Category Archives: Business Continuity

Phishing 101

Phishing 101 While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year. What exactly is phishing? Hackers mimic the emails, forms, and websites of legitimate companies in an effort to lure people into providing their private, personal information, like credit cards numbers, social security information, account logins, and personal identifiers. The victim typically doesn’t realize they’ve been compromised until long after the event, and oftentimes only after their identify or finances are affected. In the past, an attack was carried out relatively quickly.Read Full Article


VoIP Phone Solutions

Today’s blog is about office phone systems. You have one. They are dull, necessary, and no one wants to deal with them. They need to be re-configured for new employees, they’re confusing, and the telephone lines probably cost you more money than you’d like. The solution is VoIP (Voice over Internet Protocol). Like everything else, office phone systems began transitioning to fully online/digital well over a decade ago.  In a practical sense, VoIP means that your phone lines are no longer coming in over traditional, “plain old telephone” lines, or other standard protocols from the 1960s to the 2000s. Instead, voice signals are now being carried to your phone from via the internet, such as your broadband connection. You cut the higher landline charges, especiallyRead Full Article


VoIP: A New Dimension in Communication

Voice over Internet Protocol or VoIP is about a decade old technology that is gaining popularity among individual subscribers and businesses. In conventional systems, phone calls are made using telephones or handsets that are connected by phone cables. These calls are routed using the Public Switched Telephone Network (PSTN) carrying a signal from one telephone to the other. But instead of connecting telephones to the phone cables through phone jacks in the walls, VoIP uses the internet where phones can be connected to broadband devices, adapters or PCs using broadband. With this system, voice is converted into a digital signal and carried over the Internet. Let’s take a look at all the options that are available to make calls using VoIP. Make Calls from aRead Full Article


IT Disaster Recovery: Human Error

Human error accounts for the highest percentage of  IT disruptions and emergencies requiring disaster recovery. That’s right, “Hurricane Human,” should be your top concern when considering the proper disaster recovery plan for your business. Did you know that your employees often unwittingly ‘help’ cybercriminals gain access to your system? Often, employees play a part in compromising the security of your IT infrastructure, even without them realizing it. For example- When your employees use their own devices for work purposes such as to access emails, to connect to work servers, or to work on office files. In the event their device gets infected by a malware or hacked, the virus or the hacker gets access to your data as well. Your employees may put your networkRead Full Article


Breaking News: Downtime Kills Small Businesses

Downtime is bad news for any business whether big or small. A recent two-hour New York Times’ downtime occurrence sent Twitter ablaze and their stock price plummeting. Google going down for one to five hours resulted in lost revenue up to $500,000 and decreased overall web traffic by 40%. While the hourly cost of downtime for a small-to-medium sized business won’t be nearly as large as that astronomical Google figure, downtime is often more detrimental to smaller companies. Smaller enterprises are more susceptible to downtime and are neither large nor profitable enough to sustain its short and long-term effects. Downtime Leads to Unhappy/Unproductive Employees   Even the happiest of employees become dissatisfied when they can’t perform basic day-to-day job functions or properly service customers or clients. While someRead Full Article


Business Continuity: What Every Business Owner Should Know

Technology is full of difficult jargon. To further complicate things, certain terms are often used in a different context between one publication or service provider and the next. An example of this is the usage of backup, disaster recovery, and business continuity. These terms are commonly used interchangeably, often resulting in confusion. In an effort to alleviate some of this confusion, let’s describe each physical process. You will see an overlay among all three, although they are each different processes. Backup – In IT lingo, the most basic description of backup is the process by which your data, as in files or programs, is copied from its original location to another. The purpose of this is to ensure that the original files or programs are retrievableRead Full Article


Business Continuity for SMBs

 8 Cold Hard Truths for SMBs Not Worried About Disaster Recovery and Business Continuity   The foundation of any successful business continuity solution is the ability to retrieve data from any point in time from anywhere. When the topic of data recovery and business continuity comes up, many decision makers at smaller businesses and organizations think that they cannot afford to put enterprise-level protections into place.   Further, so many people think bad things only happen to other people. Just because we hear about a fatal car accident on the morning news, doesn’t mean we fixate on that news when we ourselves get into a car and drive to work. So no matter how many times the owner or executive of a small to midsize businessRead Full Article