Free up your precious space, storage, phone closet or server utility room. If you have old equipment collecting dust and taking up room, contact us to schedule a free e-waste pickup. Example items accepted are computers, laptops, monitors, fax machines, printers, scanners, battery backup, cables, etc. If you need help determining what network equipment is or is not in use, call us. 714-660-1811
Had coffee with a colleague today, had some great conversations about the IT industry and even shared some war stories. Here's an example of how doing something yourself can turn into a major data loss. Even though we think something is simple, you should hire an IT Pro to complete the task. In this painful example the client's server kept powering off. The IT consultant quickly reminded the business owner they really need a battery backup unit for their server. The client took it upon themselves and bought a UPS or better know as Battery Backup. They plugged it in, connected the server and 'thought' they were protected. Fast forward 2 months and the power went out again. The IT pro was called to the scene to find the server off, even though the battery backup was plugged in. He tested the UPS unit, and as soon as it was unplugged it shut off again, no battery backup. Depending on the UPS manufacture the battery is usually installed backwards (disconnected!) for shipping. When they first setup the unit not only did they fail to read the instructions, they also never tested to see if the battery back up worked. Unfortunately this was a hard lesson for this small business, as they were not on any type of managed backup either. The newest working backup was 2 months old, they lost 2 months of company work and files! 2 full months, could you imagine? Can you afford to loose 2 months of data? Please contact your IT provider even if it seems like a simple task. We will even spec out the correct sized backup unit for your equipment.
There are not many ways to break into a bank; however, gaining access to personal bank accounts is becoming a very common way for criminals to get in. One way this is achieved is by clicking on a link within an email. Spam is very cost effective for cyber criminals, as emailing is a near free service to send tens of thousands of messages in very little time. And the fake emails are often disguised to look like a message sent from the bank. Email is an open door into your network; data passes through it every day. If you are like most small businesses, each email address receives a ton of messages. If criminals want to break in, some will be
Considering VoIP? There are many factors.
The two attacks are the largest known security breaches of one company’s computer network.
We recommend changing your passwords, if you are using Yahoo biz mail for your organization please contact our office for a more business centric email service.
The newly disclosed 2013 attack involved sensitive user information, including names, telephone numbers, dates of birth, encrypted passwords and unencrypted security questions that could be used to reset a password. Yahoo said it is forcing all of the affected users to change their passwords and it is invalidating unencrypted security questions — steps that it declined to take in September.further details found here: http://www.nytimes.com/2016/12/14/technology/yahoo-hack.html
Do you reuse passwords? If so, it's just a matter of time before the bad guys break into your network, your laptop, your bank account, and your business. Since computers were invented, we have had to balance use-ability with security. And business owners have always hated passwords. I can't tell you how many times I've been told that I should make a password easy to remember.
Diversification is the key to success for many things in life. In addition to having a diversified investment plan, diversification should also play a central role when it comes to devising a backup plan for the data on your computer systems. The digital world we live in today makes many consumers and companies targets if they are not careful with their information. According to a Verizon 2015 Data Breach Investigations Report, there were 642 security mishaps in the financial services industry in 2014. Among the 642 cases, 242 were confirmed data losses. This report doesn’t
- Keep the Vents Clear
- Keep the Screen Brightness Down
A fellow member of The ASCII Group shared a week long horror story of recovering an 80 workstation, 4 server environment for a large general contractor client. If you don't read the entire story remember this, all it takes is 1 click to encrypt (lock) the entire network. This was a form of Ransomware that was stealthy enough to bypass all of the layers and lock/shut everything down within 5 minutes. The virus bypassed 2 firewalls, anti-virus, and spam filtering. The main thing the client did not fully cooperate with was Security Awareness training. This a service that sends "fake" spam messages, and alerts the employee that they have clicked on the