Computer security

What is the Best Method For Backup of My Data?

By : Joaquin Hernandez |August 10, 2017 |Security, Small Business IT |Comments Off on What is the Best Method For Backup of My Data?

Top 10 Small Business IT Questions

#7 What is the Best Method for Backup of My Data?

Backing up data should be a priority for your business.  All businesses depend on documents and data to function. Even small business, like mine, need to protect their information. This is especially critical if you’re ever victimized by ransomware or viruses.

Financial records, significant documents, and communications are some of the basics a small business needs to back up. For these needs, an online backup solution will suffice. Several of the most popular options available are identified in this recent article: http://pcsupport.about.com/od/maintenance/tp/online_backup_services.htm.

Online backup services provide you a built-in capability to retrieve files or documents, without having to figure out some complicated process on your own. Also, these solutions are incremental, meaning only the changes are transmitted to the cloud. The system “knows” it does not need to back-up identical information over and over again.

To me, the best feature of online backup services is that offsite storage is already built into the solution. You no longer need to be concerned with moving portable disks or backup tapes to a secure offsite location. In my case, I no longer need to remember to take them home with me!

One of the oldest companies, used by many of my customers, is Carbonite. It is ranked third in the report evaluation above. Its ease-of-use makes it a popular choice. However, if your backup requirements are more extensive, Consumer Reports wrote a nice report which identifies several options available for backing up your data: http://www.consumerreports.org/cro/computer-backup-systems/buying-guide.htm.

Don’t forget to test your backup solution as part of your annual maintenance plan. Once your information is backed-up and secure, make sure you know the steps to recover you company’s information and that you actually “practice” how to do it!

Read More

How do I protect myself from hackers?

By : Array Systems, Inc. |February 02, 2015 |Security, Small Business IT |Comments Off on How do I protect myself from hackers?

Top 10 Small Business IT Questions

#4 How do I protect myself from hackers?

Hackers are people that want to get access to your computer network and access your data from your servers and computers.Hacker

A few year ago, hackers would most often gain access through your wireless network. Hopefully, we’ve all secured our wireless networks and have these access points protected with hard-to-break passwords.

Today, hackers may get access by stealing equipment. Laptops, desktop computers, servers, USB drives, and phones can be a “jackpot” for hackers. Most small businesses don’t secure their equipment with cables and physical locks. Additionally, when equipment is stolen if your data is not encrypted, your storage device is easily accessible and can be moved right onto the hacker’s computer.

Believe it or not, the most common way hackers access your information is by invitation. An employee invites a hacker into the system without their knowledge. This may happen when opening an email attachment that looks like an electronic birthday card from a friend. Once the file is opened (by clicking on it) a program is installed onto your computer and notification is sent to the hacker that it has successfully infiltrated your system. Another common way a hacker gains access is by an employee accessing a website on the internet that contains a hackers program. If you don’t have updated anti-virus or anti-malware software installed software on your computer you will not even know it has happened.

One of the most frustrating attacks, sadly, is also becoming more common. Crypto Locking programs encrypt your files so you can’t use your computer. The only way to eliminate this program is to completely wipe out your hard drive and restore from a backup. If you don’t have a backup then you are held ransom. Typically the hackers demand “ransom money”, usually about $500, to “release” your data. The payment is made in bitcoin – the new online currency that is hard to trace.

As we’ve seen recently it’s getting more and more difficult to keep hackers out. Like most criminals, they look for the easiest prey. So please, don’t make it easier by inviting them in.

Array can help ensure your company’s computer systems are protected.

 

Read More