Monday, August 31, 2015

5 cloud security measures you need to take!

August 31, 2015
164_Security_BIf you’re considering transitioning your business to the cloud, have you considered the security of the platform? While providers would like us to believe that the friendly fluffy cloud image used to market the service means it is automatically secure, the truth is that the reality is far different. Just ask one of the nearly seven million Dropbox users who had their accounts hacked. This is not meant to scare you, but only to make you aware that cloud security needs to be taken seriously - especially if you’re a business owner. To help you take the correct precautionary measures as you transition to the cloud, we’ve put together a list of actions you can take to ensure cloud security.
The cloud is playing more and more of a significant role in business. Yet, as more companies jump on the bandwagon, very few of them seem to be taking cloud security seriously. According to a recent survey, the "Security of Cloud Computing Users Study" , only 50 percent of those surveyed had investigated the security of the cloud services they used.
To ensure you put in place proper security measures when beginning your cloud venture, here are five actions every small business owner should take.
Ask your IT provider what cloud security policies they have in place - this is probably the single most important security measure you can take. Find a trusted IT provider and have a candid conversation with them about their cloud security policies.
Ask where the location of the physical cloud servers are - when you have “the conversation”, don’t forget to ask about this. Believe it or not, some cloud servers may not even be stored in your own country. Wherever they are, it’s wise to make sure they’re located in a safe data center area with proper security afforded to them.
Create unique usernames and passwords - your login credentials represent one of the cloud’s main security vulnerabilities. Take the time to come up with a better password than “12345” or “football.”
Use industry standard encryption and authentication protocols - IPsec (Internet Protocol Security) is a reliable technology choice.
Encrypt data before it’s uploaded to the cloud - whether you do it yourself or your cloud computing provider does it for you, this is a must to ensure security.
When it comes to trusting the security of a cloud service provider, transparency is key. The provider should take security seriously, be able to explain their security policies clearly, and be willing to answer any questions. If they can’t do one of these, it’s a clear sign of a red flag.
Are you ready to talk cloud security and transition your business into the cloud? Call us today. We’re happy to answer all your questions.
Published with permission from TechAdvisory.org. Source.

Trent B. Nyffeler · tnyffeler@omegabiz.com
Technology Solutions Advisor | Omega Business Systems | www.omegabiz.com
Office (817) 492-4249 x125| Fax (817) 492-4250   












Monday, August 24, 2015

How to prepare your business for VoIP

August 19th, 2015
Businesses everywhere are embracing Voice over Internet Protocol (VoIP) technology to communicate more effectively with colleagues, clients, and suppliers. Do you have a VoIP phone system in place? When it comes to transitioning your business from traditional phone lines over to VoIP, preparation is vital to seamless and successful implementation. Here are the key components you need to examine in order to properly prepare your business for VoIP.

Network

Implementing a VoIP phone system presents challenges of its own. For one thing, VoIP service cannot tolerate any kind of network interruption. You need to ensure you have alternative physical links to carry all of your VoIP traffic in the event that you lose your primary path. An uninterrupted power supply (UPS) should also be installed. This way your Ethernet switches and VoIP devices won’t lose connection and go offline in case of power failure.

Security

As with other networks, VoIP is susceptible to cyber security threats and breaches. If you don’t have reliable and preventative security measures in place, you could fall victim to information theft and malicious attacks. Your best bet is to deploy a dedicated internal firewall to monitor the traffic flow and protect your systems from security threats.

Bandwidth

VoIP is dependent on the bandwidth of your Internet. Therefore, an accurate estimation of bandwidth consumption is crucial for proper planning in order to accommodate VoIP traffic. You need to perform tests to ensure you have enough bandwidth to handle the inbound and outbound call traffic. Relevant information includes the number of users, the number of handsets, the duration of calls, and data usage levels.

Budget

VoIP is no doubt a long-term money saver for your business, but switching over from a traditional phone system, or a fresh installation, involves a cost. You need to take into account the expenses of purchasing the equipment required for VoIP installation, such as VoIP phone cables, external power supplies, and routers. Installation costs may vary greatly, but it is worth the investment if you’re looking to take your communication systems to the next level.

Staff

Employee involvement and understanding is key to a seamless and successful VoIP integration. You can assign one, or a group, of your staff members the responsibility of learning about and managing your new VoIP systems. They can be the go-to person for any enquiries from other staff members. It is recommended that you ask a dedicated specialist to equip your staff with the information needed to utilize VoIP to its fullest potential. While most people are already familiar with video conferencing software such as Skype, it helps to create user guides and manuals to educate those that aren’t as tech-savvy.
VoIP implementation can often be a hassle if you undertake it alone. With the help of dedicated professionals, however, the whole process can become much easier, less expensive, and more rewarding.
Get in touch with us today and we’ll answer any questions you have on preparing your business to embrace this groundbreaking technology.
Published with permission from TechAdvisory.org. Source.

Wednesday, February 4, 2015

What to learn from Sony’s security breach

February Newsletter: What to learn from Sony’s security breach #Omegabiz #security http://bit.ly/16zkuHQ

January 14th, 2015
Security_Jan12_CThe scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multi-million dollar corporations. These three tips will take you back to security basics and help avert your own big-screen drama.

Don’t let basic security habits slip

Our modern-day instinct tells us that the answer to potential security breaches is to install new layers of antivirus software, firewalls and further encryption systems. While these are all worthy additions to your company’s armor of security shields, they will do little to help if good old-fashioned protective habits are allowed to slide.
Instill a disciplined, security-conscious mentality in your organization, and keep the messages simple so that staff remember and follow them. Focus on regularly changing passwords and keeping them secret, being vigilant about avoiding unexpected links in email messages, and limiting network access for the likes of external contractors to that which is absolutely necessary.
One of the ways hackers made their way into the Sony network was by tricking administrators into thinking they had a legitimate need for access: teach your staff to be careful, and praise cautiousness even if it turns out access is warranted. Encourage staff to flag up potential security lapses, and make sure they know that reports will be followed up and loopholes closed.

Take a flexible and agile approach to IT

IT changes, and so do the ways best suited to keeping it safe. This means it is vitally important to keep your IT systems up to date, and where necessary to do away with outdated practices that could leave your business technology exposed. This involves more than just ensuring that your network is running updated antivirus software to catch the latest bugs and worms - it means staying abreast of emerging methods to mitigate potential threats from hackers worldwide.
All of this uses staff and resources that your small business might not have - which is where outsourced managed services come in. Using a managed service provider as an add-on to your own IT team can give you extra flexibility and the ability to keep abreast of industry security developments, even when you lack the time to do so yourself.
Equally, know when it is time to ditch data - think of emerging social networks like Snapchat, which set messages to self-destruct after a set time, as your cue to make your data retention policy less permanent, particularly in relation to email. If you no longer have a business need or a regulatory requirement to retain information, then delete it - in the process you can limit the possible damage even if the worst should occur and you fall victim to an external attack.

Backup, backup, backup

The last thing you want in the event of a security breach is for it to hit your day-to-day operations - the potential damage caused by the hack itself is likely to give you enough to worry about. But that is exactly the situation Sony found itself in after its latest hack, with its email system down and staff forced to return to the days of pen, paper and even the fax machine.
As well as ensuring alternative means of communication remain open to your business in the aftermath of a possible attack, it is also vital to make sure that you retain access to the information most critical to your work. Regular, secured backups help ensure that, whatever happens, the show is able to go on and your firm’s productivity and revenue are not unduly hit. Engaging professionals to undertake your backups on a managed service basis also means this can happen routinely and without fail, while you stay focused on running your business.
Want to learn more about how to reduce your IT network’s vulnerability to attack? Get in touch with us today.
Published with permission from TechAdvisory.org. Source.