If your data is important to your business and you cannot afford to have your operations halted for days – even weeks – due to data loss or corruption, then you need to read this list of essential items and act on the information shared. A disaster can happen at any time on any day and is likely to occur at the most inconvenient time. If you are not prepared, you run the risk of having the disaster seriously impact the operation of your business. Read the following list and see how many disaster planning items you have in place at your business: Read More
No matter your industry, there are myriad opportunities to cut back on paper usage and increase the efficiency of your department and business. Integrated document management systems give users the capability to electronically capture and store documents, access files from mobile devices, streamline business processes using workflow, and automate file output—all of which leads to cost savings.
So which areas of your business are most paper-intensive? Read on to find out, and consider how document management in these three places would change your workplace. Read More >
Transfer Business Risk
Cybersecurity risk is a frequent subject in today’s headlines and media. Being proactive about reducing cyber risk is important. Why? The statistics show:
- Symantec 2016 Internet Security Threat Report: 43% of cyber attacks target small businesses (up from only 18% in 2011).
- US National Cybersecurity Alliance: 60% of small companies are unable to sustain their businesses over six months after a cyber attack.
This weekend’s major malware outbreak is a good reminder that cybersecurity risk is a business risk, and all businesses should be regularly reviewing their cybersecurity preparedness.
Malware Outbreak – Makes You WannaCry
On Friday, a virus called “Wannacry”, which is in the category of ransomware, was released onto the Internet. It had far-reaching effects on businesses and healthcare providers primarily in Europe and Asia. Ransomware is a category of virus which encrypts files on your computer, effectively taking them hostage until you either restore them from backup or pay a ransom and hope to get the files unencrypted again. This virus spreads itself first by a user clicking a malicious link in an email, and then from computer to computer via a flaw in Microsoft Windows. Microsoft released a patch for this flaw in March of this year. Having this patch in place is important, but will not prevent a user from clicking on a malicious link and infecting/encrypting their computer and network files. Here is a useful graphical depiction from the Wall Street Journal about how this virus works:
Read More >
Ransomware is a type of malware that can be covertly installed on a computer without the intention or even the knowledge of the user. These viruses encrypt and hold data hostage until a ransom is paid to hackers. The malware restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction.
Backup and Disaster Recovery
Chortek’s backup and disaster recovery services are a key tool that reduces business risk. This fact is reinforced by a recent publication from the FBI regarding “ransomware”. The FBI warns that having a good backup is the only way to recover from a ransomware attack, short of paying the hackers the ransom. The FBI does not recommend that.
Contact Mike Senkbeil, Chortek’s IT Support Center team at 262-522-8226 if you would like a free check of your data backup solution.
See also “Malware Outbreak – Risky Business“
90 Minds Consulting Group has a Meeting of the Minds
The 6th annual Meeting of the Minds conference was held on February 23-25, 2017. Sue Wolf, a 90 Minds member, attended the event. During the event, attendees had an opportunity to learn more about Sage software products, product plans and future strategy as well as participate in question and answer sessions after each presentation. Read More >
NETWORK LOGIN SECURITY
It sounds like a simple concept as we have logged into computers at work for years. Why discuss it? The old combination of username and password is simply not sufficient any longer to safely secure the ultimate place where business data is accessed: the Windows desktop or laptop PC.
The pitfalls are numerous: Read More >
Email hasn’t gone away yet. Despite predictions of social media and other communication apps taking the place of email, it remains a primary tool for business communications. Often, its effectiveness is hugely decreased by junk that doesn’t need immediate attention. I recommend two ways of making your email work better: reduce inbox clutter and make sure you are interrupted only for important emails. Read More >
ACCOUNTING TODAY NEWS – The Internal Revenue Service has issued the 2017 optional standard mileage rates to calculate the deductible costs of operating an automobile for business, charitable, medical or moving purposes.
BUSINESS TRAVEL MILEAGE RATES – 2017
Beginning Jan. 1, standard mileage rates for the use of a car (also vans, pickups or panel trucks) will be: Read More >