Some essential tips to help you get work done remotely in these uncertain times:
Many businesses ended up in the news over security and data breaches in 2017. Often tens if not hundreds of millions of people are affected. Smaller breaches don’t even get reported. We are constantly on the lookout for such risks with our clients. Even then it can be difficult to stay ahead of this cat & mouse game.
Reduce Risk & Exposure
Our Cybersecurity Assessment will cover the following areas of your network:
- Scan network for potential vulnerabilities
- Examine firewall for security and optimal performance
- Verify wireless network security
- Validate wireless network coverage
- Audit servers for errors and vulnerabilities
- Review servers for optimal performance / configuration
- Check state of security patches on computers
- Evaluate overall environment for omissions/missing configurations
It’s impossible to make guarantees. Going through the above checklist will heighten the overall health and security of the network, however. We will prioritize any issues we find into High, Medium and Low Risk categories. We will work with you to find the best solutions to these issues and increase the security of your network.
The events of the past few days in Texas have brought back many memories of the devastation we faced here in Columbia less than two years ago. The need is great and the resources available much fewer. For this reason we are committing to operating off of our savings for the month of September and donating 100% of our revenues to relief efforts going on in Texas. We are not a large corporation with deep pockets so this is a huge deal for us. Regardless, we feel compelled to do this so that we can help our brothers and sisters who are in need.
So, how can we help your business this month above and beyond what we normally do? If everything is great for you, perhaps you could refer us to someone who might need help?
Starting with a new client is exciting for a multitude of reasons. Some of those reasons are obvious, some are a little less so. One of the things we look forward to most is finding things that need fixing(and then fixing them) so that we can do what we do best: Ensure that the client is leveraging technology in a manner that makes them more efficient and improves their processes instead of hindering their progress.
Hacking is a form of black art. The malicious types of hackers are even referred to as “black hat” vs the “white hat” hackers who look for vulnerabilities for altruistic reasons instead of malicious. Put differently, “black hat” vs “white hat” is a sort of throwback to the old western movies where the bad guys always wore black hats and the good guys wore white/light colored ones.
As another relatively quiet hurricane season comes to a close, some are breathing a sigh of relief. Maybe not so much here in South Carolina where we have had devastating losses because of Hurricane Matthew. Two major disasters in as many years is a lot to go up against. Add in the wildfires in the Upstate region and our little state has taken quite the beating recently. Unfortunately this does not mean that we’re due for a break. In fact, it’s a great time to ensure that we’re ready for the next disaster that will hit us, whatever and whenever that may be.
In January of 2013 I was on site at a client troubleshooting a problem regarding the printing of invoices from the company’s business software. I discovered at this time that electronic invoicing, an existing feature contained in their software suite, had not been configured for them and therefore they printed and mailed each invoice on a daily basis. I was taken aback – something so simple and easy to configure with huge residual benefits was not set up by their vendor. We quickly configured the settings and the employees took the extra few seconds to collect email addresses from their clients, which they had not done before. This client has realized significant savings since we helped them implement this simple but effective change.
As an example let’s assume the following:
It seems that we’re never quite caught up. Always running behind, late for a meeting, dinner or the next thing on our schedule. At work we have multiple “got a minute” meetings every day that turn into 20-30 minute conversations, or more. In-between, we redirect our attention every time an email comes in or a message notification pops up on the smart phone. Meanwhile, the computer on the desk never seems to be fast enough. There is just never enough time to get through everything we need to get done.
So, you’ve started a business. You’ve purchased your domain, had a web designer create a website that profiles your business, products and services. Great! Now it’s time to start serving your customers, earning money and living the dream.
There is one small problem, however. The dreaded GMAIL, Yahoo or other generic email address. It’s a problem for a number of reasons.
It’s unprofessional. After having gone through the hard work of buying a domain and building a website, the additional effort required to create a couple of email boxes on that domain is insignificant. It makes it seem like the branding of the business is only partially complete. It’s also a nearly instant giveaway that the business has only one employee or perhaps that it is a disorganized mess if there are multiple users for that one email address. Is this the kind of service a client can expect from your business?
It lacks forward thinking. Sure, a single email address is sufficient for a one person operation. But what if the business begins to grow and now all of a sudden there are 3 employees. Do they just use their own personal email addresses?
It’s un-secure. Hacking and cybercrime in general is becoming an increasingly prominent issue in society, one that’s unlikely to diminish any time soon. Anyone can create a copycat generic email address with a simple typo in it and start impersonating you. Don’t believe me? Do a search on “typosquatting”. This is outside the fact that the cybercriminal could be a disgruntled employee. No, an email address on a company owned domain does not automatically prevent this type of behavior but the right system will have Data Loss Prevention(DLP) measures in place to mitigate the problem. Recent advancements in technology make this affordable for even the smallest of businesses.
Whether you’re a small business owner or a web developer, please take the extra few minutes to set up proper email addresses for your business or clients. Not only will it give your business a more credible and professional appearance, it will be easier to manage when additional employees come on board and also help save face with your clients should something go wrong.