Recovery Test Your Data Backups

Most businesses are aware of the need for data backup. Without it they risk losing important files in the event of a hard drive failure or cyberattack. Yet having a backup in place isn’t enough: it’s important also to test that backup. Ensure that you are able to restore that essential data when you need it.

The many reasons to establish data backups include:

  • protecting against natural or man-made disasters (including hacker or insider attack);
  • ensuring compliance with tax, financial, and other industry standards;
  • preserving relationships with clients;
  • reducing downtime;
  • improving productivity;
  • establishing credibility with customers, investors, and employees.

We recommend backing up in three places. You might have one on a local, on-site computer. You’d also have a backup on a remote device and another in the cloud. The cloud option gives you the most flexibility. It can be accessed from anywhere, regardless of conditions in your particular environment.

Yet while many people know they need backups, too few do recovery tests. The worst time to find out there’s a problem with your backup solution is when you need it the most.

Testing Data Backups

Regular data backups can offer peace of mind, but you’ll really know you are ready to go if you regularly test your ability to recover your system from a backup.

Testing your backup lets you verify the necessary data is available for recovery. Plus, testing helps you learn how to actually implement recovery following a data loss. If a backup test fails, you can take the steps needed to ensure you don’t actually lose valuable information. Otherwise, you’re throwing money at storage space and backup services that are no help, and you’ll find out too late.

Regular monitoring helps you keep track of any software or hardware changes that may have an impact on data backups. Via testing, you might also learn some staff members are storing data somewhere that isn’t being backed up, and you can now intervene with those employees or extend your backup protocols to prevent that data getting lost.

Scheduling data backup tests can also help you to identify a misconfiguration in the backup software or ways in which you’re not adequately addressing your backup needs. For instance, you might not have set up a complete backup in the first place. This might mean you’re backing up the data but not the settings. Most backup software will send error messages if there was an issue backing up. Still, they’re easy for an overworked IT team to miss.

Actively testing backups allows the business to confirm fallback data accuracy and effectiveness. Additionally, you’ll be able to gauge:

  • how long it takes to perform the backup;
  • any issues that arise during recovery;
  • what steps need to be taken to address those problems.

All of this is something you want to consider proactively. Some people say they work best under pressure, but most of us think more clearly and perform better if not in the midst of a data catastrophe.

A managed service provider can help your business with data backup and recovery testing. Our IT experts can monitor for failures and make any changes needed to get the backup running properly again. You’ll be glad you did recovery testing in advance when things run smoother and quicker in the midst of your disaster recovery.

Give us a call at  (416) 645-2469 or (905) 667-0441 or email us to correct your backups, make sure they are working the way you want to, and set up regular backup restore tests.

Want to be notified when our next blog is posted, sign up here.

Keep Your Business Continuity Plans Current

Is there one thing we can count on now with COVID-19? The situation can change in an instant. You may have been confident in your business continuity plans in the past, but the pandemic has shaken us all up. It’s a solid reminder to review our plans to get back to business quickly and seamlessly.

A good business continuity plan ensures maintained operations before and during unexpected disruptions. Generally, decision-makers strategize in advance to ride out:

  • natural disasters
  • man-made disasters
  • national emergencies
  • utility failures
  • sabotage
  • data breaches or cybersecurity attack
  • theft

These could impact a system or network or prevent you accessing your location to get to your computers and important data.

Now, we also know that we should prepare for the effects of an international health pandemic!

Such business-centric planning considers all necessary elements of staying on track. You’ll look at physical premises and staffing, and hardware and software requirements.

Preparing for the Unexpected

A business continuity plan tries to anticipate the worst that could happen. The problem is that we can never know what the next bad thing might be.

You may not ever need to use your plan, but taking a “these things happen to other businesses” point of view could leave you in a serious lurch.

The COVID-19 crisis has also made things real for many businesses. Governments required organizations across industries, regardless of size, to migrate to remote work. Companies with business continuity plans in place responded with greater agility, whereas others were left scrambling.

Now, many countries are beginning to slowly reopen for business. Sure, there are constraints, but the idea is to get the global economy up and running. While you’re adapting, take some time to revise your business continuity plan.

It’s better to get your decision-makers around a table (or in a virtual meeting) now, while things are calmer. Most people think more clearly when not in the midst of a crisis. So, be proactive. Plan now for the worst. You can weigh up options at leisure, pursuing many different what ifs to determine the best plan of attack.

Look back at what worked and what didn’t during the COVID-19-related disruptions. This review can provide real insight into opportunities, and you’ll be even better prepared in the future.

Planning with an MSP Partner

Business continuity plans lay out how the business will move forward amidst disruption. Work with a managed services provider (MSP) to ensure your planning is comprehensive. CPI Networks can help enable remote work, set up data protection, and develop a backup setup.

Give us a call at (416) 645-2469 or (905) 667-0441 or email us today! Put a business continuity plan in place, and be more confident you’re ready for whatever happens next.

Want to be notified when our next blog is posted, sign up here. 

Pros and Cons of All-In-One Computers

Today, business is all about streamlining and finding efficiencies. And that even extends to embracing all-in-one computers. Users get a desktop computer that integrates monitor, processing, and ports in one. Still, there are pros and cons to consider.

Apple iMacs were the first all-in-one computers to gain popularity, but you can now find many different brands of all-in-one desktop. Promising all the computing power you need built into the monitor, these are easy to set up and get running. Their sleek design can also include webcams and speakers as part of the desktop. The user needs only to add a mouse and keyboard.

Furthermore, buying a computer with all its components included can be more cost effective, whereas buying each part separately adds up.

The all-in-one computer is great for an office environment that is low on space. These compact computers with fewer wires and less stuff to connect can look great in open-plan offices. All-in-one computers are also easier to move around flexible, collaborative work areas.

Upgrading all-in-one computers

There are some challenges with all-in-one computers, however. For instance, upgrading may be more difficult. You may be able to upgrade the random access memory (RAM), and replace and repair hard disk drives (HDDs), but otherwise, when you outgrow the computer, you’ll need to replace the entire machine.

You also get what you pay for with an all-in-one computer. If you go with a low- to mid-priced device, you basically get a laptop on a stick. The components used to build that desktop are often the same as you would find in a laptop. So, depending on what your computer needs are, you may want to invest in a higher-priced all-in-one or consider the component parts alternative.

Still, all-in-one computers are a good option for offices that want more flexibility. Of course, laptops are best when you want to be able to move easily between locations, but for agility within the office environment, an all-in-one is a convenient choice.

Buying all-in-one computers also allows users to enjoy business-wide consistency. Users keep traditional functionality but in a neat machine that makes a smaller footprint in their workspaces.

Considering your options for business computers? A managed service provider can help you select the best solution. Our experts learn your needs and recommend a fit for your business budget and processes.

We can also set up the new computers and ensure your system network is secure. Let us focus on IT while you focus on growing your business. Call us today at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

Backup Your Apple Computer

There are many moments in life when we would like to travel through time. One common instance is when an important document disappears from our computer screen. Making things worse, we forgot to save it! That’s hours of work lost. Fortunately, Apple users have Time Machine’s built-in backup feature for added protection.

This software automatically backs up apps, music, photos, email, documents, and system files. You can backup to:

  • external storage devices;
  • another Mac set up as a backup destination;
  • network-attached storage (NAS).

It’s simple. Connect your Mac to an external drive, then Open Time Machine to select your backup destination. You can select when backups happen and what gets backed up, and you’ll also have the option of encrypting your backup, which is a good idea.

Time Machine keeps hourly backups for 24 hours, daily backups for a month, and weekly backups for previous months until full. The oldest backups get deleted when space is needed.

All you need to do to restore your original files is turn on and connect the Time Machine backup disk. Then, you can use the timeline on the Time Machine screen to find the items to restore.

We recommend all Mac users set up Time Machine to backup to at least an external drive, and Apple makes it easy to setup this minimum level of backup. With the local device, you’ll have a first line of defense close at hand if you need to recover or restore your computer.

However, this basic backup does limit your options. To amplify your protection, consider these alternatives.

Gaining More Control of Your Backup

Third-party software offers additional layers of protection. You gain detailed control of what is backed up and when, and what happens afterwards (perhaps you’ll want the software to eject the external device or shut down). You can also find software that backups operating systems and settings too. This could prove useful if your Mac gets stolen or damaged. You’ll be able to move to another device and quickly get all your data and applications configured as they were.

Another alternative for enhanced backup is the cloud. Time Machine and third-party software solutions require a local device to hold the backup. But if your computer is stolen, the thief is likely to have taken your backup too. Or, if your laptop is damaged in a flood or fire, the backup is probably also destroyed.

You’re also at risk of ransomware with Time Machine and third-party software. If malicious software compromises a device (yes, Macs are vulnerable too), it’s going to spread to connected or networked devices. So, the USB backup drive or NAS is as susceptible to encryption as the main Mac device.

Cloud backup provides a solution that helps avoid all these issues. Your backup data is stored in a datacenter that the thief, fire, flood, or ransomware can’t touch. Most cloud backup providers boast rigorous security protocols.

Eventually, all hard drives will fail. Backing up important data to one device leaves you at risk of a single point of failure. Cloud backup removes the fear that the one backup drive isn’t going to be working when you need it.

Need help setting up Time Machine, a third-party backup, or configuring your cloud backup? Let our computer experts help! We don’t want anyone to go without the safety and security of a reliable backup.

Contact us at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

3 Cyberattackers Putting Business at Risk

Cyberattacks and data breaches happen worldwide, and no one is immune. Your business needs to protect its networks and systems, and secure sensitive data. But how much do you know about the types of cybercriminal out there. This roundup discusses the biggest threats and what they’re after.

Cybercrime Gangs

Online crime is a lucrative industry. Cybergangs go online to offer “crime as a service.” Their targets vary and can be spread out globally. In 2019, one international crime gang stole $100 million from more than 40,000 victims. Culprits were found in the US, Bulgaria, Germany, Georgia, Moldova, and Ukraine. Victims included small businesses, law firms, international corporations, and nonprofits.

Many of these bad guys may have started out in the digital environment, but well-established street gangs are turning their attention to cybercrime too.

Typically well-funded and organized, cybergangs work long-term to mount large-scale attacks. They target banks, law firms, healthcare networks, and other big businesses.

Still, small businesses can be targeted by cybercrime gangs. You could be the first domino to compromise a larger, more lucrative target in your supply chain.

State-based Actors

One nation pays an individual or group to target another country. On the digital battlefield this could mean:

  • tampering with an election;
  • infiltrating another country’s banking system;
  • compromising critical infrastructure;
  • accessing intelligence;
  • creating incidents of international significance;
  • engaging in propaganda, disinformation campaigns;

Australia recently announced a “sophisticated state-based cyberattack” on political and private-sector organizations.

State actors also used cyber techniques to damage Iran’s nuclear program. They left an infected thumb drive in the parking lot. A well-meaning staffer found the USB and plugged it into the facility computers. The virus caused Iran’s fast-spinning centrifuges to go into overdrive.

These attackers are often motivated by nationalism, but this doesn’t mean businesses are safe. A politically motivated cyber actor might target a hotel hosting an international convention or gain access to a government vendor to send false communications.

Lone Wolf

Also known as disorganized crime, this is the online equivalent of a petty thief. Many make their income stealing money from low-hanging targets.

Some Lone Wolves are only interested in proof-of-concept: hacking into businesses and governments to see if it’s possible, without doing any damage once they are inside.

Now that you better understand why your business might be targeted, it’s time to take the necessary steps. We can help solidify your cybersecurity stance. Partner with a managed service provider. Our experts can set up email security, remote access management, anti-malware scanning, and more. Contact us today at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

Your Webcam Could Be Spying On You

In the midst of a global lockdown, many of us have been relying on webcams to stay connected. These cameras let us join virtual meetings for work and online hangouts with friends. But bad actors can also use a webcam to spy.

Someone watching through a small laptop or personal computer camera may sound farfetched. And if you don’t make a hat out of tinfoil, aliens will take over your brain, right?

Except, it is true that webcams can be used for spying.

Seeing someone with a piece of tape over their webcam isn’t that unusual. Even Facebook’s founder does it. At conferences now, you might even receive a branded sliding webcam cover as swag.

How Webcam Spying Works

How can someone access your webcam in the first place? Typically, they’ve installed malware. The malicious software allows them to remotely control your computer and view its webcam.

A cybercriminal might access your webcam using spy software, a remote access trojan (RAT). The software spreads through freeware, spam emails, infected attachments, or fake website links.

The software allows the remote user to take control of your computer. They could view your online activity, read messages, or capture screens and keystrokes, and they’ll be able to turn your webcam on to spy on you – without you knowing it.

The webcam light located near the lens will indicate whether camera is currently recording. However, it’s easy to miss and many people don’t understand what the light means.

What to Do About Webcam Spying

Well, there’s that piece of tape, or you might use a Post-It note to cover the camera, but that doesn’t address the bigger issue. Since we’re talking about malware here, the usual rules apply.

  • Don’t trust attachments, even from people you know.
  • Hover over external links to see where they will take you before clicking.
  • Question the credibility of any freeware you might download onto your computer.
  • Install a good antivirus system, especially one that checks emails.
  • Put a good firewall in place to prevent attackers from accessing your computer.
  • Install patches for your operating system, browser, and software to keep security current.

While we’re talking about webcams, keep in mind your smartphone camera and any surveillance cameras need protection too. On your phone, keep your passcode private and make sure antivirus and security patching is up to date. With a surveillance system, always change the default password – you’d be amazed how many people don’t bother to do so – as that’s just making the hackers job easy for them!

Want to be sure you’re not being spied on? Our IT experts can make sure you have a strong firewall in place to monitor network traffic and block suspicious activity. We can also ensure your antivirus and malware security is top-notch.

Don’t find yourself on camera when you’re not ready for your closeup! Give us a call at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

COVID the Sequel: Revisit Business Continuity Plans

There’s a sequel no one has any interest in seeing predicted to open this fall – COVID: The Second Wave. Despite lack of audience interest, we could face another coronavirus pandemic. For business, this means revisiting continuity plans.

Many countries are beginning to lift restrictions in an attempt to return to “normal.” Yet most experts predict things will get bad again later this year. At least business has time to recalibrate its business continuity planning (BCP).

Maybe your business had a plan in place. Decision-makers laid out actions to take in the event of fire, flood, or devastating data breach. The plan didn’t envision quarantine, but the planning worked well enough to keep your teams going.

Or you might have been scrambling to get up and running quickly in the midst of a global lockdown. Still, after initial business disruption, you were able to get back to business (if not quite as usual).

Now, looking ahead, we’re told to expect a second bout of sheltering in place. Take stock today to prepare for another bout of the virus disrupting business.

What Worked?

BCP predicts various types of crises and strategizes what to do when things go wrong. If you did BCP in advance, you weighed options and decided on the best attack without stress and urgency. Those reacting in the moment to mandates to shut down probably took more of a “this is the best we can do” approach.

Either way, let’s hope your business found some approaches and had positive results. Perhaps moving to cloud-based virtual desktop services smoothed the transition to remote work or installing a virtual private network (VPN) to secure off-site access paid off.

Identify all the strategies that were successful. If adopted as short-term solutions, you may want to explore their value long-term. Perhaps you contracted with a vendor for a temporary solution that worked well, this could cost less if you renegotiate for a longer duration. Perhaps something you tried with one team can roll out companywide to prepare for a second period of work from home.

What Needs Help?

Did you find any shortfalls that slowed work from home? What tech difficulties did your people face? Identify the problem areas, and look for solutions now.

Maybe you had employees working from home on corporate laptops or personal devices. They could be going back to the laundry room home office later this year. Is a laptop or home computer still the technology you want them using?

Were there issues with employees lacking bandwidth to get the job done? Was logging in difficult because your system only handles 25% of employees at a given time? You need a different level of service to support everybody at one time!

Maybe certain departments were able to adjust swiftly but others struggled. Identify tech challenges, and find solutions to remove friction if we do #WFH again.

Make Changes Now

Updating your continuity plan is prudent, so make the moves now to prepare. Do it while businesses are open and able to work freely. An IT partner can often work remotely, but many tasks are more efficient on-site.

The first wave of COVID-19 taught us valuable lessons; don’t be caught off guard twice.

Your people might have been more productive with remote tech, so set up the systems to secure and support a long-term solution.

Partner with a technology expert to review your needs and set you up for future success. Contact us today at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

Protecting Shared Computers for Work from Home

Many families today have a shared home computer to help with day-to-day activities. A teen can search for a job and stream shows. A parent can check work emails, pay household bills, and shop online. A youngster can play an educational game to buy Mom or Dad a few minutes of peace. Yet with COVID-19 sending so many people home to work, the shared computer is getting a lot more use.

Not every employee was lucky enough to get sent home with a business laptop. Some employers ask you to use your own computer. At the same time, you may also be accommodating kids doing online learning, and those little ones still want to go online and point and click to help Elmo plan a birthday party.

But sharing the computer can now present a security risk. You may have important work documents on the home computer. You could log in to the business network unaware of malware downloaded onto your home device, and, of course, that malicious software isn’t doing your home computer any favors either.

With so many people using the computer, make sure to set up virus protection on your home device. Additionally, you may set security patching and software upgrades to happen automatically. One of your young users could be seeing the message requiring an update and ignoring it. That leaves you unaware the software is vulnerable to bugs or threats.

Setting Up Personal Profiles

With everyone sharing the desktop, your work is at risk. You could have downloaded a spreadsheet containing employee personal identification information. That represents a compliance risk if another user inadvertently accesses the document.

Or you could lose hours of work. Someone else might drag that project you’ve been working on to the trash with a school assignment rubric.

Our IT experts can set up different account profiles for each user. Doing this not only helps to secure your work from home, but can also add protection for your kids.

The immediate appeal is personalizing the desktop for the individual user. Your kids can pick their own home screen backdrops and menu bars. You might not need access to TikTok, but your teen is thrilled to have it right there on the desktop. For smaller children, you can make icons and text bigger. Set up narration to give yourself a break from the umpteenth reading of Goodnight Moon.

For parents, security advantages of the profiles include being able to set up the following:

  • Web filtering enables you to set rules to screen incoming Web pages. This can help avoid children seeing explicit content or accessing a malicious site. You might also limit Web browsing to particular sites.
  • App limitations can ban kids from buying and downloading certain apps or making in-app purchases. For older kids you could require parental permission first.
  • You can set up Screentime limits for particular sites (e.g. Netflix or YouTube) or allow young people to access online content only at certain hours of the day.
  • Age restrictions allow you to filter mature content from search results. These also filter what apps, games, and media the young user can view or buy.

Individual profiles also make it easier for parents to track online activity and computer use. We can even set it up for you to receive reports on Web browsing and application use.

Secure your work from home and protect your family of users. Get help setting up the right controls for your home computer needs. Contact us today at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

Adding Accountability to Remote Work

Today, businesses are embracing digital technology to enable productivity anywhere, any time. Yet ensuring accountability is a stumbling block to widespread acceptance of remote work.

Recently, COVID-19 has forced many businesses to transition quickly to working from home. Even bosses concerned about lack of control over absent employees had to make the change. Former opponents to remote work may have discovered the benefits of this approach. Employees certainly may have enjoyed the opportunity and want to keep doing it.

The good news is that technology and products are even better today for managing remote teams.

Top Tools for Remote Work Accountability

Overall, employers need to trust their people. This is true whether they’re working on-site or from home. Still, for some supervisors, trust is easier with remote monitoring abilities.

Joint calendars are a common starting point. Microsoft 365, Google’s G Suite, and other tools allow staff to share calendars. People can still schedule personal appointments and keep those private, but the joint professional calendar lets everyone on a team stay in the know. Managers can go online to track sales meetings, client presentations, or team sessions.

Project management software is another way to see what co-workers are doing. Teamwork, Basecamp, and Trello offer a central location to see a project come together. Employees can access secure software from any location to share files and interact. Individuals can set deadlines and create tasks to improve accountability and responsibility sharing.

Business-based internal messaging software also keeps everyone on the same page. These communication tools typically provide one-on-one messaging and group chat. It’s easy to send a quick note asking someone for a status update, or just check in. Some tools also allow individual and team audio calls as well as video conferencing. Top contenders are Teams, Slack, WhatsApp, Skype for Business, or the Facebook and Google Hangout work chat apps.

Go big enabling collaboration among employees with cloud-based office software. Microsoft 365 and G Suite enable many users to go online and work on the same things at the same time. This solution also lets managers easily view shared documents and verify progress. It’s even possible to invite clients or other external partners in to view folders. For security reasons, you may want to limit their access to “view only.”

Securing Remote Work

Security is another point of friction for businesses allowing remote work, but the technology is keeping pace there also. Even so, you’ll want to educate employees about cybersecurity best practices. Requiring antivirus and malware upgrades, limiting external sharing and enabling multifactor access will help make remote work viable, reliable, safe, and secure.

Need help installing or implementing remote work tools? CPI Networks can help. Let us provide the IT help you need. Contact us today at (416) 645-2469 or  (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.

Returning to Work: Prioritizing Safety with IT Too

Your business has the OK to go ahead and get back to work on-site. You want to return to your office, but you don’t want to risk people’s health by doing so. After all, some say it’s too soon to go back. Plus, others predict a second wave of COVID-19 is likely. These suggestions can help you return to work while prioritizing safety.

Not everyone will welcome the call back to the corporate environment. Some employees may still be in a population vulnerable to the virus. They may want to take leave instead of returning to the work environment. Others may simply not show up.

Have your HR team send out a written notice informing employees of the timeline for returning to the office. Educate them about precautions you’re taking to provide a safe work environment. Ask for a written response of people’s intentions. Then, IT can start establishing procedures for getting everyone back to work.

You may have had great success with remote working during the quarantine. This could position you to allow workers to stay home if they are at risk or oppose the idea of returning “too soon.”

For those coming back, support social distancing by phasing in people’s return. Your business could also use a hybrid IT solution to allow people to come in just three days a week, and they could continue to work two days at home. This allows staggered re-entry and reduces the numbers of people on-site at the same time.

Back-to-Work Technology

You may be thinking you already have all the tech you need to go back to the office. C’mon, you were already working from there before this whole thing started. Plus, now you have all the new tools you added to support remote-employee productivity.

Still, you may not have invested in a long-term remote-work solution that will now support a hybrid model. Or perhaps the on-site tech you’ve long relied on isn’t meant to handle remote working for the long haul.

To achieve a flexible hybrid model, go with cloud solutions or expand on-site IT. Do you need to add infrastructure to handle remote employees using virtual private networks (VPNs)? Both on-site staff and off-site workers might need to securely access systems at the same time.

Adopting cloud collaboration software allows co-workers to access network resources simultaneously, regardless of location. Or with virtual desktops, employees can access the same files and business applications on their work machine or on a personal device.

Bringing people back to the office, you’ll want to rethink the physical setup. Support social distancing by spreading employees’ seating arrangements out more. This will require moving around computer hardware, too.

If you were previously sharing technology, you’ll also need to add more desktops. Or you might invest instead in more laptops or portable devices. This could mean securing more software, too.

Added IT Precautions

Finally, cybercriminals are opportunistic. They’re already exploiting people with malware promising vaccines or cheap masks. These bad actors are also looking to exploit the tech demands on businesses. Many businesses adapted to a new way of doing things: they moved files to the cloud, and they allowed employee access from personal devices, but they did so quickly.

Explore any new vulnerabilities from your transitions. This is a good time to double-check permissions. Ensure that accountant Jane can access staff wage data but that receptionist Jenny can’t. Also, confirm that all virus protection and security patches are current.

Active planning is the answer to a smooth return to work. While offering protective coverings and ramping up cleaning in the office is important, make sure that you don’t overlook your technology needs.

Our IT experts can help you adapt nimbly. Contact us today at (416) 645-2469 or (905) 667-0441 or email us today!

Want to be notified when our next blog is posted, sign up here.