-1
archive,paged,author,author-netactivity,author-2,paged-7,author-paged-7,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Author: Netactivity

  • Sort Blog:
  • All
  • Cloud Computing
  • Disaster Recovery Management
  • IT Security Services
  • Managed IT Services
  • Office 365
  • Our Blogs
  • Press Releases
  • Uncategorized
  • VOIP Services

Recent Data Breach May Affect Hotmail And Outlook Users

Microsoft recently confirmed that the login credentials of one of its customer support agents was compromised.

This allows unknown third parties to log in and gain access to data contained in an unspecified number of users’ Hotmail and Outlook email accounts. The exposure occurred between January 1 and March 28 of this year (2019).

When news of the breach first emerged, the company issued a statement that read, in part, as follows:

“We have identified that a Microsoft support agent’s credentials were compromised, enabling individuals outside Microsoft to access information within your Microsoft email account. This unauthorized access could have allowed unauthorized parties to access and/or view information related to your email account (such as your email address, folder names, the subject lines of emails, and the names of other email addresses you communicate with), but not the content of any emails or attachments…it is important to note that your login credentials were not directly impacted by this incident.”

In our view, the last line is the most important in the formal statement.  The hackers were able to glean some information from an unknown number of accounts, but they did so by proxy through the lens of a compromised support account, and not by stealing actual login credentials of users.

Since the company’s announcement, there have been conflicting reports that suggest the breach may have been more serious than Microsoft is currently claiming.  As such, our recommendation is that if you have a Hotmail or an Outlook.com account, the best course of action would be to exercise an abundance of caution and change your password right away.  It’s far better to be safe than sorry.

Also be aware that since hackers may have gleaned your email address as a result of their snooping, you are somewhat more likely to be on the receiving end of phishing emails in the weeks and months ahead.  Be on your guard against that.

Get the “FAQ’s” On Two-Factor Authentication

Data security has to be a core consideration of the modern business, so every small effort you can take to protect your business is important. One such effort is the implementation of two-factor authentication. However, your employees may not initially feel entirely comfortable with some facets of two-factor authentication.

The two-factor authentication platform, adds a valuable layer of security to your existing solutions by requiring an additional credential beyond just your typical username and password. This can be a PIN that is generated by an application or even a physical token like a key fob that provides access.

To make a long story short, your employees may not feel entirely comfortable with your organization requiring them to keep an application on their phone as they may value the autonomy they have over what they do and don’t keep on their personal device. As a result, they are bound to have questions that you will need to answer.

To assist you with this, we’ve compiled a few questions you may have to field, and how to answer them truthfully and diplomatically if you choose to implement two-factor authentication for your business.

What is it?
Two-factor authentication is another way to improve data security and prevent threats from infiltrating business network’s access points. Picture your network as a house that your data lives in, with the front door being the access point. The lock that you find in the doorknob is your usual access credentials, username and password. 2FA adds a deadbolt to that door.

In other words, 2FA is the added security that can keep many threats out, at the cost of a tiny bit of convenience.

Why do I have to do this?
This line of questioning is indicative that an employee is resistant to change–unfortunately, information technology is built on change. Threats to a business’ security are always improving so they have the best chance of creating the most impact. To counter this, a business must acknowledge the risks inherent in powerful technology platforms and do everything they can to control access to their network. 2FA is just one of many ways to do that.

It is also important to remember that a chain is only as strong as its weakest link, so the entire business could be made vulnerable if one person doesn’t have the same dedication to organizational network security as the rest of the team. By implementing 2FA as a team, the business is better protected by the team.

Why do I have to do it on my personal phone?
This answer has two parts to it, one being of best interest to the business, the other being for the employee’s benefit. First off, economics. Does your business have the capital to spare to distribute mobile devices for the singular purpose of enacting 2FA? Typically, this isn’t the case.

Furthermore, which device is an employee more likely to favor? Their personal device that they have conditioned themselves into bringing everywhere, or the new, unfamiliar device they were just given for work?

What happens if I lose or forget my phone?
There are ways to get around a forgotten or misplaced device. In many cases, an organization can adjust an employee’s 2FA settings to allow them access via a new 2FA code, but this will require the employee to change their credentials. If the phone is lost, the company is still safe, as the Mobile Device Management platform that the 2FA implementation was likely part of will allow network administrators the requisite authority to handle the situation.

Can you see my personal stuff?
This question will likely come up. You should ensure your employees that the privacy of their personal data will not be betrayed, and that the authenticator will only be used to access their company materials.

Information can be a touchy subject, and its security is of paramount importance. Reach out to us at Net Activity for more help with your company’s data security.

4 Ways an Office 365 Migration can FAIL

Office 365, the cloud-based version of Office, is one of the most popular software suites used by small- to medium-sized businesses (SMBs) today. With an ever-increasing number of companies migrating to this solution, it’s not surprising that many others are considering making the move. However, there’s always a chance of migration failure. Learn how to avoid this by knowing the five most common ways that Office 365 migration can fail.1. Slow internet connection speedsTo avoid this, ask an Office 365 provider to test your existing network connections to ensure that your internet connection can handle the migration and day-to-day operation of Office 365. If not, they should be able to offer you a more efficient solution.Because Office 365 is primarily cloud-based, you are going to need a connection with a solid bandwidth. When migrating your files and system over to Office 365, you will likely need to consume a large quantity of bandwidth. This demand will often be enough to tax most small business lines, resulting in slower internet speeds all around during the process. Employees might struggle to do their jobs properly if they’re reliant on the internet, so it is recommended to do migrations during off hours.Beyond this, Office 365 is most often delivered over an internet connection, rather than in-house servers. This means that the day-to-day demand for bandwidth will increase. If you are already noticing slow speeds and service interruptions before implementing Office 365, you will likely see these issues compounded after implementation.2. Mailboxes and files are too bigWhile the business versions of Office 365 come with 100 GB of email storage and over 1 TB of file storage per user, getting your emails and files online could take a while, especially if you have users whose inboxes are approaching the storage limit.As a general rule of thumb, larger files will cause the migration of files to take longer. If you don’t prepare for this, then you could see migration affecting work or even causing recurring issues of unavailable data when it’s needed.To avoid this, encourage your staff to archive their email inboxes and either delete or remove emails with large attachments that aren’t necessary.3. Uninformed usersThe average Office 365 migration takes around one to three days, depending on the size of the business and the amount of data being carried over. If you start migration without informing users that some files and emails won’t be accessible during this period, or that some systems may not be working, you could end up with employees unable to do their jobs and creating resentment for the new platform.Instead, inform your employees about how the migration will run and what they can expect during the process. Beyond this, you should run training sessions on how to use the new systems to ensure that everyone is briefed before they start to use them. This will increase the overall chance that the platform migration and subsequent use will be successful.
  1. Older, less compatible software installed on systems
While many versions of Office 365 do come with subscriptions to the latest version of Microsoft Office, there’s built-in support for systems that are running slightly older versions of Office. If your business is using a version older than Office 2010 (e.g., Office 2003), you won’t be able to properly use Office 365.Beyond this, you’ll also need to use the latest version of your internet browser. If you use Chrome or Firefox, this won’t be a problem. However, if you use Internet Explorer, you may run into issues, as Microsoft has already discontinued the program in favor of Microsoft Edge.The good news about Office 365 is that actual systems requirements are low, so almost every business will be able to integrate it. We recommend that in order to be able to use all of Office 365’s features, ask your provider to ensure that your software and systems are compatible with it.5. DIY migrationsOn paper, migrating to Office 365 is a fairly simple and straightforward process. What many companies find when they do the migration themselves is that the process is much more difficult than expected. They come across unexpected issues that require an IT expert to solve.In order to ensure a smooth migration, it’s a good idea to work with an IT provider like us. We can ensure that your systems are ready and the migration is smooth. Contact Net Activity today to learn more.

6 Warning signs your Computer has Been Attacked by Malware

With the rise of eCommerce and online banking, cybercrime has evolved. Like criminals who pull smash-and-grab jobs, they go where the money is. However, unlike bank robbers, cybercriminals do their best to avoid detection by letting malware do the work for them. Viruses and ransomware sneak into PCs to quietly steal passwords, financial credentials, and other personal information to be sold on the black market for profit. Not all malware is stealthy though. Here are 6 of the telltale signs:

Slow computer

Are your operating systems and programs taking a while to start up? Is your data bandwidth suspiciously slow? If so, your computer may potentially have a virus.

However, just because your PC is running slower than usual doesn’t necessarily mean that it’s infected, as there could be other causes to your computer slowing down. First, check if you’re running out of RAM. For Windows, open task manager (press Ctrl + Shift + Esc) and go to the Performance tab and check how many gigabytes of RAM are used up under the Memory section. For Mac OS users, you can open the Activity Monitor app and, under System Memory, you should be able to find out your RAM usage.

Other causes could include lack of space on your hard drive or even damaged hardware. Once you’ve ruled out other possible causes, then malware may have infected your device.

Blue screen of death (BSOD)

If your PC crashes regularly, it’s usually either a technical problem with your system or a malware infection. You might not have installed the latest drivers for your device or the programs you’re running could possibly be incompatible with your hardware. If none of these problems are apparent in your PC, then a virus could be clashing with other programs and causing your crashes.
To check what caused your last BSOD, go to Control Panel > System and Security > Administrative Tools > Event Viewer and select Windows Logs. Those marked with “error” are your recorded crashes. For troubleshooting solutions, consult forums or your IT department to figure out what to do next.

Lack of storage space

There are several types of malware that can manipulate and corrupt the files saved on your computer. Most tend to fill up your hard drive with suspicious files. Ransomware, for example, is a notorious type of malware that denies you access to your data until you pay a so-called ransom. There are more aggressive forms of ransomware, like NotPetya, known for exploiting security holes to infect computers without needing to trick users.

If you find any unknown programs that you have never installed before, notify IT personnel in person immediately (do not email them) and have them handle the situation for you. Your device might not be the only one in your network that is infected with suspicious programs.

Suspicious modem and hard drive activity

Combined with the other warning signs, if your hard disk is working excessively while no programs are currently running or if you notice that your external modem is always lit, then you should scan your computer for viruses.

Pop-ups, websites, toolbars, and other unwanted programs

Pop-ups come from clicking on suspicious pages, such as those where users are asked to answer survey questions to access a website’s service or install free applications. While they’re inherently harmless, they could be downright annoying. Refrain from clicking pop-up pages and just close them instead. Run malware scans and update your browsers.

You might think that downloading free applications is harmless, but the installation process can inject malware into your device. When you’re installing a program from the internet or even app stores, it’s easy to just skim over the terms and conditions page and repeatedly press next. This is where they get you. In the process of skipping over certain installation steps, you might have agreed to accepting a new default browser and opening unwanted websites and other programs filled with viruses. Be cautious when downloading something for free.

You’re sending out spam

If your friends are telling you that you’ve been sending them suspicious messages and links over social media or email, you might be a victim of spyware. Warn your friends not to open anything that appears to be spam and make sure to reset your passwords across all your devices and enable multifactor authentication.

Knowing how malicious software affects your computer can help you take the necessary precautions and steps to rectify the situation as soon as possible. Regardless of whether or not your system has experienced these symptoms, it’s always smart to perform regular malware scans to ensure your business is safe. To find out more about malware and IT security, contact Net Activity today.

 

Keeping Productivity Up When the Internet Goes Down

Modern businesses rely pretty heavily on the Internet–so much so that, should the Internet go down, many employees will find themselves at a loss as what to do. However, there’s no need to sacrifice productivity just because your Internet isn’t cooperating. There are plenty of ways to get something done on a day that the Internet calls in sick, which we’ll go over for today’s tip.

Tidy Up
Regardless of the season, an Internet outage is an excellent opportunity to do some spring cleaning. Whether your workspace itself is getting a little cluttered, or the files on your local network need to be organized, what better time is there to make sure things are spic-and-span?

Making sure that your workspace is tidy, and that your employees do the same, can also have benefits that will impact each employee and your organizational collaboration. An organized desk features fewer distractions than a cluttered one, and makes resources easier for someone else to find, should the desk’s tenant be out that day.

This benefit extends to storage space around the office. A cluttered cabinet is one that’s hard to find things in. Taking the time to tidy it up will help you save time later, and doing it during an Internet outage means that you aren’t taking up time that could be spent doing something else.

If you still have access to your data storage, take the opportunity to organize them. Folders are your friend in this case, as you can develop a hierarchy that permits you to arrange those ‘loose’ files scattered around your desktop into a concise and logical system, making them much easier to find.

Teamwork!
If there’s one weakness to a workplace being so technology-intensive, it’s the boundaries that it can put up between team members. Communicating through a screen all day doesn’t allow for the camaraderie that some old-fashioned facetime can develop, which can lead to improved synergy and productivity when working collaboratively. If your Internet fails you, you may want to take advantage of that time to encourage some face-to-face interactions.

Whether they take the opportunity to hold meetings or fraternize with other departments, your employees can engage in some team building as they wait for Internet access to return. Alternatively, they can also meet up and discuss ideas they may have and never had the opportunity to share before.

It isn’t just your employees who can benefit from this, either. Letting your employees get to know you a little better, and vice versa, can help keep them engaged and allow you to understand who they are a little better as you manage them. This allows you to better sculpt your management style to suit each employee, maximizing your impact.

Go Mobile
Many employers may find that mobile devices can be distracting in the office, they can be a real blessing as well. Should your Internet fail you, your team may be able to continue working on some of their tasks by utilizing their mobile data, either as a part of a BYOD strategy with data reimbursement, or on a company-provided device. For assistance in setting up these solutions, reach out to us.

What are some of the things you do to combat the loss of productivity due to an Internet outage? Share your strategies in the comments!

Are YOU Prepared For the End Of Windows 7?

On January 14, 2020, the world will bid a fond farewell to the beloved Windows 7 operating system. Well, sort of. Microsoft has declared that, after that date, it will no longer update or support the system. It’s the final nail in the coffin for a trustworthy, oft-touted software package that’s been running on fumes since newer versions hit the scene. And, as with any funeral, there are some arrangements to be made for the millions of businesses that have stuck it out to the end. Here’s everything you need to know about the coming changes – and what you should do now to prepare.

The End Of An Era

The news of Microsoft closing down Windows 7 support may come as a surprise to some of us, but the operating system has been on its last legs for a while. In fact, Microsoft stopped adding new features and honoring warranties for the platform back in 2015. When 2020 comes, it will cease releasing patches and updates for good.

This doesn’t mean that Windows 7 PCs will suddenly stop working in January; you’ll still be able to boot up in the operating system if you keep it installed. But if you value your privacy, your data and your sanity, it’s time to upgrade.

Those Microsoft updates that pop up from time to time don’t exist just to annoy you; they patch security vulnerabilities and protect you against new viruses and malware. Without that ongoing support, Windows 7 users will become fish in a barrel to sophisticated cybercriminals looking for a quick buck.

That’s why it’s essential that you call in the professionals to prepare your business for the switch to Windows 10 – or an alternative operating system – now, not later.

It’s A Requirement, Not A Choice

Upgrading your operating system well in advance of the Windows 7 end-of-life date may seem like a decision you should make for your peace of mind, but it’s even more critical than that. Of course, as time leaves Windows 7 behind, it’s certain that pieces of software will steadily become incompatible with the OS. Programs your company uses day-to-day suddenly becoming unusable will present serious headaches, but the real problem lies in the security of your network.

Windows developers are in a constant arms race with cybercriminals looking to exploit vulnerabilities in their platform. Each patch brings a host of bug fixes and security upgrades, but cybercriminals almost always find a new way in. Thus, the developers hastily put together a new patch, and the cycle continues.

When an operating system loses support from these developers, its users are left completely vulnerable to hackers. Like fruit flies drawn to a rotting apple, they flock to the abandoned platform and dig into the networks of those stubbornly clinging to the outdated OS. This process is expected to be especially nasty after Windows 7’s end of life, since so many businesses still use the OS and likely will forget (or refuse) to upgrade.

If you value your business at all, it’s not a choice. You need to upgrade before time runs out.

Avoid The Crunch

Not only should you enlist your IT experts to facilitate the upgrade, but you should do it ASAP. As the clock ticks down on Windows 7, tech companies are expecting a flood of upgrade requests as businesses scramble to leave the OS behind before it’s too late. Many of these IT providers will have a lot on their plate later in the year as they hurry to upgrade hundreds, if not thousands, of individual PCs. If you wait it out, you’re likely to find yourself at the back of a long, long line, potentially to the point that you breeze past January 14 without a solution. If you do, you’re almost certain to regret it.

Every day, the need for an upgrade becomes more urgent. Give the task the ample time required, and avoid needless stress. Reach out to Net Activity below to start the upgrade process today.

Millions Of Facebook Usernames And Passwords Stored By Accident

Are you a Facebook user? If you are, it may be time to change your password. KrebsOnSecurity recently reported that it found hundreds of millions of Facebook user account names and passwords stored in plain text and searchable by more than twenty-thousand Facebook employees. At present, there is no official count, but Facebook says the total number of records was between 200,000 and 600,000.

That’s a big number, which makes this a serious incident, but in truth, it represents only a fraction of the company’s massive user base.

Although there’s no indication that any Facebook employee abused their access to the information, the fact remains that it was accessed regularly. The investigation to this point has revealed that no less than 2,000 engineers and developers made more than nine million internal queries to the file.

Facebook software engineer Scott Renfro, interviewed by KrebsOnSecurity, had this to say about the issue:

“We’ve not found any cases so far in our investigations where someone was looking intentionally for passwords, nor have we found signs of misuse of this data.

In this situation, what we’ve found is these passwords were inadvertently logged but that there was no actual risk that’s come from this. We want to make sure we’re reserving those steps and only force a password change in cases where there’s definitely been signs of abuse.”

This is just the latest in an ongoing series of security-related issues Facebook has found itself in the midst of. While the company is wrestling with making changes to prevent such incidents in the future, that’s small comfort to the millions of users that have been adversely impacted over the last year.

According to the official company statement, unless you receive a notification from them, there’s nothing you need to do and no need to change your password. But given the importance of data security, if you’d rather be safe than sorry, it certainly couldn’t hurt.

Planning For Catastrophe: Business Continuity & Disaster Recovery

80% of businesses suffering a major natural disaster go out of business within three years.  Your business runs 365 days a year; your systems run 24/7 and your data is needed in real-time. To ensure that your business continuity is protected, you must take a proactive approach that ensures that everything is protected. This means all of your systems, data, and files are protected against all types of disastrous events. Business continuity planning should be the number one priority when preparing for a catastrophic disaster.

So, what types of disasters-exactly-should your business be prepared for? Let’s take a look:

  • System Disasters. This is your hardware, software, all systems and data centers; when they fail, you want to make sure that your business doesn’t have to. The 2018 Cyber Resilience Report found that 67% of companies in 61 countries experienced at least 1 cyber incident in the last year, caused primarily by phishing & social engineering, malware, spear phishing, denial of service, and out-of-date software, rendering the organization’s own network either contaminated or inoperable.
  • Natural Disasters. Due to global climate change, natural disaster occurrences have increased and intensified. Since 2010, we have suffered 2,018 natural disasters (averaging 336 per year). The US is second only to China for the number of natural disasters. Natural disasters have cost the global economy $2.5 trillion since 2000. 80% of businesses suffering a major disaster go out of business in three years.
  • Human Error Disasters. The most frequent, most common, and often most detrimental cause of disasters that can disrupt business continuity is unintentional human error. 70% of the successful attacks on businesses came from internal threats like employees and contractors. Even small data losses – those with fewer than 100 files lost – cost between $18,120 and $35,730. A single poor choice by a single employee can lead to catastrophic data loss.

Any one of these disasters could destroy your business, or at the very least, cost you thousands of dollars.

Your business continuity planning is essential; one key component in that planning is thinking big picture and covering all your bases.

What does that mean?

Ensure employee well-being. Communication during and following an emergency presents a variety of challenges. So, crafting an employee safety and communication plan that works is absolutely essential. Obviously, email is the easiest way to reach a large group of employees, but if your company’s email server is down, you are out of luck. A call tree, sometimes referred to a phone tree, call list, phone chain or text chain, is another popular method for distributing important information to employees during and following an event.

Keep customers in the loop. Managing customer relationships is obviously critical to the ongoing success of your business. As such, it is important to craft a plan for distributing information to your customers during and following a disaster event. The scope of your customer communications plan will vary widely depending on the nature of your business.

Enable IT uptime. To understand the IT piece of disaster recovery and business continuity today, it helps to look at the not-so-distant past. It really wasn’t very long ago that backup meant daily incremental and weekly full backups to tape or a dedicated disk backup target. Disaster recovery from offsite tapes were-and are-painfully slow and bring considerable downtime. Your IT disaster recovery plan should be built around two concepts; your recovery time objective (RTO) and recovery point objective (RPO). RTO is the amount of time that it takes to get a system restored following a failure or disaster event, and RPO is the point in time to which your data can be restored.

A better way to enable your IT uptime is to run applications from image-based backups of virtual machines. This capability is commonly referred to as “recovery-in-place” or “instant recovery.” Recovery-in-place dramatically improves RTO because operations can continue while primary servers are being restored. RPO is reduced as well—snapshot-based, incremental backups at 15 minute intervals are a common practice.

Keep your business moving. Some possible considerations for your organization to focus on when planning for a disaster are insurance coverage, employee training and facilities issues. In addition, knowing your downtime impact is crucial to your recovery efforts. Many organizations today have limited tolerance for application downtime and if your employees or customers do not have access to essential applications and data, there will be a direct impact on productivity and revenue. While this sounds obvious, many organizations do not consider the actual costs of downtime for a business.

To better understand the cost of downtime and how it can cost your company dollars, our Cost of Data Loss Worksheet is a great tool to begin measuring exactly where your business vulnerabilities are and how to better protect your data assets and continuity.

Would You Rather Text Than Talk? 7 Essential Tips For Business Texting

You use your iPhone or Android for everything else. Your spouse even texts you to grab some milk at the store or to tell you they’ll be gone when you get home. It’s quick, easy and gets the job done. Why not in business too?

Well here’s the thing…even though text messaging might be your main form of communication for everyday social communications with friends and family, there’s an unspoken idea that you shouldn’t text colleagues and business associates. However, business text messaging is such an easy way to stay in contact with other people on the job, as long as you avoid some awkward texting gaffes that can cause issues in the workplace. So…if you’re going to text for business purposes, follow these 7 texting tips to keep it professional:

1. Know when texting is appropriate

Despite the omnipresence of cell phones today, not all users have text messaging services enabled. This means that users can incur extra charges to send and receive messages. So before sending someone a text message, ask if it’s okay. You can also go ahead and assume it’s okay if the other party initiates the texting. Avoid texting outside of normal work hours, and especially late at night—you never know when the ‘ding’ might wake someone up!

2. Be respectful of those in your physical presence

Whether you’re in a meeting with a client, or having dinner with your future boss, show respect for their time by saving the text messages and phone calls for later. To quickly switch into meeting settings, just set your cell phone to airplane mode, and your texts will be held until you disable it.

3. Avoid relying on texting for urgent matters

Sometimes time-sensitive matters arise, such as a meeting being rescheduled. But you cannot guarantee that you will get hold of someone in time through texting. For this reason, it is best use more formal methods, such as calling or emailing if you cannot speak to a colleague in person. For truly urgent matters, you may use multiple modes of communication, but do so only when circumstances call for it.

4. Group texts should be used sparingly

Group texts may seem like a convenient way of reaching out to multiple people, but it can be really irritating to be on the receiving end of them. Responses go to everyone, which isn’t always clear to the participants. That means they can receive message after message from contacts that they may not even know. And remember the point about not texting people whose cell phone plans incur extra charges? That definitely applies here, too. Instead of a group text, opt for a meeting, conference call, or email thread.

5. Don’t send bad news via text

Text messaging is an inherently informal method of communication, and as such should not be used for more serious matters. If you need to deliver bad news to someone, it’s best to do it in person. In some circumstances, you may have to deliver it via email or phone, but try to imagine how the person on the other end of the line might react to the news first.

6. Use emojis sparingly or not at all

With smartphones came along some fun new features, such as emoticons, or ‘emojis’. But while there’s an emoji for just about any occasion, resist the urge to saturate your texts with them. Using emoticons may come across as unprofessional, so don’t go overboard if you do choose to send them. And if do so with someone you know well, stick to the classics, like simple smiley faces.

7. Structure your text in a professional manner

This means no casual abbreviations (e.g. “lol”), typing in all caps, or misspellings. Try to keep your message brief and to the point, otherwise send an email instead. Always sign your name on your initial message as well, unless you’re confident that the recipient will know who it is.

If you do text in a business environment, especially with a customer or prospect, follow these 7 tips to ensure that you are perceived as the true business professional that you are!

 

Keep Your Business Alive with BCP

Power outages, disasters, and other disruptions are inevitable. Thousands of businesses around the globe are affected by them every year, with lost profits ranging into the millions, if not billions. So how can your business protect itself and stay open when the unexpected strikes? Here is a standard business continuity plan (BCP) your company can rely on.Backup your data, applications, and serversToday, companies are more dependent than ever on IT and data. If these critical components suddenly become inaccessible, there’s little chance your business will survive. Regularly backing up these elements ensures they can be restored quickly in the event of a disaster, security breach, or damage to IT equipment.In the past, most businesses would create backups on-site and with tape backups, but today more and more businesses are using the cloud, and here are several reasons why:
  • Cloud backups are affordable and cost much less than onsite backups Backups can be automated, therefore saving you time
  • Cloud providers usually back up your data to multiple locations (so if one of their facilities goes down, your backups are still safe at another site).
  • Backups can be accessed from anywhere, whether it’s at an employee’s home or at an alternate office.
  • If you need to access them, backups can be restored quickly
Virtualize servers and desktopsWhen you virtualize your servers or desktops, they can be used at any location – be it at your workplace, home, or a coffee shop in the Bahamas. In terms of business continuity, this is useful in case your main office suddenly becomes unusable due to hostile weather conditions.Have a backup power supplyNo electricity means zero productivity and money down the drain. Having a backup power supply will ensure that when the electricity goes down, your employees can continue working.A good solution is an uninterrupted power supply (UPS), which gives employees a fair amount of time to finish their work as if nothing ever happened. Also, if you have a server room, a UPS will ensure your vital servers stay cool.Utilize social mediaWhether it’s Facebook, Twitter, or Google+, most people are on at least one social network these days. And if there is any kind of outage or disaster, social media is usually one of the first places customers, colleagues, staff, and vendors will check the status of your business. So when it comes to business continuity, keep at least one social media account active to keep your customers and followers informed.Implement unified communicationsUnified communication (UC) creates a virtualized communication infrastructure. That means instead of your communication tools – like phones, instant messaging, and video calls – all being stored locally at your workplace, you can access them anywhere. So if your office is inaccessible, employees can still use your phones and other communication tools from their homes. What’s more, UC tools can route business calls to your employees’ smartphones. That means they’ll never miss an important call, even if they’re not in the office.Keep in mind that these are only the first few items you have to address in your business continuity plan. You’ll also need to consider things like training employees and having a communications plan for informing stakeholders. If you want more advice on these areas or need top-class business continuity tools, contact us today.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room