CLEAR - Technology For Your Business

Beyond IT Support: The Hidden Costs of Dated Tech

Posted by Mark Shipman on Apr 28, 2014 8:39:00 PM

Small businesses handle the procurement and depreciation of capital equipment in different ways. Is there a best practice for managing these purchases when it comes to tech purchases?

Typical small businesses handle the procurement of technology resources in one of four ways:

1) Leasing on a three or four year term.

2) Hardware As A Service (short explanation is similar to leasing with service included in the monthly fee).

3) Purchase with a three or four year depreciation schedule budgeting for replacement hardware in that time frame.

4) Purchase and use the equipment until it dies.

All of these options except for the last one ensure that employees are using equipment that is four years old or newer. 

Why should a business care if they are using older equipment?

Some of the sentiments that small business owners bring up when asked to consider rotating newer IT resources into an annual budget are:

  • The newest version of Windows or Office doesn't do anything more than our current version.
  • Learning new software is an efficiency killer.
  • Technology is expensive - why not use it until it breaks? After all, there is no value to equipment after four years.

Direct Equipment Cost

TechAisle, a company who researches Small and Medium sized business trends, recently completed a study of 724 companies and the effect of older equipment. TechAisle found that the average small business is spending $427 a year on computers that are older than four years old.  The cost goes up for businesses in the 50-99 employee range - $521/year. 

Productivity Costs

The average small business wastes 42 hours in lost productivity to older equipment. This can be directly attributed to the repair time lay, or professional IT support, techs spent fixing this older equipment.

 

techaisle small business pc cost study

Has Small Business Taken This Data to Heart?

TechAisle found that 66% of small businesses are currently using IT equipment that is older than four years old.  Many of these previously had a rotation schedule for tech replacement, but eliminated it from the budget as they tightened belts over the last few years. The chart above shows that the cost of maintaining three older workstations per year is actually higher than the cost to replace them entirely. While finding space in the typical small business budget for new hardware can feel tough, and perhaps unnecessary, data suggests it is the smart business decision.

How has your Small Business handled the procurement of hardware?

 

View 10 Hidden Business Risks

Topics: services, Small Business Tips

Latest iOS Update Killing Apple Devices

Posted by Mark Shipman on Apr 25, 2014 9:45:00 AM

Apple iOS BadSmall business users are pounded by the message that software updates and patches should always be updated and kept current.  The message is good spirited and the practice is meant to ensure security.  What is lacking in that message is that updates and patches should be vetted before being applied to devices critical to business operation.

This morning many awoke to find iOS 7.1.1 was released by Apple for any iDevice that is currently capable of running iOS 7.  Unfortunately, many people are reporting that this update has rendered their iDevice "bricked".  Bricked is a term used to describe the state of an electronic device when it no longer responds to any commands or resets.  Typically, bricked devices have to be replaced by the manufacturer.  

Small business users require their devices function reliably in order to most effectively transact business.  Most small businesses are not in a place where they can afford to lose the function of a primary business tool as bugs get worked out.

How should discerning small business management interpret this mixed message?

There are two options for small business owners and management to consider when updating and patching systems:

  1. Stay away from the bleeding edge. Let someone else test the latest "fix" for the inclusion of more errors. Often this can mean just waiting two weeks before applying a patch or update. This means a device is still subject to the flaw the update was meant to solve, but at least there is comfort in knowing no functionality has been lost. The other problem with waiting two weeks is that there is no guarantee the vendor will have handled any errors in that time frame. It is simply a safety time line that hopefully allows some other early adopters to find and force the vendor to fix issues.
  2. Engage with a Managed Service provider for IT support. A good Managed Service provider in the Orange County area should be testing all patches and updates that are applicable across their customer base. Businesses should be able to depend on them to provide guidance on when an update or patch is safe to apply.  When an update is as bad as this Apple example, often times they can show you it is prudent to avoid it all together. Judging by this mornings reports, it is probably best to wait until Apple releases the next version.

What are some horror stories you have had with updates and patches?

Topics: security, services, Small Business Tips

Small Business IT Security News: The Fuss Over Heartbleed

Posted by Mark Shipman on Apr 14, 2014 3:24:00 PM

Heartbleed IT SupportIt would be pretty hard to have made it the last week without hearing some mention of "Heartbleed".  News sites are reporting it. Vendors and websites are giving notice of how they might be affected. Friends are probably advising to change "all" your passwords.  What does it really mean to the average small business though?

The Simple Explanation

When a person browses to a secure website (something that typically starts with "https://") there are a few different programs the secure websites can use to make sure traffic is encrypted.  One such program is called "OpenSSL".  A group of independent researchers found a flaw in this program that allowed passwords to be exploited.  There has been no evidence that anyone with malicious intent found this flaw before the research group did.  The research group devised a fix and sent it to companies that are using OpenSSL.  It is the responsibility of those companies using OpenSSL to apply the fix.  Absentee or procrastinating website owners may take some time to realize, and be motivated, to apply the fix to their website.  To check whether a website is still vulnerable to this exploit you can check using this webpage:  LastPass Heartbleed Test

Who Did This Affect?

This flaw affected organization of all shapes and sizes.  It is possible a small business using encryption has been affected and needs to be addressed.  The tools we use were affected.  We understand the implications, applied the fix and remediated any possible password exploit within a day of the fix being released.  The technology consulting firm handling IT for a small business should be able to inventory the company's systems and provide advice on what may need remediation.

Some of the types of services that may have been affected and may, or may not, need small business owners to make password changes:

Heartbleed Cheat Sheet
Type of Websites Change Password
Social Media YES
Free WebMail YES
Financial Institutions No
Government Sites No
File Sharing YES
Password Managers No
Media Sharing YES
Web Retailers YES
   

For a more detailed list of what services may have been affected you can visit an appropriate Mashable article at: Mashable: Heartbleed Hit List

Small businesses should ask an IT Managed Service provider for a quick list of services that they may be hosting which have been affected.  Some IT resources a small business may be running in Orange County that might be susceptible:

  • VPN Gateways
  • E-Mail
  • Public facing websites

The whole Heartbleed scenario has been handled with expediency, which appears to have resulted in minimal, if any, data loss.  Small businesses need to make sure they do their part securing IT technology they are responsible for.

Have you found any susceptible systems?

Has Heartbleed scared you?

How much time did you lose changing passwords?

  Free Evaluation  

 

Topics: security, services, Small Business Tips

Small Business has Role in One of the Largest Security Breaches

Posted by Mark Shipman on Feb 7, 2014 1:35:00 PM

Small Business Security ResponsibilitySmall businesses are often concerned about the security of their network in terms of employee trust.  Management does not want employees accessing personnel records or company financials.  Often when a small business is asked to spend money on security concerns that exist outside the physical office, there is a common phrase:  "I am too small for anyone to want to hack me".

What Happened?

Two days ago, Target revealed how their systems had been compromised in November and December.  The security breach resulted in millions of customer credit information being leaked to a crime syndicate.  This security failure represented one of the largest in history and caused Congress to bring Target executives in for a hearing.

Independent auditors determined that a password given to an outside vendor Target uses for HVAC was used to first access Target's network.  The HVAC company, Fazio Mechanical Services, admits that independent auditing shows the password was gained by an outside threat compromising their network.

Fazio is not a large company.  This isn't a company that was servicing Target nationwide.  They boast the following on their website "...largest refrigeration contractor in the Western Pennsylvania region...".  Hackers seized the opportunity to penetrate the security of an unsuspecting target to gain access to their much larger customer.  Target has not yet identified the future relationship they may have with Fazio - but it is probably a safe bet Fazio lost a very large account two days ago.

Both companies are trying to hide behind some kind of "very sophisticated" attack as a means of lessening the public blow.  Sparing the reader the technical details - that is just not true.  This could have wholly been prevented.  Initial configuration was done incorrectly.  Most importantly, routine maintenance that should have discovered the deficiencies was apparently not occurring.  Hackers used creativity to find these holes in both company's network and exploit them.

What Type of Small Business Needs to be Concerned?

Network security is a cost of doing business.  Most companies fall under some type of compliance regulations, but fail to recognize how those regulations affect their business.  If a business accepts credit cards they must adhere to PCI-DSS standards and annual audits.  Health care providers must comply with HIPAA regulations.  California has it's owner, stricter rules, for the disclosure of any personal data that may be erroneously disclosed or handled.  Countless Orange and San Diego small businesses are completely unaware of their obligations.  Many, many businesses who fall into this category will not take stock of those regulations affect them until someone knocks on the door - a costly time to receive an education.

How Can a Small Business Protect Itself?

  1. Recognize the responsibility for data collected.
  2. Limit information collected to only that required for business.
  3. Have an outside IT Support company perform a Risk Assessment Audit.
  4. Management needs to identify, and make policy, a risk adversement strategy.
  5. Insist regular patching and updates of all programs and anti-malware software is occurring.  This is a daily process.  This can be performed by dedicated IT Support or a Managed Services company.
  6. Daily review of security logs to catch possible threats quickly. 
  7. Regular audits by an IT Management firm to ensure tasks are properly being handled and configuration is correct.

Has your small business been affected by cyber criminals?

What is your small business doing to protect itself?

 

Topics: security

Small Business CIO: Quick Bitcoin Explanation

Posted by Mark Shipman on Jan 30, 2014 7:00:00 AM

Bitcoin has been getting a lot of attention over the past few months.  The currency (or concept depending on the given economic opinion referenced) has been around nearly five years.  It appears the recent interest has been garnered as Bitcoin exchange rates have skyrocketed over the last six months.  We have seen the value of Bitcoin go from the low teens to over $1,000 in the last twelve months.

how bitcoin volatilty could affect small business

What is Bitcoin?

The easiest way to explain Bitcoin is perhaps to compare it to PayPal on "steroids".  It is a complete end to end system that facilitates payment between two parties.  The difference between Bitcoin and PayPal is that the latter uses dollars as the default currency.  Bitcoin uses a virtual currency it has created.  The easiest way to think of this virtual currency is like casino chips.  There are Bitcoin exchanges (for example Mt.Gox) that behave similar to the casino cashier.

What is the Allure of Bitcoin?

There were originally two driving factors when choosing to use Bitcoin:

  1. Anonymity.  Bitcoin is completely anonymous.  Due to the nature of how the virtual currency is tracked and processed, it is possible to remain anonymous to governments.  This has spawned more than a few illegal enterprises.  The most notable is Silk Road, where drugs deals can be made from the "safety" of one's home.  A virus, Cryptolocker, also uses the anonymity of this payment method to extort fees for the release of captive files.  The participants in both these cases remain free from the possibility of a government authority using the payment system to track them down.
  2. Independence from government controlled currencies.  Many users of Bitcoin have inflationary concerns and use the Bitcoin currency to hedge portfolios.

There is a third reason Bitcoin is starting to gain traction...Small Business involvement.  Small businesses are realizing that Bitcoin transactions can be free from surcharges.  This is a saving of 2%-5% on each dollar that would have been collected using traditional credit/debit cards.  If a small business could somehow eliminate the traditional credit/debit merchant accounts they could avoid rising audit, compliance and charge back costs that come with credit card agreements.

What are the Downsides for a Small Business?

  • While fees are eliminated from the actual transaction, fees will eventually be incurred should a business want to "cash out" collected Bitcoins to a more traditional currency.  Fees can include the following:
    • Percentage of transaction.  On average .5%
    • Bank fees on both the exchanges part and the Bitcoin user.  They could be compared to a stock trade transaction or wire transfer fees.
  • An issue that a small business should not take lightly is the volatility of Bitcoin value. 
    • The big swings even in this last month have been up to 30%.  The typical small business is going to have a hard time swallowing a 30% loss on any Bitcoins that have not been cashed out.
    • Volatility is going to mean that management will need to keep a close eye on exchange rates and take the time to adjust pricing accordingly.  Most small businesses just do not have a dynamic pricing point of sale system available to them.

There are more confusing parts of Bitcoin, like mining and who keeps track of the transactions.  If there is interest, there can be a larger discussion about those topics.

Small Business Bitcoin Decisions

If your small business CIO gave you this quick explanation would your instinct be to embrace or run from Bitcoin?

Topics: services, Small Business Tips

Small Business Tips: Writing An E-Mail

Posted by Mark Shipman on Jan 22, 2014 7:00:00 AM

Small Business IT E-Mail EtiquetteThis blog focuses on Small Business IT support and technology issues.  Tips on writing an e-mail is a little bit off scope of the intentions of this space.  There have been so many poorly constructed e-mails to come across the inbox lately, however, that this small diversion may help everyone communicate a little bit more clearly.

Some of the worst offenders of poor communication are IT professionals.  Those in the technology field have to be reminded that fixing an issue is only half of the job.  Successfully communicating with others in the course of job duties is just as critical.

The Basics of Composing an E-Mail that Gets Read

Write like a professional.

An e-mail is not a formal business letter, but that does not mean it should not be professional.

  • There needs to be an appropriate subject
  • Each E-Mail needs a greeting and a signature
    • It is perfectly acceptable to have different signatures of standard and "short" varieties.
  • Avoid abbreviations and misspelling.  An e-mail is not an excuse to get sloppy.  Readers may be more likely to forgive sloppiness if they know a message is being sent from a mobile device.  Readers can be notified in the signature to this fact.

It may be unfair, but failing to follow these rules will likely cause the reader to devalue the authority of the writer.  If the writer has no authority in a situation, or over a subject matter, why would anyone bother reading future correspondence?

Be Brief.

No one wants to open their inbox and find a long e-mail they have to wade through.  Often times the reader will just begin skimming the message.  They may not skim the parts of the message that the writer thinks are important.  If the reader ignores the content then the only purpose the e-mail serves is to document and cover one's....butt.  Those types of e-mails do not help anyone be effective - which should be the goal of any communication.

Be concise.  After writing an e-mail, go back and quickly proof it.  Delete any words that are not necessary.  This is not a High School paper; there is no minimum word count.

Be Thorough.

Anticipate short, shallow questions and concerns the reader may have.  People value the give and take in a real-time, personal conversation.  In e-mail, however, each time the reader has to respond back, it wears on their patience.  People want to answer an e-mail and clear it out of the inbox.

Use Formatting.

Far too often e-mails are one large block. Some formatting tools to consider:

  • Spacing.  Sometimes writers confuse "being brief", with using less Use E-Mail Spacingcharacters.  Mixing in a blank line to break up the e-mail keeps readers moving through an e-mail.  Use spacing between:
    • Greeting and the start of the E-Mail
    • Paragraphs
    • The end of an E-Mail and a signature
  • Bullet points.  Numbering or bullet points help the reader quickly see the important topics, keeping their interest.  It also helps the E-Mail composer consolidate thoughts and stay on message.
  • Paragraphs.  Use small paragraphs to chunk up ideas.  This keeps the reader from being discouraged, and instead, engaged.  After all, unless a letter is sent from a loved one, who wants to read any kind of long letter?

What type of practices do you use to keep e-mail readers engaged?

Care to share any pet peeves?

View 10 Hidden Business Risks

Topics: Small Business Tips

Expect ROI On Online Marketing? You Need A Social Media Strategy

Posted by Mark Shipman on Jan 10, 2014 3:49:00 PM

Tweet ROI On Online MarketingHaving lots of people following your business’ Twitter page feels wonderful. Follower count, however, is often an empty number.  If a small business social media strategy does not include engaging followers beyond a sales pitch it will not be successful.  Followers need to be motivated to interact with your brand.  What’s even better is when these followers are actually motivated to buy your company’s services or products or recommend your company to others. If you wish to create these active followers, the Web site Small Business Trends provides some advice you’ll want to follow.

Cull Active Followers

According to Small Business Trends, one of the better ways to gain more interaction from Twitter followers is to learn more about these followers. You can do this with such products as SalesForce Marketing Cloud, SoDash, BirdSong, KnowYourFollowers and HubSpot.

What You’ll Learn

Here’s what these programs can tell you: In what state your followers live, what gender they are, their age, what other Twitter accounts they follow and where they work. Valuable information, no?  It will also allow you to reach out beyond your followers, looking at their connections.  Following their connections that have a shared interest in which your business targets helps speed up the brand recognition process.

Why Does This Matters?

You need to tailor you Twitter posts to the biggest possible segments of your followers. Social media analysis programs like will help you do this. When you sharpen your message, you’ll dramatically improve your odds of inspiring your consumers to interact with your small business.  Interaction spreads like fire as others take notice and begin to recognize your brand.  Actual sales are a long tail prospect in many cases.  The wonderful feeling should come when followers purchase your products and promote your business to their neighbors and friends.

Am I Wasting My Time?

Any good strategy needs to have the means and tools to be tested.  A social media strategy takes tremendous resources for most small businesses.  Whether a small business is paying someone, or doing it themselves, there is a high cost to manage the social media aspect of the business.  Any research on social media strategy needs to include how successful a particular social media campaign is.  Small businesses need to see what demographics are using the social media campaigns they run.  These businesses also need to track actual sales numbers against effort spent.  If a small business is outsourcing a social media campaign, they should also be provided with the tools to measure effectiveness.

Has Social Media Helped Grow Your Small Business?

Topics: internet marketing

Managed IT Services: Orange County Internet Options Explained

Posted by Mark Shipman on Nov 14, 2013 4:58:00 PM

Confusing InternetAn Orange County IT Managed Services Provider gets an opportunity to be in hundreds of small businesses every month.  A topic that consistently comes up is the misunderstanding about Internet connections.  The typical person knows to look for speed differences like "50 down and 5 up".  That is just one variable when choosing an Internet connection for a business.  Is there a difference between residential and business Internet solutions?  Smart small business managers have to wonder why there is such a big discrepancy in pricing between services.

For the purpose of this blog the following abbreviations will be used:

  • DIA - Dedicated Business Internet Access
  • SLA - Service Level Agreement
  • ISP - Internet Service Provider
  • VoIP - Voice over IP Telephony

Throughput

This is the typical number that gets thrown around - the "50 down and 5 up". 

  • Down - the speed a provider will deliver for downloads (serving up web pages, YouTube videos and DropBox)
  • Up - the speed a provider will deliver for uploads (sending files)

Depending on the type of service, however, these numbers can have different meanings:

  • Residential Solutions - these numbers are best effort are represent the max an ISP will deliver to a customer.
  • Business Class Cable (in a home) = these numbers represent the minimum an ISP will provide
  • Business Class (commercial address) = these numbers represent the minimum an ISP will provide
  • Business Class DIA = these numbers represent the minimum an ISP will provide

This is a good starting point when comparing service options, but that is all it really should be.  A lot of small businesses look at this number, compare pricing between vendors and make a choice.  This variable is probably enough for most residential uses, but not for most businesses.

Latency

The term that measures delays in transmission from a website, to the business and back to the website.  A high latency is bad.  A low latency is good. If a small business is planning on utilizing VoIP a low latency is an absolute must.

  • Residential Solutions = Level not guaranteed.  Could be 10ms, could be 300ms.
  • Business Class Cable (in a home) = Level not guaranteed, just receives priority over normal residential customers.
  • Business Class Cable (commercial zone) = 20ms guaranteed.  Often this does not happen as lines are oversold.  It can be a constant battle with support as latency can often spike to 40-60ms.
  • Business Class DIA = 5ms guarantee.  Lines are engineered to ensure this level is stable and deliverable.

Jitter

Jitter is the measurement of how variable latency is from a period in time.  Is the latency consistently 20ms or does it bounce all around from 5ms to 40ms to 15ms?  If it was expressed in terms of music Jitter might be compared to a steady beat.  Jitter of more than 16ms starts to make VoIP unbearable.

  • Residential solutions = best effort, no guarantee
  • Business Class Cable (in a home) = best effort, no guarantee
  • Business Class Cable (commercial address) = best effort, no guarantee
  • Business Class DIA = 5ms or less guaranteed

Support

The level of support varies greatly with each Internet solution.  All levels include phone support, but response time and uptime guarantees vary:

  • Residential solutions = phone support, with no SLA. If the line is down there is no guarantee for when it will come back up.  Best effort only.
  • Business Class Cable (in a home) = phone support, with an SLA. Guaranteed to have first response in 4 hours from the time of a call.  That doesn't mean the issue will be fixed in 4 hours, but that a tech will be directly addressing the issue in 4 hours.
  • Business Class Cable (commercial address) = phone support, with an SLA. Guaranteed to have first response in 4 hours from the time of a call.  That doesn't mean the issue will be fixed in 4 hours, but that a tech will be directly addressing the issue in 4 hours.
  • Business Class DIA = phone support, with an SLA.  Guaranteed to have first response within 1 hour.  Guaranteed that line will be back up within 24 hours.

Only the small business can decide how important a stable, steady Internet connection is to the health of the business.

 

View 10 Hidden Business Risks

 

How have you saved costs on Internet, yet provided an productive work environment in your business?

Topics: business continuity, services, cloud

Small Business IT Education Is The Only Support For Cryptolocker

Posted by Mark Shipman on Nov 8, 2013 1:52:00 PM

This blog has spent a good deal of time writing about the Cryptolocker virus as of late.  Typically a virus or security related topic can get beat into the ground in an effort to drum up sales.  Vendors use it as a leveraging point to sell more solutions and contribute to FUD (Fear, Uncertainty and Doubt) in small businesses.  Cryptolocker is different.

Why is Cryptolocker different?

The authors of Cryptolocker have been proven to be very smart. 

  • Anti-Malware and security vendors have yet to find a way to identify and stop Cryptolocker from invading networks and computers.
  • Once infected, none of the vendors have a solution for returning your data back to a business.

There is not much the typical vendor can sell in the way of a solution as of yet.  There is no magic bullet for prevention or remediation.

Speaking of smart...

The authors of Cryptolocker have crafted a new message to hopefully ensnare naive computer users into infecting themselves.  Cryptolocker has previously been documented as a fake e-mail from UPS.  The e-mail has a zip file attached that once clicked, infects the computer and attached network.  The latest iteration is disguising a voice mail attachment.  Check it out...

Cryptolocker Voicemail DisguiseIt is not evident in that screen capture (as we wanted to make this an anonymous submission), but the e-mail appears to come from the actual e-mail recipient.  This is a typical example of how a legitimate voice mail attachment might be sent. 

Cryptolocker Sender Disguise

The authors of Cryptolocker have picked up on that trend and are masking their "payload" to trick naive computer users into treating the e-mail as if it were from their small business voice mail system.

The attribute that everyone needs to look closely at is the attachment type.  Almost all voice mail systems will send an attachment as a WAV file.  This e-mail shows the attachment as a ZIP file.

Cryptolocker Disguise Attachment

 

How can small businesses can avoid a massive disruption?

The best method of prevention to this malicious and costly virus have been covered in this blog previously.  As a quick highlight:

  • Ensure all workstations have current anti-malware updates.
  • Ensure current operating system patches are installed on workstations.
  • Have and consistently test a true business class off-site or on-line backup solution.
  • Educate employees about emerging risks and best practice habbits.

The hope around here is that these malicious activities will be thwarted by our efforts in this space to provide ongoing knowledge to the small business community.

How do you feel about Cryptolocker? Has it changed how you view your IT support or on-line behaviors?

 

Topics: security, business continuity, services

Virus Extortion Gets Worse Highlighting Need For Online Backup

Posted by Mark Shipman on Nov 4, 2013 3:14:00 PM

Several blog posts and articles have been written about Cryptolocker, including two in this space.  If you missed those:

Cryptolocker Virus: Prevention Is the Best Computer Support

Cryptolocker Virus: When It Is Time For An Online Backup

Online Backup Saves CompaniesThis blog previously documented that cleaning the virus could leave a machine "clean", but also remove the option for paying the extortion fee.  Without the option of paying the extortion fee an infected victim without a backup (or with a backup that was specifically targeted and corrupted by the virus) would be completely out of options.

Over the weekend, however, a new development has come to light regarding this mal-ware. Not wanting to waste a revenue opportunity the extortionists now have a utility a victim can install if the mal-ware is inadvertently cleaned too early.  Loading this utility will allow the extortionists to, once again, help a victim hand over money in exchange for the files that are held hostage.  There is a catch.  While previous reports have the authors of Cryptolocker charging $300 to unencrypt files, this new utility comes at the cost of $2,300.  Three hundred dollars can be an angry mistake that a small business owner fumes for a few weeks over.  Twenty-three hundred dollars, however, rivals the cost of a real online backup solution.  It should also be noted that these prices are not part of a negotiation.  The extortionists can change the fee at any time.  It would not be wise to think a small business can afford $300 and dismiss the threat under a standard risk:benefit analysis.

There isn't a small business in Orange County that thinks having a backup is a waste.  There are plenty, however, that by inaction have placed the value of the solution pretty low.  If there is value in a backup it has to have the following characteristics:

  • Automated
  • Versions (saves several different days of files)
  • Off-site Replication (standard with any type of online backups)
  • Regular testing

There are plenty of reasons having an online backup make sense, among them are:

  • Natural Disasters
  • Theft
  • Employee Sabotage

and now

  • Viruses that specifically target on premise backup solutions to enhance extortion efforts.

EVERY small business needs to have some type of online backup solution.  There are several companies offering online backup options at all price points.  There is not a reason a small business should have to pay these extortionists money.  They are only profiting off of companies that have refused to protect their business through ignorance or a false sense of thriftiness.

Topics: business continuity, cloud