do When You Get a Renewal Notice

Your business relies on any number of service providers. You’re likely contracting for domain names, website hosting, data backup, software licenses, to name just a few. And that’s only your online presence! So, when a renewal notice comes in, you might just forward it on or file it away for future reference. Here’s what you should be doing instead.

First, when you get a renewal notice, confirm that it’s legitimate. This is especially true of domain names. Your business’s domain name and expiration date are publicly available. Anyone could look them up and send you an invoice. Scammers do. They monitor expiring domain names and then send out emails or physical post cards telling you it’s time to renew. They are not doing this as a civic service!

Instead, they will be trying to get you to switch your domain services to a competitor or, worse, hoping you’ll pay your renewal …

6 Target Areas to Reduce IT Costs

Your business is always looking to reduce costs. Looking at the information technology budget line items is headache inducing. So much money spent in one area, and there’s so little you can do about it! But is that really true? IT expenses may not be as fixed as you think. Take a look at these target areas where you might reduce costs.

#1 Software

Your business likely pays to license software such as Microsoft Office 365 or Adobe Photoshop. Reviewing these software agreements, you can often find cost savings:

You may be able to renegotiate a subscription if the provider wants to move you onto to a new offering.
You may find that you are paying for software that your employees are no longer using. Maybe you can reduce or remove it.
Perhaps the pricing has changed, and there are now better plan options available.
There may be an open-source …

How to Destroy Data Properly

When we accidentally delete something, it feels like the end of the world. If a client file or new presentation is deleted, you may have to start again. Oh no! Yet deleting files is not as permanent as you may think. When it comes to destroying data properly, you’ll want to take a more thorough approach.

Deleting items, or “trashing” them, doesn’t permanently remove them from computer memory. While the data is still stored on your device’s hard disk, it’s possible someone could restore that deleted data.

Data does reach a point at which it’s no longer useful, and you are no longer required to maintain it. Nevertheless, it may still be valuable to cybercriminals. Bad actors can use names, addresses, credit card numbers, banking accounts, or health data. You need a policy to destroy paper records, magnetic media, hard drives, and any storage media.

Your obligation to protect customer and staff …

Locking Up Cybersecurity with a Managed Services Provider

Cybercrime is not the most costly of illegal activities. That dubious distinction goes to government corruption, followed by drug trafficking. Cybercrime comes in third. Yet cybercrime does take the top spot when it comes to numbers of victims. A managed services provider can help.

Cybercrime has hundreds of millions of victims. Two-thirds of people online have experienced personal information theft or compromise. A 2018 McAfee Security study suggested that represents more than 2 billion individuals!

If any of those people works at your business, it could mean trouble for your security, too. Why? People tend to think they have too many passwords to remember. So, they use the same login information again and again. That means a criminal could leverage employee data to access business systems, too.

Cybercrime is a global problem for both individuals and businesses. The bad actors, after all, can make big bucks from their crime with low risk …

Handle with Care: Sending Data Securely

In our digital economy, we send and receive information quickly online. The Internet offers immediate communication with colleagues, clients, vendors, and other strategic partners. Yet we shouldn’t prioritize convenience over data security.

What data do you send in a day’s worth of emails? Sensitive data you send might include:

personally identifiable information (PII);
credit card or payment card information;
attorney/client privileged information;
IT security information;
protected health information;
human subject research;
loan or job application data;
proprietary business knowledge.

The problem is people sending without thinking about the security of the transmission. One way to gauge the need for security is to consider how you might send that same information via the postal service. Would you put that data on a postcard that anyone could read? Or would you send a sealed, certified mailing and require the recipient’s signature?

Transmitting data on the Internet in plain text is like the postcard – …

Island Hopping: Not Always a Good Thing

The phrase “island hopping” conjures up positive images. You might think of cruising beautiful sandy beaches on a tour of tropical islands. Too bad cybercriminals have given the term a new, less pleasant spin.

Island hopping is an increasingly popular method of attacking businesses. In this approach, the cybercriminal targets a business indirectly. The bad actors first go after the target’s smaller strategic partners. So, vendors or affiliates, who might not have the same level of cybersecurity, become stepping stones to hop.

Attackers might hack into smaller businesses handling the target’s HR, payroll, accounting, healthcare, or marketing. Then, they take advantage of the pre-existing relationship to access the final destination.

Humans are trusting. Cybercriminals exploit that. With island hopping, attackers leverage the trust established between strategic partners.

It’s quite simple: attackers gain access to Company A and send a counterfeit business communication to Company B. Company B, knowing the sender, is less likely …

Do Macs Get Viruses?

Many Apple owners believe their Macintosh computers are immune to viruses. Apple itself has run ad campaigns promising its computers “don’t get viruses”. And those who have owned a Mac for years, decades even, are particularly prone to believing. After all, nothing’s happened to them yet. Regrettably, Macs do get viruses, and the threat is growing.

For a long time the argument was that cybercriminals didn’t bother to develop Mac viruses. There weren’t enough users to justify the effort. Instead, they’d focus on the lower hanging fruit – PCs running Windows.

Yet Apple’s market share is on the rise, and it’s increasingly common to see Macs in the workplace, especially in creative industries. Plus, there’s a widespread assumption that Mac users are a smart target as they are likely to be better off. So, while Macs remain harder to infect (installing most software requires a password), there’s often a greater payoff.

The …

Are You Sick of Ongoing IT Issues?

Like a persistent cough or muscle strain that won’t go away, many IT issues prove ongoing. Every time they come back you think about getting an expert’s opinion. Then, the cough fades, you can walk freely again, or your computers are back up and running. You keep on going. Until the next time. If you’re sick of ongoing issues with your IT, look to a Managed Service Provider (MSP), like Safe Network Solutions, for help.

There are many IT ailments that can negatively impact your ability to do work. Let’s consider some of the particularly common ones, and why an MSP is the right prescription.

#1 Network and Internet issues.

Business is done online these days. Not being able to connect to the network and slow connections are frustrating. Without the Internet, how can you do your job? You can’t even check and send emails! Let alone access team documents or enter …

Avoiding Growing Pains: Tech Tips for a Thriving Business

Maybe you started your business in a basement or home office. It was just you at the beginning. Then, your service or product gained traction. The number of staff grew, and you moved into an office. It’s amazing how far you’ve come. Better still, your business continues to grow. It may be time to consider some of these tech tips to help your thriving business.

#1 Upgrade to Business-Grade Cloud Services

Perhaps you’ve been relying on free software from Gmail, Outlook, or Dropbox. Who can argue with free email, calendars, collaboration and file storage right? Well, it may be time to upgrade to the business versions of the software your team relies upon.

Move from Gmail to Google Apps, or Outlook to Office 365, or Dropbox to Dropbox Business or Sharepoint. For a small monthly fee, you gain business-grade features, additional retention capabilities, and auditing options.

The basic Google Apps offers business …