Advice from a failed disaster recovery audit

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways. Hosting certain types of data, or managing a government network, legally binds you to maintain DRPs. After an audit of the Michigan Department of Technology and Budget, several failures lead to a trove of helpful tips for small- and medium-sized businesses attempting to create a bulletproof disaster recovery plan. Update and test your plan frequently One of the first and most obvious failures of the department’s DRP was that it didn’t include plans to restore an essential piece of their infrastructure. The plan didn’t include steps to restore the department’s intranet, which would leave employees unable to complete even the most basic of tasks. The reason for the oversight? The last time the plan was updated was in 2011 — leaving out more than six years of IT advancements. If annual revisions sounds like too much work, just consider all of the IT upgrades and improvements you’ve made in this year alone. If they’re not accounted for in your plan, you’re destined to fail. Keep your DRP in an easy-to-find location It may seem a bit ironic that the best way to store your top-of-the-line business continuity solution is in a binder, but the Michigan Department of Technology and Budget learned the hard way that the alternatives don’t work. Auditors found the DRP stored on the same network it was meant to restore. Which means if something had happened to the network, the plan would be totally inaccessible. Your company would do well to store electronic copies on more than one network in addition to physical copies around the office and off-site. Always prepare for a doomsday scenario The government office made suitable plans for restoring the local area network, but beyond that, there was no way for employees to get back to work within the 24-hour recovery time objective. Your organization needs to be prepared for the possibility that there may not be a local area network to go back to. Cloud backups and software are the best way to keep everything up and running when your office is flooded or crushed beneath a pile of rubble. DRPs are more than just an annoying legal requirement, they’re the insurance plan that will keep you in business when disaster strikes. Our professionals know the importance of combining both academic and real-world resources to make your plan airtight when either auditors or blizzards strike. Message us today about bringing that expertise to your business. Published with permission from TechAdvisory.org. Source.

Vulnerabilities on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running a WordPress website. WordPress attacks by the numbers In 4 separate attacks, an estimated 40,000 websites were compromised, defacing 67,000 web pages, which has quickly gone up to 1.5 million. A security release update, WordPress 4.7.2, was immediately launched to mitigate the flaw, but not everyone was able to deploy it on time, thus inflating the number of corrupted web pages. Although WordPress took measures to ensure that the vulnerability would go unnoticed, hackers found a way to get around the initial fixes and exploited the sites that remained unpatched. Those who haven’t applied WordPress’s latest security release were the ones most harmed by the defacement campaigns, and it soon became highly publicized. Steps taken Fixes have been deployed and stronger patches are in the works, but hackers do not just sit around and wait to be taken down. In fact, more attacks are being launched concurrently with security developers’ attempts to strengthen blocking rules. In preparation for further exploits, WordPress liaised with cybersecurity firms to implement protective measures. Google did their part by announcing via Google Search Console the critical security updates that webmasters must install to protect against the WordPress-specific attacks. Meanwhile, web application vendors and web hosting companies are poised to protect their customers from attacks by installing web filters on their customers’ web servers. Despite these measures, the attacks are expected to continue and the masterminds behind them will come up with strategies more insidious than merely modifying several web pages. Updating security patches that can effectively alleviate the vulnerabilities’ impact will also take time to develop and launch. The importance of patches Some attacks may cause a blip on your business’s networks, while others might cause its demise. From all these attacks, one lesson is worth emphasizing: Applying the most up-to-date patches is critical to your systems’ security and business’s survival. Unpatched systems are the easiest targets for hackers who are always on the lookout for vulnerabilities to exploit. If your organization lacks the capacity to manually update security patches, consider deploying patch management software. Keeping all your software updated with the latest patches may seem like an insurmountable task, but the price of neglecting it can cost you dearly. WordPress remains the most widely used CMS and its popularity is not going to wane anytime soon. If your website runs on WordPress and you’re considering security options that will ensure your company is poised to handle breaches, contact us for advice. Published with permission from TechAdvisory.org. Source.

The right social media platforms for SMBs

Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the desired effect, especially when so many platforms are available. Facebook might be the biggest name in the industry, but that doesn’t mean it will suit your organization. Instead, business owners should familiarize themselves with all the available options. Facebook According to the 2017 Wasp Barcode State of Small Business Report, Facebook is the most utilized social media of all the options. Out of the survey’s 1,100+ respondents, 68 percent used Facebook as an integral part of their marketing strategy, with LinkedIn coming in second at 39 percent. One of the contributing factors to Facebook’s popularity is the fact that it’s currently approaching a total of 2 billion personal users, making it the first place companies go to when they want to increase their brand awareness. Other marketing-specific reasons businesses choose Facebook are social media referral traffic, terrific conversion rates for e-commerce traffic, and a huge impact on user purchasing decisions. YouTube YouTube is considered an undervalued social media resource for two main reasons. Firstly, although it’s the second-largest search engine on the internet, it still looms in the giant shadow of its rival Google Search. But when properly utilized, YouTube allows you to create channels for your products or services to be discovered by users, with little more than search optimizations. Secondly, Google actually owns YouTube, and videos are reportedly 50 times more likely to appear on the first page of search results than other organic content. Keep in mind that video production quality is more important than ever, so your content needs to be well-produced in order to make an impact. Google+ Engagement and content on sharing might pale in comparison to Facebook, but an active Google+ page measurably contributes to the Google search ranking of your website — just another way you can ensure your site’s position on the first page of Google results should be done. Also, Google+ has hundreds of millions of users and some of the platform’s features — such as live Hangouts — can be utilized to share content across all Google channels, including YouTube. Snapchat and Instagram If your target audience is on the younger end of the scale, Snapchat is the way to go. The important thing to keep in mind when you want to connect with 18-24 year olds is to always be fun and creative. Your content doesn’t need to be overly-polished or corporate. Currently, there are over 100 million active users on Snapchat. As for Instagram, it boasts over 400 million monthly users as well as a more well-rounded user base in terms of age and geography. The content on Instagram should look more professional and more artistic, and there’s an added benefit of direct integration with Facebook every time you post a new picture or video. Yelp Review sites might not be the purest form of social media, but Yelp is another great way to connect with users and respond to (hopefully positive) feedback. If you’re concerned about the controversy and negativity that have arisen from Yelp reviews, the Yelp team is known for helping businesses improve their online status and rise above the harsh comments. If you still have questions about social media platforms and how to utilize them to your advantage, feel free to contact us today! Published with permission from TechAdvisory.org. Source.

Are your printers safe?

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, the discovery that cyber thievery can, in fact, be performed through some popular printer brands hardly comes as a surprise. One study reveals that at least 20 printer models are vulnerable to Distributed Denial-of-Service and other types of attacks. Let’s take a look at this chilling development in cybersecurity. Which printers are prone? Based on the study made by Ruhr University Bochum researchers, printer brands such as Hewlett Packard (HP), Brother, Dell, Samsung, and several others are prone to different types of cyber attacks. Online printers from these brands could serve as cyber criminals’ path in which to steal credentials, corrupt a printer, or leak sensitive data from printed documents obtained through a printer’s memory. Printers serve the basic purpose of turning computer documents into paper and have never been a typical entry-point of hackers’ attacks. Government and corporate offices, business establishments, non-profit organizations, and homes own one, and when you think about the fact that most printers are linked to computer owners’ internal networks, this expansion of cyber theft to printers begin to make even more sense. How can attacks be made? Researchers identified security vulnerabilities that would enable hackers to corrupt common printer languages such as PostScript and PJL, which they could then use to launch Distributed Denial-of-Service attacks or reset the corrupted printer to its factory defaults, also termed as ‘protection bypass.’ Other ways in which hackers could exploit their access are through print job manipulations, which could lead to minor cases of printing corruptions or persistent printing distortions, and information disclosure, the leaking of sensitive information. What safety measures are being developed? The researchers who discovered the vulnerabilities developed the PRinter Exploitation Toolkit (PRET), a program designed to determine if a printing device is a likely target. This toolkit ‘connects to a device via network or USB and exploits the features of a given printer language, and is complemented by a wiki page that documents attacks made. It’s worth noting that more printer models and brands haven’t been tested due to the team’s lack of resources. But with this open-source toolkit, vulnerabilities of many brands and models may soon be identified. Stealing information online is far from being a novelty in cyber security. But to do so through printers requires a special set of skills. It’s too soon to tell whether this form of cyber thievery is going to pose serious threats in the future, but regardless of how further studies progress, failing to implement security protocols for your network can cost you dearly. Get ready for any security threat by contacting our security experts now. Published with permission from TechAdvisory.org. Source.

Why you should be an Office Insider

To deliver unparalleled service, Microsoft tests products and features months before they’re released to the public. One of the ways they do this is with the Office Insider program, a voluntary Office 365 subscription that gives participants a sneak peek into future Microsoft developments. It also provides several benefits to business owners willing to take a risk. Early access Similar to the Windows 10 Insider program, the Office Insider program grants users early access to new features, security updates, and bug fixes months before they are available for the general public. Office Insider is available on two levels: the fast ring, where updates are rolled out more frequently but tend to have more issues, and the slow ring, where features are released slower but have little to no software bugs. The features you have to look forward to include: Calendar.help – When you sign up for the Office Insider Program you are immediately eligible to beta test Calendar.help, a machine learning feature that uses Cortana to schedule important calls, meetings, and events. When you need to set up an appointment over email, you can simply list your contact, add Cortana to the Cc: line, and state your meeting preferences. Outlook – In January 30, Microsoft has increased Outlook 2016’s collaboration options. Insider subscribers can upload locally saved email attachments to OneDrive and collaborate with other employees. Surface Pen – Surface device users in the Insider program can resize, rotate, and move objects in Word, Excel, and PowerPoint with the Surface Pen. Competitive advantage Because you’re getting early access to new applications, you’ll have more experience with the features compared to companies who wait for the general availability update. For example, you can test updates like PowerApps — a feature that allows businesses to create software without knowing how to code — and decide whether it’s right for your company months before other general users have worked with the product. In other words, when your business can access and take advantage of Office 365 Insider features early, you’re essentially setting your company ahead of the competition since ‘late’ adopters will need to spend time getting acquainted with the new patch. Feedback The final benefit of the Office Insider program is that you get to voice your opinion on the upcoming features, raise awareness to certain software issues, and provide ideas on how Microsoft can make things better. Overall, enrolling in the Office Insider program can open up your company to a wide variety of productivity-boosting features. The only question you have to ask yourself now is: Do I want to be at the bleeding edge of tech innovations? Contact us today to find out how you can get on the inside and know the latest in Office updates. Published with permission from TechAdvisory.org. Source.

What exactly is preventive cyber-security?

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cyber-security means, so let’s take a minute to go over it. Understand the threats you’re facing Before any small- or medium-sized business can work toward preventing cyber-attacks, everyone involved needs to know exactly what they’re fighting against. Whether you’re working with in-house IT staff or an outsourced provider, you should review what types of attack vectors are most common in your industry. Ideally, your team would do this a few times a year. Reevaluate what it is you’re protecting Now that you have a list of the biggest threats to your organization, you need to take stock of how each one threatens the various cogs of your network. Map out every device that connects to the internet, what services are currently protecting those devices, and what type of data they have access to (regulated, mission-critical, low-importance, etc.). Create a baseline of protection By reviewing current trends in the cyber-security field, alongside an audit of your current technology framework, you can begin to get a clearer picture of how you want to prioritize your preventative measure versus your reactive measures. Before you can start improving your cyber-security approach, you need to know where the baseline is. Create a handful of real-life scenarios and simulate them on your network. Network penetration testing from trustworthy IT professionals will help pinpoint strengths and weaknesses in your current framework. Finalize a plan All these pieces will complete the puzzle of what your new strategies need to be. With an experienced technology consultant onboard for the entire process, you can easily parse the results of your simulation into a multi-pronged approach to becoming more proactive: Security awareness seminars that coach everyone — from receptionists to CEOs — about password management and mobile device usage. “Front-line” defenses like intrusion prevention systems and hardware firewalls that scrutinize everything trying to sneak its way in through the front door or your network. Routine checkups for software updates, licenses, and patches to minimize the chance of leaving a backdoor to your network open. Web-filtering services that blacklist dangerous and inappropriate sites for anyone on your network. Antivirus software that specializes in the threats most common to your industry. As soon as you focus on preventing downtime events instead of reacting to them, your technology will begin to increase your productivity and efficiency to levels you’ve never dreamed of. Start enhancing your cyber-security by giving us a call for a demonstration. Published with permission from TechAdvisory.org. Source.

G Suite vs. Office 365

Google and Microsoft have both set impressive milestones in the tech industry. These industry giants continually roll out innovative solutions that simplify the lives of users around the world, especially with G Suite and Office 365. This raises a question: Which is a better option for your business? Cost and commitment G Suite offers two pricing plans: $5 and $10 per user per month. The $5 plan offers company email addresses, video and voice calls, integrated online calendars, online documents, presentations and spreadsheets and more. The $10 plan offers all the features of the $5 plan plus unlimited storage or 1TB per user for less than 5 members, advanced admin control panel for Google Drive, and audit and reporting insights for Drive content and sharing, to name a few. Office 365 offers a number of pricing plans, including: Office 365 Business Essentials ($5.00 per user per month) Office 365 Business ($8.25 per user per month) Office 365 Business Premium ($12.50 per user per month) Office 365 ProPlus ($12.00 per user per month) Office 365 Enterprise E1 ($8.00 per user per month) Office 365 Enterprise E3 ($20.00 per user per month) Office 365 Enterprise E5 ($35.00 per user per month) We’ll compare two plans from Office 365 with the same pricing as G Suite below; you can find more details about Office 365’s other plans here. Office 365 Business Essentials will cost $5 per user per month with annual subscription. Monthly subscription will cost $6 per user per month, meaning you’ll save $1 user per month with G Suite. Office 365 Enterprise E1 will cost $2 less than G Suite’s $10 plan Applications Google Apps are designed for cloud-based collaboration. For instance, Google Docs lets you make permanent changes in the file or provide feedback using “suggestion” mode. Other advanced features in G Suite include machine intelligence in Google Calendar (which helps you find a time when invitees are free), Dynamic layout suggestions in Google Slides, and better file management and granular content ownership. Microsoft apps, on the other hand, are designed based on desktop versions of their products with enhanced cloud capability — you’ll be able to use cloud versions of Word, PowerPoint, Excel, Outlook and more while still being able to work offline. More advanced integration with Microsoft’s cloud solutions like SharePoint, Dynamic CRM, and Azure are also available. Security G Suite leverages machine learning capabilities to detect suspicious logins and block most advanced types of spam. It automatically scans every email attachment before you download it to prevent the spread of viruses. Office 365 utilizes Exchange Online Advanced Threat Protection (ATP), a new email filtering service that targets specific advanced threats like unknown malware and viruses in real time to protect against malicious URLs. Email While both Office 365 and G Suite offer a clean interface, the difference lies in the way emails are organized. Gmail lets you apply multiple labels to an email and offers 30GB of storage space across Gmail and Drive. Office 365 uses classical folder structure to categorize emails and offers a 50-GB inbox in addition to 1-TB storage space. Unlimited storage is also available in its Enterprise E3 $20 per user per month plan. Third-party integration G Suite’s integration with CRM, productivity and customer service software gives you plenty of options. Unfortunately, the same can’t be said about Office 365, as Microsoft hasn’t been adopting a developer integration approach when compared with Google. Support Both G Suite and Office 365 offer 24/7 phone and email support. However, G Suite also offers live chat support and forums to seek clarification, give feedback and request additional functionality. To sum up, G Suite is a better solution if you need native integration with third-party apps and support for various operating systems and devices. Despite that, Office 365 makes sense if you prefer a number of options when it comes to your pricing plans or need integration with other Microsoft cloud solutions. No matter the solution, maximizing productivity is imperative to stay ahead of competitors. If you need help finding the right solutions to enhance efficiency, just give us a call; we’re happy to help. Published with permission from TechAdvisory.org. Source.

Browser showdown: which one is right for you?

Back when Internet Explorer was competing against Netscape, users had far fewer things to consider. Nowadays, some users do nearly all their work inside of a web browser, and they have far more options about which program to use. If you’ve ever questioned whether there might be a better way to browse the web, we’ve got your answers right here. Google Chrome By just about any metric, Google Chrome has been the browser of choice for most internet users over the last couple years. It’s easy to use and its graphics interface has a low profile. However, if you want to customize Chrome with extensions and apps, there are more than enough options. The bottom line is: this is the best browser for users who spend a lot of time in G-Suite documents, or want the security benefits of frequent patches and updates. Apple Safari We might as well start off with the one, glaring drawback of Safari: It’s available only to Apple users. However, if you are working on a macOS or iOS device, Safari has a lot going for it. Ad blocking is built right into the browser, as well as RSS support for aggregating lots of information in one place. And because tabs can be automatically synced across all your Apple devices, we highly recommend Safari for anyone in a Mac environment. Microsoft Edge Note that Edge is a different browser than Internet Explorer. The latter still exists, but we’ve decided to skip it for various reasons. Although Edge works only on Windows 10 systems, it has two things going for it. First, Microsoft has announced a feature that will incorporate virtualization into Edge to quarantine downloads for testing before they’re opened on your computer. Second, the Windows 10 browser comes with some fantastic Office 365 integrations. We highly recommend Edge for users working in a business enterprise environment. Opera We’ve saved the most controversial for last. The Opera browser isn’t one of the most popular browsers available, but it does deserve consideration. Although it requires more customization and under-the-hood-work than its competitors, its privacy settings are unmatched. With a built-in virtual private network feature and some of the most robust ad blocking on the market, Opera is a great way to take a break from cookies and targeted advertisements. Choosing a web browser may seem like such an inconsequential thing, but just think about the rate of cloud adoption. If you plan on utilizing more software-as-a-service solutions in the coming years, one tiny feature in a browser could make all the difference. Contact us today about planning your cloud deployment over the coming years. Published with permission from TechAdvisory.org. Source.

How IoT will influence businesses

In the near future, the Internet of Things (IoT) is expected to usher in an era of connectivity and efficiency on a global scale. Many small- and medium-sized companies, however, assume IoT has no application to their business. To dispel those false assumptions, we’ve compiled a list of four ways your business can benefit from using IoT devices. Improved logistics With IoT sensors, supply chain management and order fulfillment processes improve markedly to meet customer demand. For example, sensors on delivery containers and trucks in transit give managers real-time status updates, allowing them to track their items and ensure they reach the right location at the right time. Streamlined inventory IoT also presents automation opportunities for businesses that need to manage and replenish their stock. When data recorded from IoT devices are tied to your enterprise resource planning (ERP) system, you can accurately monitor your inventory, analyze purchase and consumption rates of a particular product, and automatically reorder items when IoT sensors detect that supply is running low. This minimizes out-of-stock incidents and prevents excess stock build-up. Fast payment Given how most payments are done electronically via point-of-sale systems or the internet, IoT has the potential to revolutionize the way businesses process transactions. We’re already seeing a few examples of this today as ApplePay not only allows users to purchase goods and services using smartphone applications, but through wearable technology as well. Soon enough, IoT devices might even allow restaurants and retailers to register or charge their customers the moment they walk through the door. Market insight Businesses that can somehow make sense of IoT-collected data will gain a competitive edge. Marketers, for example, can gather valuable insight into how their products are used and which demographic is utilizing them the most. This information can then inform future marketing efforts and give businesses more direction on how to improve their products and services for their customers. Although businesses will certainly face many challenges in implementing the Internet of Things, those who manage to overcome them will reap all the benefits of this burgeoning technology. Want to know if an IoT deployment is right for your business? Contact our certified IT consultants today. Published with permission from TechAdvisory.org. Source.

IG Stories: redefining online marketing

Since it’s inception in 2010, Instagram has come a long way from just double-tapping. The photo-sharing application recently announced its plan to experiment with video ads via Instagram Stories. Give your small- or medium-sized business a competitive edge by understanding and utilizing Instagram Stories. Jim Squares, director of product marketing, said in an interview with Fortune that “a two or three-week test period” will be carried out before releasing it to all its active advertisers. Let’s face it, the similarities between Instagram Stories and Snapchat ads are undeniable. But with Snapchat ads, they work mainly with larger brands and keep ads as unobtrusive as possible. If you want to collaborate with big boys like Netflix or Coca-Cola, you’re looking at a budget bigger than what you might have. By contrast, Instagram ads are self-serving and employ auction-based pricing. When it comes to setting up and paying for video ads inside Stories, it’s a pretty straightforward process, much like Facebook advertising. Not only do you have the ability to target your audience, but the benefits of working with demographic and Internet-based targeting capabilities definitely give Instagram a competitive advantage. On top of this, users can expect more goodies when the format officially takes off. For the time being, Stories seems to be a simple yet efficient way to test out advertising placement. Instagram also announced that analytics from Stories will also be included in the Business Tools dashboard, sharing basic insights including reach and impressions — with a good chance of more analytics to be seen in the future. It’s estimated that up to 71 percent of US businesses will begin to market on Instagram in 2017, and these efforts will not go unnoticed since 75 percent of users initiate some sort of action after seeing a post. It took Instagram quite a while before it rolled out any type of advertising or introduced any kind of business feature. When it finally did, however, they didn’t beat around the bush in monetizing the platform. Yet, several months after Stories’ initial launch, Instagram is already making plans to leverage its power. That’s because Stories represents a stellar opportunity at getting back at its biggest rival — Snapchat — while simultaneously providing an immersive advertising experience. Because Stories take up the entire mobile screen, so will the ads. Sponsored Stories isn’t exclusive to just images; videos are an optional format for both advertisers and consumers alike. Meaning that full-screen multimedia truly makes it both an interactive and engaging experience. There won’t be a difference in engagement between organic and Sponsored stories; both enable viewers to like, comment and share. It might not be the traditional once-upon-a-time kind of story, but Instagram’s latest feature is poised to bring happy endings to many — if utilized properly, of course. If you are still uncertain or would like to ask further questions, feel free to give us a call. Allow us to partner with your business, so you can #succeed that much quicker. Published with permission from TechAdvisory.org. Source.