Master Microsoft Excel with these 3 tips

Digital literacy is all about mastering essential computer skills like navigating search engines and word processors. But one of the most crucial you need to learn is Excel. Check out these tips to be an Excel master. Pie and Sunburst Charts Everyone knows that bombarding stakeholders with endless numbers and decimal points is the wrong […]

Office 365 security considerations

It’s easy to see why Office 365 is an attractive solution for small and medium-sized businesses already familiar with the Office interface. More and more companies are making the move to the cloud, but there are security issues to consider. Identify your company’s sensitive data… Most files housed within your servers contain sensitive commercial and […]

IT security policies your company needs

When it comes to Internet security, most small businesses don’t have security policies in place. And considering that employee error is one of the most common causes of a security breach, it makes sense to implement rules your staff needs to follow. Here are four things your IT policies should cover. Internet In today’s business […]

Tips on adding value to your business data

Data is incredibly valuable. The more of it your business generates, the easier it is to predict market and customer behaviors. Analytics solutions aren’t always the right fit for small businesses, but that doesn’t mean their data isn’t valuable. Here are some ways to add real value to your business by harnessing the power of […]

4 Questions About Backups That Business Owners Should Know The Answers To

The old saying, “Pack your own parachute,” comes to mind when I think of data backups or, more specifically, data RECOVERY. However, how many people actually know how to pack their proverbial data backup “parachute” and instead rely on someone else – be it an employee or vendor? If that’s you, read on. Since the absolute WORSE time to check your backups is AFTER a data disaster, all company CEOs ought to know the answers to the following questions NOW so they aren’t unpleasantly surprised later when data gets erased and they’re scrambling to get back up and running: Where EXACTLY is your data being backed up, and how do you get access to it? If it’s being hosted in a remote place, you ought to have the account information and a direct contact you can call if your vendor or employee goes missing with this information. Ideally, it should be in your network documentation that is kept in your operations manual or somewhere you can easily access it if necessary. Who’s responsible for monitoring the backups to make sure they are working? When data is lost, the finger pointing starts. It’s not uncommon to hear, “Well I thought (they/he/she) was in charge of our backups!” only to discover that this person (be it a vendor or employee) actually has no idea that they had such an important responsibility. Keep in mind that many offsite backup companies allow you to store your data there, but they won’t agree to ANY responsibility for whether or not the data is being backed up correctly, completely or in a format that can be restored. How often do you run a test restore? The only way to know if your backups are working properly is to… conduct a test restore or “fire drill” of your data. We recommend running this once a month at a minimum to verify that you can actually restore from your backups in an emergency. If your data is lost, what’s the process required to restore it? Some business owners don’t realize that their raw data backups would take a LOT longer to restore than they imagine. If you are not “imaging” your data (a process that takes a snapshot of your server as is) you will have to reload all of your software, set up the network, reconfigure your settings and THEN restore the data – a process that can take the better part of a week PROVIDED you still have your original software discs and licenses. Our Free Backup Audit will give you the answers to these critical questions. If you don’t know the answers to these questions, give us a call to schedule a FREE inspection of your backup process. At a minimum you’ll know for sure that your data is safe and in a format that can get you back up and running again FAST. Call: xxx-xxx-xxxx or email us at: yourname@yoururl.com

Should you worry about Facebook’s breach?

Facebook is the most popular platform for developing brand awareness because it allows businesses to target users based on what they have posted in the past. But after the recent data breach scandal, is your data still safe? Read on to find out if you need to worry about your privacy. Last month, news broke […]

3 concerns with virtualization management

Virtualization can help boost operational efficiencies like never before, but you have to understand that the benefits aren’t always immediate. As valuable as it is, it does come with flaws to those who don’t know how to properly adopt it. Here are a few concerns that can become an issue in virtualization adoption: Backup Incorporating […]

3 tips to maintain a secure Facebook account

In March 2018, disturbing reports circulated on the web that revealed a company named Cambridge Analytica harvested confidential details of 50 million Facebook accounts. If you’re concerned that your private details are being passed around by private companies, consider the following 3 tips to maintain a confidential Facebook profile. Download your Facebook data The thought […]

Secure PHI with tech defenses

News regarding hospital data breaches that disclose thousands of medical records emerge at a distressing rate, yet these attacks shouldn’t really come as a surprise. All this valuable data will cost a hefty price on the black market, which makes them great incentives for cybercriminals. Counter this by arming your team with the best systems […]

Phishing hits businesses at tax time

Phishing schemes abound every season, and tax season is no exception. It’s an important time of year in the corporate world and cybercriminals are looking to take advantage of it, which is why your business must ensure that your confidential data is kept under lock and key. Phishing baits to watch out for Phishing attacks […]