Monday, August 31, 2015

5 cloud security measures you need to take!

August 31, 2015
164_Security_BIf you’re considering transitioning your business to the cloud, have you considered the security of the platform? While providers would like us to believe that the friendly fluffy cloud image used to market the service means it is automatically secure, the truth is that the reality is far different. Just ask one of the nearly seven million Dropbox users who had their accounts hacked. This is not meant to scare you, but only to make you aware that cloud security needs to be taken seriously - especially if you’re a business owner. To help you take the correct precautionary measures as you transition to the cloud, we’ve put together a list of actions you can take to ensure cloud security.
The cloud is playing more and more of a significant role in business. Yet, as more companies jump on the bandwagon, very few of them seem to be taking cloud security seriously. According to a recent survey, the "Security of Cloud Computing Users Study" , only 50 percent of those surveyed had investigated the security of the cloud services they used.
To ensure you put in place proper security measures when beginning your cloud venture, here are five actions every small business owner should take.
Ask your IT provider what cloud security policies they have in place - this is probably the single most important security measure you can take. Find a trusted IT provider and have a candid conversation with them about their cloud security policies.
Ask where the location of the physical cloud servers are - when you have “the conversation”, don’t forget to ask about this. Believe it or not, some cloud servers may not even be stored in your own country. Wherever they are, it’s wise to make sure they’re located in a safe data center area with proper security afforded to them.
Create unique usernames and passwords - your login credentials represent one of the cloud’s main security vulnerabilities. Take the time to come up with a better password than “12345” or “football.”
Use industry standard encryption and authentication protocols - IPsec (Internet Protocol Security) is a reliable technology choice.
Encrypt data before it’s uploaded to the cloud - whether you do it yourself or your cloud computing provider does it for you, this is a must to ensure security.
When it comes to trusting the security of a cloud service provider, transparency is key. The provider should take security seriously, be able to explain their security policies clearly, and be willing to answer any questions. If they can’t do one of these, it’s a clear sign of a red flag.
Are you ready to talk cloud security and transition your business into the cloud? Call us today. We’re happy to answer all your questions.
Published with permission from TechAdvisory.org. Source.

Trent B. Nyffeler · tnyffeler@omegabiz.com
Technology Solutions Advisor | Omega Business Systems | www.omegabiz.com
Office (817) 492-4249 x125| Fax (817) 492-4250   












Monday, August 24, 2015

How to prepare your business for VoIP

August 19th, 2015
Businesses everywhere are embracing Voice over Internet Protocol (VoIP) technology to communicate more effectively with colleagues, clients, and suppliers. Do you have a VoIP phone system in place? When it comes to transitioning your business from traditional phone lines over to VoIP, preparation is vital to seamless and successful implementation. Here are the key components you need to examine in order to properly prepare your business for VoIP.

Network

Implementing a VoIP phone system presents challenges of its own. For one thing, VoIP service cannot tolerate any kind of network interruption. You need to ensure you have alternative physical links to carry all of your VoIP traffic in the event that you lose your primary path. An uninterrupted power supply (UPS) should also be installed. This way your Ethernet switches and VoIP devices won’t lose connection and go offline in case of power failure.

Security

As with other networks, VoIP is susceptible to cyber security threats and breaches. If you don’t have reliable and preventative security measures in place, you could fall victim to information theft and malicious attacks. Your best bet is to deploy a dedicated internal firewall to monitor the traffic flow and protect your systems from security threats.

Bandwidth

VoIP is dependent on the bandwidth of your Internet. Therefore, an accurate estimation of bandwidth consumption is crucial for proper planning in order to accommodate VoIP traffic. You need to perform tests to ensure you have enough bandwidth to handle the inbound and outbound call traffic. Relevant information includes the number of users, the number of handsets, the duration of calls, and data usage levels.

Budget

VoIP is no doubt a long-term money saver for your business, but switching over from a traditional phone system, or a fresh installation, involves a cost. You need to take into account the expenses of purchasing the equipment required for VoIP installation, such as VoIP phone cables, external power supplies, and routers. Installation costs may vary greatly, but it is worth the investment if you’re looking to take your communication systems to the next level.

Staff

Employee involvement and understanding is key to a seamless and successful VoIP integration. You can assign one, or a group, of your staff members the responsibility of learning about and managing your new VoIP systems. They can be the go-to person for any enquiries from other staff members. It is recommended that you ask a dedicated specialist to equip your staff with the information needed to utilize VoIP to its fullest potential. While most people are already familiar with video conferencing software such as Skype, it helps to create user guides and manuals to educate those that aren’t as tech-savvy.
VoIP implementation can often be a hassle if you undertake it alone. With the help of dedicated professionals, however, the whole process can become much easier, less expensive, and more rewarding.
Get in touch with us today and we’ll answer any questions you have on preparing your business to embrace this groundbreaking technology.
Published with permission from TechAdvisory.org. Source.

Wednesday, February 4, 2015

What to learn from Sony’s security breach

February Newsletter: What to learn from Sony’s security breach #Omegabiz #security http://bit.ly/16zkuHQ

January 14th, 2015
Security_Jan12_CThe scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multi-million dollar corporations. These three tips will take you back to security basics and help avert your own big-screen drama.

Don’t let basic security habits slip

Our modern-day instinct tells us that the answer to potential security breaches is to install new layers of antivirus software, firewalls and further encryption systems. While these are all worthy additions to your company’s armor of security shields, they will do little to help if good old-fashioned protective habits are allowed to slide.
Instill a disciplined, security-conscious mentality in your organization, and keep the messages simple so that staff remember and follow them. Focus on regularly changing passwords and keeping them secret, being vigilant about avoiding unexpected links in email messages, and limiting network access for the likes of external contractors to that which is absolutely necessary.
One of the ways hackers made their way into the Sony network was by tricking administrators into thinking they had a legitimate need for access: teach your staff to be careful, and praise cautiousness even if it turns out access is warranted. Encourage staff to flag up potential security lapses, and make sure they know that reports will be followed up and loopholes closed.

Take a flexible and agile approach to IT

IT changes, and so do the ways best suited to keeping it safe. This means it is vitally important to keep your IT systems up to date, and where necessary to do away with outdated practices that could leave your business technology exposed. This involves more than just ensuring that your network is running updated antivirus software to catch the latest bugs and worms - it means staying abreast of emerging methods to mitigate potential threats from hackers worldwide.
All of this uses staff and resources that your small business might not have - which is where outsourced managed services come in. Using a managed service provider as an add-on to your own IT team can give you extra flexibility and the ability to keep abreast of industry security developments, even when you lack the time to do so yourself.
Equally, know when it is time to ditch data - think of emerging social networks like Snapchat, which set messages to self-destruct after a set time, as your cue to make your data retention policy less permanent, particularly in relation to email. If you no longer have a business need or a regulatory requirement to retain information, then delete it - in the process you can limit the possible damage even if the worst should occur and you fall victim to an external attack.

Backup, backup, backup

The last thing you want in the event of a security breach is for it to hit your day-to-day operations - the potential damage caused by the hack itself is likely to give you enough to worry about. But that is exactly the situation Sony found itself in after its latest hack, with its email system down and staff forced to return to the days of pen, paper and even the fax machine.
As well as ensuring alternative means of communication remain open to your business in the aftermath of a possible attack, it is also vital to make sure that you retain access to the information most critical to your work. Regular, secured backups help ensure that, whatever happens, the show is able to go on and your firm’s productivity and revenue are not unduly hit. Engaging professionals to undertake your backups on a managed service basis also means this can happen routinely and without fail, while you stay focused on running your business.
Want to learn more about how to reduce your IT network’s vulnerability to attack? Get in touch with us today.
Published with permission from TechAdvisory.org. Source.

Monday, November 4, 2013

Backup and Disaster Recovery


Greetings from Omegabiz!
Well I thoroughly enjoyed the extra hour of sleep I got Saturday night! The problem is now its early afternoon and i am already feeling the urge to blow off the gym and go take a nap! i am sure the urge will dissipate in time.

This week we had an interesting event take place with not one but 2 of our clients! It is not rare to have a client call and need help with a virus that magically appeared on their computer. But in this case, not only did we get two requests but they both were a nasty little thing called Cyberlocker or Ransomware.
This type of virus is usually acquired from clicking an attachment in an email, but it can be downloaded from less than secure sites as well. What makes this type of virus so mean is that it encrypts all your data then informs you that in order to decrypt your data you will need to send them $300.00 in MoneyPak or Greenbucks. These are typically bought at Walmart and other shopping establishments. Of course, they are typically untraceable so it is a perfect way to get paid and leave no money trail.

Typically, we would recommend not paying for any type of software where they infect you first then get you to sign up or buy a software to remove it. The beauty or the disgusting (whichever side your on) part of this particular virus is there is no way to unencrypt your data so unless you have backed up your data or kept good restore points, you are out of luck getting your data back. Both of our clients did not have recent backups and both had critical data that had to be retrieved.

We recommended paying the ransom (only after researching that these thieves were at least honorable enough to actually do what they say). Both declined at first, then when they came to the realization that they
would lose all their data decided to pay the ransom. I am happy to say that upon receipt of the money, the extortionists actually unencrypted the file and the clients were able to retrieve their data.

The bottom line is this, they were EXTREMELY lucky. First of all, It is very important to back up your data frequently. Second, Have a good Anti-Virus software installed Like ESET. Third, do NOT click on attachments that you do not know who they are from. If you have any questions of for more information regarding this give me a call or check out our website www.omegabiz.com

Until Next Time,

Trent B. Nyffeler · tnyffeler@omegabiz.com
Technology Solutions Advisor | Omega Business Systems | www.omegabiz.com
Office (817) 492-4249 x125| Fax (817) 492-4250   














Tuesday, September 3, 2013

Another Holiday Passed us by!

Greetings from Hot and Sticky (still) Arlington, Texas! Well another Holiday weekend has come and gone. This one has special significance in that Labor day marks the traditional end of summer. Kids are back in school. The summer pool parties have come to an end. Football season begins (this is a good thing). Of course, here in Texas, Mother Nature didn't get the memo and it is still brutally hot!!! I am excited for two reasons today. The first is, after a long layoff, I have finally got my butt off the couch and decided to get back in to the gym! Over the last couple years I actually have lost 100 pounds, but I took a break and it is time to get back after it before I slowly pack it back on. I am also excited because we have brought on a new client at Omega Business Systems, LLC. Of course, i am always excited to bring in new customers for many reasons, but this one is a refreshing change of pace. Although we all work our tails off so we can take care of our families and financial obligations, I enjoy helping others through taking care of the IT Networks so they can focus on other things to help grow their business'. So since I am beginning to on board a new client, I thought I would share a couple tips to consider when changing Managed Service Providers or hiring one for the first time. The first and foremost is make sure you can work with your Account Manager or Contact person. Yes, Yes, of course you want to make sure they are a honest, competent company. But what good is that if you cannot stand dealing with your Account Manager to make sure you get things done and in the time frame you need them to be completed in. 

Secondly, Be Prepared! When you bring on a new company to handle your IT needs, they will need some information to get your system switched over so they can manage the network effectively. The most important thing to have in hand is a list of Users and Passwords. You should have this already stored in a convenient and secure place (even if you are currently outsourcing your IT.) This will enable the New provider to access your network and get familiar with your setup. Not to mention be able to handle any help desk requests that may come up during the On boarding process.
These of course are only a couple things to assist you in the process of hiring a Managed Service Provider, but i assure you these will help you tremendously moving forward in the process.

Until Next time, I hope you have a great week. Feel free to drop me a line if you have a question or a topic you would like me to address. 

Regards,
Trent

Trent B. Nyffeler · tnyffeler@omegabiz.com
Technology Solutions Advisor | Omega Business Systems | www.omegabiz.com
Office (817) 492-4249 x125| Fax (817) 492-4250   


Thursday, August 29, 2013

Greetings from Smoldering Arlington, Texas! I have decided to try to attempt a blog as a way to free my mind of all the extra information that seems to be constantly keeping me from focusing on my daily tasks. I have so many interests and ideas but I really want to stick to what people really want to know about a myriad of topics that i may have some insight or opinion of that is worth consuming. Primarily, my main motivation is to enlighten Small Business owners on the value of having their IT management outsourced to a company like the one i work for..... Omega Business Systems. Let's face it, most business owners don't give a crap about their IT. Like myself, They just want to sit at their desk and have access to their data, emails, and of course the internet!!! It is only an issue to investigate when one of the above cannot be accomplished. Then and only then, does the intricacies of their IT network have real meaning. In the future, I hope to bring valid reasons for why we should outsource our IT to a competent Company and hopefully have some useful tips and tricks to make technology easier to use and abuse! In addition, I hope to mix in a few observations on how I see the world and stimulate conversation and a variety of subjects. Please feel free to comment and offer your opinions, questions and concerns and I will do my best to respond or answer accordingly! Until we meet again, stay cool and be a blessing to others!
 @tnyffeler