Business Tools to Take Your Business Out of The Office

Business Tools to Take Your Business Out of The OfficeBeing engaged in business used to mean staying wired in at the office eight to twelve hours a day. In the modern day, this is completely untrue. Often the most efficient workplace is spread far and wide and always on the go.

Today you can completely unplug from your desk with just your laptop computer and 4G modem. The freedom to work out of the office and even on the move is a huge advantage gifted to modern business. A simple mobile phone tether is enough to work from anywhere in the world.

The Right Tools for the Job

The most important part of working on the go is ensuring you don’t lose touch with your team. Maintaining total collaboration between team members can be tricky. Luckily, there are tools that will help you to stay on top.

Microsoft Office 365 provides the traditional tools and support of Microsoft office, but adds remote team collaboration and cloud support too. Files can be saved into the cloud, worked on, and accessed anywhere for review. At one time, remote working meant taking a copy of a file somewhere else to work. Changes to the original weren’t reflected in the remote copy and at least one version was destined to be lost forever.

Software packages such as OneDrive allow the entire team to work on a single centralized file saved to the cloud. Whether you edit on a beach, plane, or train; your team in the office gets the same version you do, at the same time.

Collaborative Working

The key to remote working is the ability to collaborate in a digital space with everyone at once. Modern software such as Office 365 allows all team members to be working on a single document at the same time.

Whether the project calls for killer spreadsheets, expertly crafted documentation, or a knockout presentation; everyone can pull together and hit it out of the park.

Even when you’re not working out of the office or busy on the road, collaborative software can help to power your team working locally too.

Admin Done Remotely

Modern software has impacted the way in which we do bookkeeping and accounts too.

Similar to being tied to your desk in years gone past; accounting software was once stuck solidly in the desktop too. Previously, batch runs of calculations were required to provide reports on a weekly, bi-weekly, or monthly basis. Today, cloud computing has opened up ways to speed up business in ways we couldn’t have imagined.

Cloud-based accounting packages such as Xero or Quickbooks Online allow for your accounts to be done remotely. Moving the resource and strain out of your firm takes it out of sight and out of mind.

Security and maintenance of your accounts databases, for example, falls to cloud professionals instead of your business. Rather than waste company time on submitting documents and calculating taxes they are done in the cloud and submitted to you instead.

Make your Accounts Work for You

Maintaining your accounts is made as simple as logging into a single portal. This tool allows you to take both your admin and your work out of the office and keep it on the go.

By the time your accounts are due, your accountant simply has to log in remotely and pick up where you left off. By the time taxes are due the work is done and you can get on with the important things.

Getting work done out of the office and on the go is a huge boost to productivity. Modern technology enables you to keep team members up to speed, continue collaborating, and even stay on top of your accounts from anywhere in the world.

Give us a call today at (416) 645-2469, (905) 667-0441 or email us  to talk about how we can help you unwire from the office.

5 Red Flags of Phishing Emails: Think Before You Click

5 Red Flags of Phishing Emails: Think Before You ClickA single click can be the difference between maintaining data security and suffering massive financial losses. From the moment just one employee takes the bait in a phishing email, your business is vulnerable to data breaches and extensive downtime.

Quickly spot the red flags and put phishing emails where they belong:

1. Poor spelling and grammar While occasional typos happen to even the best of us, an email filled with errors is a clear warning sign. Most companies push their campaigns through multiple review stages where errors are blitzed and language is refined. Unlikely errors throughout the entire message indicate that the same level of care was not taken, and therefore the message is likely fraudulent.

2. An offer too good to be true Free items or a lottery win sure sound great, but when the offer comes out of nowhere and with no catch? There’s definitely cause for concern. Take care not to get carried away and click without investigating deeper.

3. Random sender who knows too much Phishing has advanced in recent years to include ‘spear phishing’, which is an email or offer designed especially for your business. Culprits take details from your public channels, such as a recent function or award, and then use it against you. The only clues? The sender is unknown – they weren’t at the event or involved in any way. Take a moment to see if their story checks out.

4. The URL or email address is not quite right One of the most effective techniques used in phishing emails is to use domains which sound almost right. For example, [microsoft.info.com] or [pay-pal.com] Hover over the link with your mouse and review where it will take you. If it doesn’t look right, or is completely different from the link text, send that email to the bin.

5. It asks for personal, financial or business details Alarm bells should ring when a message contains a request for personal, business or financial information. If you believe there may be a genuine issue, you can initiate a check using established, trusted channels.

While education is the best way to ensure phishing emails are unsuccessful, a robust spam filter and solid anti-virus system provide peace of mind that your business has the best protection available.

Give us a call at (416) 645-2469, (905) 667-0441 or email us to discuss how we can secure your system against costly phishing attacks.

 

Marriott Hotels Exposed 500 Million Customer Records. Make Sure Your Business Doesn’t Suffer the Same Fate.

Up to 500 million travelers could be compromised as hotel chain Marriott International have announced a security breach in their guest database. Analysts recently alerted the firm to a vulnerability that has granted hackers access to the hotel chain’s systems since 2014.

The firm announced their Starwood Preferred Guest (SPG) loyalty program was compromised for an extended period which left customers vulnerable. The exploit exposed critical guest information which included names, addresses, passport numbers, and dates of birth. Marriott also announced an unknown number of customers had encrypted credit card details stolen in the attack.

If you have been a member of Marriott’s Preferred Guest Program or a customer of Marriott hotels in the past, you should take steps today to ensure your data security. By doing so, you can protect your finances, prevent identity theft, and defend your data from attackers looking to exploit an opportunity.

Secure Your Data

Changing your Marriott password should, of course, be the first step to protecting your accounts. Even more importantly, sites where that same password may have been reused should be updated with new credentials too. Hackers commonly try details stolen from one site to access popular services and pages. We encourage everyone to use a password manager to store their details for safe use in the future. A good password manager enables unique, random, and strong passwords to be used with ease for every single website.

While we can’t stop hacks on systems outside of our control; we can defend our other accounts from being accessed by criminals.

With secure password management, attacks on your business services or related accounts from a single hack are made impossible.

Performing Damage Control

The damage to the Marriott International brand following news of the leak will be undoubtedly huge. At a minimum, they have lost the trust of their customers worldwide. Asking customers to leave their personal and financial details again to pay for goods and services will be no small feat.

News of the hack made front page news as it broke, further damaging the firm’s reputation among potential future customers too. As a result of a simple security attack, Marriott International will be forced into damage limitation to keep customers returning to the brand. This is why business security matters to us; when done right it’s cheaper by far.

The total cost of this latest attack won’t be known for years to come. The firm is vulnerable to lawsuits worldwide, in some cases liable for financial losses, and required to purchase identity monitoring and security services for affected customers. Business owners can learn from Marriott’s costly lesson.

Stopping an Attack in its Tracks

Marriott’s security breach was recently discovered, hitting the headlines just this week, but the firm admitted unauthorized access took place since 2014. This means the firm had a security hole for four years that they were unable to detect or patch.

For a firm of any size, this should be unacceptable. As business owners, we shouldn’t accept security vulnerabilities that leave our records, finances, or services open to hackers. As customers, we shouldn’t accept our data being treated so carelessly. The recent Marriott hack underlines the need for businesses to maintain constant network monitoring, regular security updates, and a lockdown on data access.

Protect Your Business and your Customers – Any business can find their systems vulnerable to attack at some point. Whether waiting for updates, a newly released zero-day hack, or malicious employee; responsible firms take steps to limit their liability.

As a rule, staff accounts should be locked to only the systems the regularly need to access. Similarly, customer data should only be open on an as-needed basis when a legitimate requirement exists. These steps, alongside systems and data monitoring, prevent a small-scale attack resulting in an enormous data breach. Strong security enables customers to place and maintain their trust in a brand they can keep coming back to again and again.

If your business could use a security update to protect against a Marriott style attack in the future, give us a call today at (416) 645-2469, (905) 667-0441 or email us.

Should You Pay for a Ransomware Attack?

Should You Pay for a Ransomware Attack?Getting hit with a ransomware attack is never fun, your files get encrypted by cybercriminals and you’re left having to decide: should we pay to get them back? It’s a scene that’s played out across the world with 70% of businesses saying ‘yes’ in 2016 alone. Here’s what you should consider if you’re ever in this situation.

Do you trust them?

Besides the fact that they’re criminals holding your data hostage, how confident are you that they’ll send the decryption key? Most attackers demand you send the payment via untraceable Bitcoin, so you have no recourse if they take it and run. You’re also equally trapped if they decide they asked too little and come back with increasingly higher demands. If they do send the decryption key, be aware they still have access to your systems and can hit you again at any time until your network is disinfected by experts. Businesses don’t exactly want their breach publicized either, so many don’t admit to paying the ransom, whether it went to plan or otherwise.

Can you manage the impact?

Best case scenario, you can wipe the affected drives and restore from a clean backup without paying the ransom. You might even decide the encrypted files aren’t that important and simply let them go, or even wipe a whole laptop or workstation. On the other hand, if your data management comes under any special regulations, like health or legal, you may find the attack has a much wider, more intense impact. The attacker will usually give you a countdown to motivate a payment, with a threat of deletion when it hits zero. If the data isn’t that valuable, or you have confirmed backups, this urgency has no effect. There are also new types of ransomware like KillDisk which can permanently wipe your entire hard drive or even network.

How much do they want?

Cybercriminals rarely send out global attacks with set amounts, instead, they prefer to customize the ransom based on how much they think you can pay. Large corporations and hospitals are hit with very high demands, while small business demands are more modest. They may be criminals, but they’re smart people who know your financial limits. They’ll also consider how much similar businesses have paid and how quickly, then expect you to follow suit.

Are your backups good?

Many businesses are discovering too late that their backup systems aren’t robust enough to withstand this type of attack. Either they’ve become infected too, they weren’t up-to-date or they backed up the wrong data. It’s worth doing some quick checks on your backup processes as even if you have to take the system down for a day as you recover, you’re still light years ahead of those without them.

What’s your policy?

More and more often, businesses are adding ransomware to their disaster recovery plans and having predefined actions mapped out. Seemingly simple inclusions like who has final say over the payment decision can stop chaos in its tracks. Employees and management alike can then approach the situation calmly, ready to make the best decisions for the business.

Stay safe in the first place

Ransomware is showing no signs of slowing down. As more businesses keep them funded the cybercriminals are steadily launching new attacks and making it their full-time job. Most attacks come via phishing emails – those emails that trick employees into clicking a link – and they can be extremely convincing. While training helps people spot them, it’s no guarantee. We recommend using business-class spam filters to catch these types of emails before they land in your employee inboxes so that triggering a ransomware attack becomes something that happens to other businesses, not yours.

Secure your data systems now, we can help! Call us at (416) 645-2469, (905) 667-0441 or email us.

How to Get the Right Tech for Your New Business

How to Get the Right Tech for Your New BusinessCongratulations on your new business! Start-up costs can easily escalate, and tech is often one of the bigger expenses. It’s not that everything is high priced, but the sheer number of technologies available can overwhelm smart decision making. The latest tech is dangled in front of you with amazing features you didn’t know you needed, and suddenly your budget has gone boom!

Here’s how to get the tech right for your business, without the headache and drama.

1. Check if you actually need it

In a lot of cases, using a cloud application means you can skip the big server purchase, along with the on-site technician to manage it. Many of your business programs will have a cloud option that allows you to get all the benefits without the big expense. Before you make the tech purchase, work out which applications you’ll be running and whether a local installation or cloud access is preferred. As part of this stage, think about how you’d like to use the applications – perhaps remote access is a priority, or perhaps collaboration will underpin your business culture. This level of clarity is often overlooked and the number 1 reason why tech expenses spiral.

2. Get expert advice

It’s easy to ask friends and family what to buy, but there are many more factors to consider than just their personal preference. You trust their opinion, of course, but they may be speaking from a consumer perspective or basing their recommendation on brand loyalty. Every business is different and pairing the correct technology with the business will save you a lot of money in the long run.

3. Buy business grade

Unfortunately, the computers and laptops you see in department stores aren’t up to business standard. They’re designed for home users to perform quick tasks, not run a full 8 hour (or more) workload. Business grade systems have additional features that your business needs, plus longer warranties and better support. Even the attached devices like networking or printers are built to a higher standard, to last longer and perform better. Considering the cyber climate we live in, taking a special interest in the security offered by the business grade technology is a wise decision.

4. Prioritize flexibility

Businesses evolve rapidly during their first few years and the last thing you want to do is go out and buy new tech, playing catch-up with your vision and smushing together an assorted mismatch of devices. Your new technology should be as scalable as your business, which means making purchase decisions based on strategy, not price. Perhaps this means instead of workstations for employees, you only need tablets. Rather than having a fixed point of sale system, you might choose mobile checkout devices so your staff can assist customers on the go. These examples highlight how easy it is to commit to certain tech because it’s ‘what you do’ but later discover you’re locked into a certain way of doing business. Trying to change your processes down the line impacts productivity, efficiency and culture in a big way, so we recommend buying with your future success in mind.

5. Choose an IT partner

During your set up and moving ahead through growth, you’ll need an IT partner who can not only help with your purchase strategy but support you through any tech problems as they arise. That’s the difference between a partner and a supplier, they’re committed to driving long-term business success.

You’ll be able to call on your partner and know they’re immediately up to speed with your business, they know how IT can help leverage your competitive advantage and which critical systems they should focus on. Getting good tech in place shouldn’t be seen as just an expense. It improves productivity and allows you to serve your customers better while enjoying consistent growth.

If you need an IT partner to help your business grow, give us a call at (416) 645-2469, (905) 667-0441 or email us.

Is A Slow Network Getting in The Way of Your Business?

Is A Slow Network Getting in The Way of Your Business?Very few things in life are as intensely frustrating as slow network speeds. Whether accessing a shared database, sharing files between computers, or sending a file to print; waiting for transfers can seem to take an eternity. Worse still, these business breaks can keep both clients and staff waiting and get in the way of the productive business day.

Every time you save or retrieve files from another computer or network storage device, file transfers have to be made over the network. Depending on your IT setup files can pour over the network with the ferocity of a fire hose, or trickle between machines as if dripping through a drinking straw. Poor network speeds are often a critical bottleneck that slows down the entire IT system. If a slow, frustrating, and unreliable network sounds like your office setup then there are many available solutions we can use to help.

Often, offices maintain networking hardware that is as old as the premises they are in or the businesses themselves. Components can be left in place long after their suggested expiration date. If it isn’t broken, don’t fix it commonly rules as long as some working connection, however slow, still remains.

Yet, outdated hardware in key areas can often slow the entire system down. Even when the rest of the network is capable of ultra-high speeds, a single bad component can bring the entire network to a crawl. Sometimes if it isn’t broke, it still might not be working to its full potential. Even peripheral devices throughout the network can cause traffic to slow. A badly installed device may become lost from the network or send out an overwhelming number of messages that spoils network traffic. Defense against errors and vulnerabilities is more simple than many think. Often just one or two small upgrades is all that is needed to unlock the full speed potential of the network.

For some businesses adding a dedicated server is an ideal solution that can balance the IT workload. Access to centrally shared resources often benefits the entire organization by eliminating redundancy. A network server is built with efficiency and reliability in mind to keep your business running at full capacity. By pooling resources for everyone to use, work is evenly shared and centrally available to prevent bottlenecks in the system. Reduced network loads, improved efficiency, and faster transfer speeds mean that higher productivity becomes the new normal.

Moving resources outside of the office can work for many businesses too. Where high speed, low-cost internet services are available, moving your work into the cloud can be a highly cost-effective solution. Software packages such as Quickbooks offer finance and accounting packages for operating in the cloud. Similar Suites such as Microsoft Office offers services for creating and sharing documents with cloud resources. Both packages eliminate the need for many of the network operations that we use every day.

For many applications such as Quickbooks huge databases sometimes gigabytes in size are required. It is these types of applications where the advantage of the cloud becomes clear. To use this locally, huge database transfers keep the application up-to-date daily.

These transfers across a local network are time-consuming and clog up vital resources for the firm. Yet, the same application in the cloud requires only a simple web page for each user. Instantly, looking up finances and editing documents becomes as simple as checking your email. With services moved to the cloud purchase cost and maintenance of expensive network hardware are reduced too.

A complete network solution that works to make the most out of all the available resources is unique to every business. Only a tailored solution to address your network needs will increase your productivity.

If your IT is starting to get in the way of your business and your network is running too slow, give us call at (416) 645-2469, (905) 667-0441 or email us and we’ll see what we can do.

Increase Your Productivity with Dual Monitors

Conventional wisdom states that cluttered workspaces lead to a disorganized mind. Mess prevents productivity and begins to hamper professionalism. Shouldn’t that apply to the computer desktop too?

The simplest way to clean and organize your digital desktop is to add more space. Just adding a second screen doubles the available room and makes organization a breeze.

Getting work done with a single-monitor setup is a balance of poor compromises. There never seems to be enough space and the little space available is full of clutter and mess. Switching between windows or tabs wastes time and distracts from work to be done. Stacking windows together, side-by-side, or top and bottom wastes valuable screen real estate. The resulting clutter of windows makes it hard to focus on what is important.

While most tasks can be tackled feasibly with a single monitor; two makes the same tasks faster, simpler, and much more enjoyable.

Increase Your Productivity with Dual MonitorsTwo Monitors, Many Uses

Data entry with two monitors is far easier than data entry with one. Having source data on one screen, laid out in large type, and the destination on another makes the job a breeze. By eliminating the need to scroll tiny windows or switch tabs, forget and repeat; the same job can be done in a fraction of the time.

Graphic design, image manipulation, and editing are key areas that make the most of a dual screen setup.

Stacking one image on each screen allows you to make quick comparisons to make sure your work is going in the right direction. Organizing your editing space is made simple too. Stacking your tools, menus, and options on one monitor with your image maximized on the other helps to stay focused and finish the task.

Beyond Just Two

Having more than a single screen helps you to track tasks you need to keep on the back burner. A team chat window to keep on top of collaboration, status updates for business-critical services, or the latest stock price. These windows and dialogues can remain open and serving updates on a secondary screen while you keep your work focused on your first.

It is not uncommon for stock traders or financial analysts to maintain 6 or more screens running from a single computer. Many uses this to track various stocks or indices so they don’t miss a beat.

Setup How You Like It

Multiple monitors can be arranged in almost any practical configuration imaginable. While traditionally positioned in landscape orientation, second, third, or fourth monitors are often rotated 90 degrees to portrait orientation.

This setup is used often by software engineers, editors, and users reviewing large amounts of text. The lengthwise orientation allows multiple pages to be read from the screen at any one time.

Multi-screen setups, no matter how they are arranged, behave the same as if all the monitors were just a single screen. Mouse input moves from one monitor to another as if there was no difference between them. From the user’s perspective, there is no difference to how they interact at all.

A Boost to Productivity

There is a scientific advantage to multi-monitor setups too. A survey by Jon Peddie research found that adding an extra monitor boosted a user’s output by as much as 20 to 30 percent.

A productivity advantage of even 10 percent is prized and very hard to come by in the business world. Receiving a productivity reward of over 20 percent for just the cost of adding a second monitor is something few firms can afford to pass up.

The satisfaction of de-cluttering your digital desktop and keeping your focus in the zone is worth it alone.

Give us a call at (416) 645-2469, (905) 667-0441 or email us if you would like us to boost your setup by adding a second monitor.

Can Private Browsing Protect You Online?

Maintaining your privacy while using the internet has become more challenging over the years. The recent Facebook privacy scandal made that abundantly clear, with users shocked at how much information had been recorded about them. While it’s almost impossible to enjoy the internet and leave zero digital footprints, there are things you can do to hide your online activities – some more effective than others.

1. Get a virtual private network (VPN) VPNs aren’t just for business and downloaders now, they’ve gone mainstream. Once set up, it creates an encrypted connection from your computer to the VPN providers computer. The other computer could be in another city or another country. When you visit a website, it can only see the VPN computer – not yours. You essentially run around the internet pretending to be another computer, in another location. Since your connection is encrypted, even your ISP can’t see what you’re doing online, making your usage anonymous.

The downsides: Because your internet usage has to route through another computer first, your browsing and download speed could be affected. They can be tricky to set up and not all VPNs offer the same privacy levels (the better ones tend to be more expensive). Some websites may even block visits from people using VPNs, so you may end up switching it on/off as required.

2. Go incognito Most browsers have a private browsing mode, each called something different. For example, Google Chrome calls it ‘incognito’, Microsoft calls it ‘InPrivate’. Before you take the name at face value, it’s a good idea to talk about how they define ‘private’. Unlike a VPN where you can dance around the internet anonymously, private browsing simply means it won’t show up in your browser history, or what you entered into forms. This feature is free, so you always have the option to use it, and it’s actually more helpful than you might think. Common uses include price shopping to reset sale timers and access local-only pricing and overriding usage limits on certain sites. Some sites use cookies to control your free trials and private browsing can help you get around that. For example, some news sites limit you to 5 free articles a month unless you pay. Private browsing can extend that trial quite easily!

The downsides: It can’t pre-fill saved passwords and it won’t help you type in the website name even if you’ve been there before.

3. Think about who’s watching While you might be naturally careful when using a public computer have you thought about who’s watching what you do on your work computer? Some workplaces have employee monitoring software that tracks all sorts of data, including taking screenshots of your desktop. It helps them create rules about computer usage but it may also provide them with evidence you’ve been breaking those rules. Stepping out to the internet cafe can be even more risky, as people can install keyloggers that record every keystroke, including your credit card numbers and logins. You’ll never know your activities are being recorded, even if you use private browsing.

The downsides: None. Awareness of the risks and the possibility of being watched ensures you’re more likely to use the internet safely.

While private browsing can help keep your internet usage under wraps, it’s not a magic bullet to cover all possibilities. Many people believe they’re invisible AND invulnerable while private browsing, a mistake they end up paying for. You’ll still need solid anti-virus and password habits to protect against threat, and to be a smart internet user who avoids suspect websites. Consider the options above as privacy-enhancing measures, not one-stop solutions.

Need help with your online privacy? Give us a call at (416) 645-2469, (905) 667-0441 or email us.

Protect Your Firm Against Zero-Day Attacks

Protecting your business against the latest IT threats should always be a top priority. Updating antivirus and patching your operating system is a great way to start. What happens, however, when a threat appears at your door before security firms have had a chance to catch it?

Protect Your Firm Against Zero-Day AttacksA security threat that exploits a previously undiscovered vulnerability in the computer is known as a zero-day threat. The name “zero-day” is designed to imply how long since the vulnerability was discovered. The term also indicates that system developers have had zero days to fix it.

A newly discovered attack might be packaged into a computer virus or worm. This will allow it to spread far and wide while inflicting the maximum amount of damage possible. When spread successfully, a new exploit has the potential to reach hundreds of thousands of computers before an operating system or anti-virus update can even be issued.

There are a number of ways we can protect your business or lessen the damage from a zero-day attack.

Preventative security

The number one way to mitigate the damage from any attack to your system is to prevent it from happening in the first place. Maintaining a good firewall and up-to-date antivirus is the best step you can take to ensure the security of your system.

A firewall, monitoring traffic in and out of your network, reduces unauthorised entry over the network. Even without knowing the exact nature of the attack, suspicious activity travelling in and out of the system can be stopped.

The same is true of modern Antivirus. Even when it can not identify the specific zero-day threat from its virus database; it can often identify malicious intent from learned behaviour in the system.

A Locked Down Network

Should a zero-day threat make it into your network, our next goal should be to limit its effects. By restricting user access to only essential files and systems we can limit the damage done to the smallest number of systems. Good security policy dictates that each account should only have full access to the systems needed to complete the user’s job. For example, users from the accounts department shouldn’t have access to sales department databases.

In this way, the damage of a single compromised account is limited to only the network area it operates in. Such limited impact should be easy to control and can be reversed with regular backups.

Good Data backup

Whether your entire network has been exploited or only a small area has been affected; good data backups are your protection against major lasting damage. Having a good backup means having the procedures in place to both create regular backup copies and make sure they can be restored at a later date.

Reliable and well-tested backups are worth their weight in gold. Knowing your data is safe and your system can be recovered is peace of mind against even the most highly destructive zero-day attacks.

Intrusion Protection

While the precise methods of a zero-day exploit can’t be known in advance, a network intrusion protection system (NIPS) can monitor the firms’ network for unusual activity.

The advantage of NIPS over a traditional antivirus only system is it does not rely on checking software against a known database of threats. This means it does not need updates or patches to learn about the latest attacks. NIPS works by monitoring the day-to-day patterns of network activity across the network.

When traffic or events far out of the ordinary are detected action can be taken to alert system administrators and lock down the firewall. Devices such as USB drives and mobile devices can all introduce threats to the network. They can often make it past the firewall because they are physically introduced to the system.

NIPS protects against threats introduced to the network from both external and internal sources.

Full Cover Protection

Used in combination these techniques can prevent, protect, and mitigate against the kinds of threats that even the top security firms haven’t patched yet. We think it’s important to keep your firm secure whatever it might come up against in the future.

If you could use help protecting your business against online threats, give us a call today at (416) 645-2469, (905) 667-0441 or email us.

4 Ways to Avoid IT Downtime

4 Ways to Avoid IT DowntimeTechnology is a wonderful addition to every business, but what happens when the IT goes down? All those things you do now that were completely unthinkable 30 years ago have become part of your day-to-day processes. It lets you compete with big business and connect with customers from far away, boost productivity and efficiency like never before, and even added multiple zeros to your bottom line. IT is a necessity. Unfortunately, this means when downtime inevitably hits, you’ve got a BIG problem.

Maybe it’s from a virus attack, a bug in the system, hardware failure or something else…whatever the cause, the impact is real and measurable. Gartner (an IT research company) reports that 43% of small businesses close their doors right after a major data loss, and only a tiny 6% survive long term. The financial cost of each hour can be in the thousands, and the damage to your brand could be ruinous. Fortunately, while downtime will occasionally strike every business, there are things you can do to minimize the duration and frequency.

Taking a few simple actions now may result in your business staying open while your competitor gives up.

Use monitored antivirus and firewalls

While most businesses have these protections, not all have embraced the idea of monitored antivirus and firewalls. Instead, the default setup has more in common with a home setup than a robust professional system. Given that SMB are a primary target for malware and cyber-attack, you should seriously consider moving to the monitored versions. Our experts set up custom protection to block all attacks, both known and emerging. All updates are taken care of, plus company-wide protections applied so users can’t accidentally infect the network. When something doesn’t look quite right, our monitors take immediate action to protect your business.

Have backups you can count on

A great backup can not only protect you from digital threats like viruses and ransomware, they protect against physical threats like robbery, fire or natural disasters. The last thing you want is for your business to be crippled by data loss. A robust backup system can be as simple as asking our Managed Services team to take care of it, or if you have an on-site technician, using the rule of 3: one backup on the server, one unplugged from the server, and one off-site. If anything ever goes wrong, you’ll be able to pull up the most recent backup and continue as normal. Businesses without good backups tend to be down or limping along for days, if not weeks.

Plan for disaster

Nobody likes to think about their business flooding or being hit with ransomware, but would your employees know what to do if something happened? Having a comprehensive Disaster Recovery Plan helps you get up and running quicker, minimizing downtime. Everyone knows what steps to take, who to tell, who should be doing what, and which systems take priority.

Monitor hardware for early signs

Computer hardware is like any piece of equipment – when it’s getting old or cranky, it will let you know! This could be anything from making noises, being louder or slower than normal, or even system crashes. Each symptom is your early warning system that allows you to take action before a crash that sends everything into downtime. Our hardware monitoring service runs in the background and tracks various metrics to predict time until failure. If the signs point to imminent failure, we’ll let you know and can often repair/replace the affected hardware with little or no downtime.

Downtime is an unavoidable part of any tech-enabled business, but your preparation can dictate whether it goes for one minute or one week and how often it happens. According to one study, most firms experience 43 hours average downtime per year, a number much too high for comfort. While scheduled downtime can sometimes be unavoidable, your business will appreciate being able to skip the panic of surprise downtime events. Reducing your risk is the best action you can take, making downtime a truly rare occasion. Even better, our Managed Services can take care of this for you, stopping many downtime-events before they occur.

Talk to us about minimizing your downtime. Call us at (416) 645-2469, (905) 667-0441 or email us.