erp updates

Waiting to Update Your ERP? It’ll Cost You!

STAY AHEAD OF THE CURVE ~UPDATE YOUR ERP

Check out the interesting research by Aberdeen | Content Spotlight. The research shows why you should keep your software updated; from why companies don’t have an ERP (Enterprise Resource Planning) system to issues related to not having an ERP system. The research brief addresses key reason’s to replace an ERP system, including why your business should update your ERP. It also shows the interesting resulting improvements by just upgrading supporting emerging technologies.

ERP UPDATES KEYS TO SUCCESS

I don’t know that any of these are surprises but more of a confirmation that technology can be key to your company success. Keeping current can keep you ahead of your competition. Keeping current can keep your customers happy, while increasing efficiency and profitability in your operations.

Download the free research brief

Register for the live webinar, Staying Ahead of the Curve by Aberdeen | Epicor, on October 31st. 1:00 PM CST

 

protecting identity

Are You The Half Of The Population At Risk?

Equifax Hack

It has been widely reported that key identity information for nearly half of the US population has been leaked in a hack of Equifax, one of the three largest credit bureaus.  Information leaked includes names, social security numbers, birth dates and addresses. Those are primary identification information components of applying for credit, and will no doubt put all victims at elevated risk of fraud against their identity and credit history.

Protecting Identity

Standard best practices for protecting your identity apply directly to this situation.  Only the final recommendation (security freeze) would be special action to consider in light of this unfortunate leak at Equifax: Read More >

disaster recovery

10 Disaster Planning Essentials For A Small Business Network

If your data is important to your business and you cannot afford to have your operations halted for days – even weeks – due to data loss or corruption, then you need to read this list of essential items and act on the information shared. A disaster can happen at any time on any day and is likely to occur at the most inconvenient time. If you are not prepared, you run the risk of having the disaster seriously impact the operation of your business. Read the following list and see how many disaster planning items you have in place at your business: Read More >

Altec DocLink

Go Paperless in These 3 Areas to Cut Costs

No matter your industry, there are myriad opportunities to cut back on paper usage and increase the efficiency of your department and business. Integrated document management systems give users the capability to electronically capture and store documents, access files from mobile devices, streamline business processes using workflow, and automate file output—all of which leads to cost savings.

So which areas of your business are most paper-intensive? Read on to find out, and consider how document management in these three places would change your workplace. Read More >

17121703798_c3be57bae8_b

Have You Applied For a Cybersecurity Insurance Policy?

Transfer Business Risk

Cybersecurity risk is a frequent subject in today’s headlines and media.  Being proactive about reducing cyber risk is important. Why? The statistics show:

  1. Symantec 2016 Internet Security Threat Report: 43% of cyber attacks target small businesses (up from only 18% in 2011).
  2.  US National Cybersecurity Alliance: 60% of small companies are unable to sustain their businesses over six months after a cyber attack.

Read More >

cryptolocker

Malware Outbreak – Risky Business

This weekend’s major malware outbreak is a good reminder that cybersecurity risk is a business risk, and all businesses should be regularly reviewing their cybersecurity preparedness.

Malware Outbreak – Makes You WannaCry

On Friday, a virus called “Wannacry”, which is in the category of ransomware, was released onto the Internet. It had far-reaching effects on businesses and healthcare providers primarily in Europe and Asia. Ransomware is a category of virus which encrypts files on your computer, effectively taking them hostage until you either restore them from backup or pay a ransom and hope to get the files unencrypted again. This virus spreads itself first by a user clicking a malicious link in an email, and then from computer to computer via a flaw in Microsoft Windows. Microsoft released a patch for this flaw in March of this year. Having this patch in place is important, but will not prevent a user from clicking on a malicious link and infecting/encrypting their computer and network files. Here is a useful graphical depiction from the Wall Street Journal about how this virus works:
Read More >

Ransom

Don’t Pay the Ransom – Prepare In Advance, Instead

Ransomware

Ransomware is a type of malware that can be covertly installed on a computer without the intention or even the knowledge of the user. These viruses encrypt and hold data hostage until a ransom is paid to hackers.  The malware restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction.

Backup and Disaster Recovery

Chortek’s backup and disaster recovery services are a key tool that reduces business risk.  This fact is reinforced by a recent publication from the FBI regarding “ransomware”. The FBI warns that having a good backup is the only way to recover from a ransomware attack, short of paying the hackers the ransom.  The FBI does not recommend that.

Contact Mike SenkbeilChortek’s IT Support Center team at 262-522-8226 if you would like a free check of your data backup solution.

90 Minds

Sage Software’s Road-map Unveils Product Line

90 Minds Consulting Group has a Meeting of the Minds

The 6th annual Meeting of the Minds conference was held on February 23-25, 2017.  Sue Wolf, a 90 Minds member, attended the event.  During the event, attendees had an opportunity to learn more about Sage software products, product plans and future strategy as well as participate in question and answer sessions after each presentation. Read More >

network login security

Who Is Logging Into Your Computer? Avoid The Pitfalls

NETWORK LOGIN SECURITY

It sounds like a simple concept as we have logged into computers at work for years. Why discuss it? The old combination of username and password is simply not sufficient any longer to safely secure the ultimate place where business data is accessed: the Windows desktop or laptop PC.

The pitfalls are numerous: Read More >