Blog

February 27th, 2014

Virtualization_Feb24_ARunning a small/mid-sized business can be just as daunting as operating a large enterprise. If you are ambitious to improve your business, then virtualizing your systems might be just the development you're looking for. Aside from being a cost-effective solution, virtualization can also boost the efficiency of your enterprise's IT infrastructure.

While it may seem like virtualization is only advantageous to large businesses, in truth, even small companies can take advantage of this rising and sophisticated innovation. That being said, there are many companies still holding back. To help you understand virtualization, here are five good reasons why you need to virtualize your business now.

You can optimize servers

Perhaps the most compelling reason to virtualize your systems is to make your computing resources (such as the RAM and processor cycles) more efficient. And with efficient computing resources, businesses can reduce their capital expenses. Furthermore, small and mid-sized business are able to manage fewer physical servers, because virtualization allows users to combine, or virtualize, physical servers into fewer physical machines.

You get cutting-edge disaster recovery plans

Since catastrophes are possible, businesses should be prepared before they are faced with a disaster. The advantage of virtualization is that many solutions come with a disaster recovery plan to get your business back to a normal operational state after a problem strikes.

It can be far easier to fully back up your entire virtualized infrastructure than trying to do the same with separate hardware servers.

It increases business continuity

While business continuity is similar to disaster recovery, the goals of each operation are different. The aim of business continuity is to achieve zero, or minimal, business operation interruptions. However, many businesses find this difficult to achieve with traditional business systems.

Many virtualization solutions offer live migration, a feature that helps preserve the continuity of business operations by eliminating the need for downtime. This system works by rapidly transferring systems from one virtual environment to another when the original is affected. This enables a business to continue operations, despite some system failures.

It's a time-saver

Compared to setting up physical hardware, which can take months to establish, test, and maintain, setting up a virtualized system for your business can usually be achieved in a matter of minutes.

You get centralized control

Virtualization makes it possible to manage your entire system using one central tool. This is one cutting-edge advantage that suits many businesses, especially small and mid-sized ones. Moreover, security and compliance features can be built in, leading to systems that are even more secure than before.

The benefits to be gained by virtualizing can prove to be a real game changer for your business. Though it may seem complex at first, considering the new lingo and foreign functions, you’ll soon realize that it's just a matter of finding the right IT partner to work with.

Our virtualization experts are here for you and can help you from start to finish. If you want to know more about virtualization and its benefits to your business, contact us today.

Contact Us Today!

Download Whitepapers now!

Published with permission from TechAdvisory.org. Source.
February 26th, 2014

Office_Feb24_AMicrosoft Office (MS Office) is a popular and top-selling software suite that features a myriad of publishing programs for desktop computers. Basically, it comes with an array of applications that can help you document everything needed in your work, studies or business. As a user, you have the option to choose from several different suites intended for home users, small business enterprises and large corporations - all depending on your needs. While this program is user-friendly, there are times when people need help with it.

When it comes to helping you with solutions for your Office issues, here are five of the most common go-to places:

F1

Let’s assume you’ve already installed Microsoft Office Suite and an application is already up and running. However, the problem is you need to figure out how to do something. Finding a solution can sometimes be frustrating, so follow one of two options to get a quick answer to your questions.

The first is to press F1 to open the help database. You can then search for a solution to your problem. The second option is to press the question mark '?' located in the upper right corner of any Office program. This will open the same solution database.

MS Diagnostics

Microsoft Office failures, such as your program crashing or not launching, don’t necessarily mean that the software is corrupt or needs to be reinstalled. There might be another root cause. But there's no need to panic, as Microsoft offers an in-house physician for your Office problems called MS Diagnostics.

This tool runs a number of tests on Office programs, identifying existing and potential problems. Basically, the MS Diagnostic tool is like an MRI that thoroughly scans your Office software application, and which can usually provide repair options too.

Office Support

If the issues with your Office applications are not repaired using MS Diagnostics, then you possibly need the help of Office Support. This is one of the six main tabs on the Microsoft Office website.

Once you open Office Support, it welcomes you with an opening question: “What do you need help with?”. You can then select a specific application or product or select All products in that field. In the search box, you can also enter certain keywords that are relevant to the issue. A consolidated list of results will be generated that match any words you have entered. Many users are able to find a solution to their problems by visiting this page.

Community forums

Sometimes, the information on the Microsoft website is too general and doesn’t go far enough in helping you find the solution you need. One way to get a more thorough and updated fix for your Office application problems is to look at the various Office oriented forums on the Internet. Many of these forums tackle issues regarding Microsoft Office, with corresponding solutions that have already been tested. Joining forums can be helpful, especially when you want to learn new information, such as the latest software upgrades.

Tech support

There are some issues that cannot be resolved using MS Diagnostics, website support, and community forums. If all else fails, then you might need to get in touch with Microsoft’s technical support. You can directly air out your concerns with a person who is an expert with technical Office issues.

If you’ve tried to fix problems with MS Office and don't seem to be getting anywhere or issues keep recurring, then give us a call now and we will find the best solutions for you.

Contact Us Today!

Download Whitepapers now!

Published with permission from TechAdvisory.org. Source.
February 20th, 2014

Security_Feb17_AThere are numerous ways business security systems can be compromised. A common way is phishing - tricking people into giving up important information via email. Original phishing methods are now well known, and increasingly less effective. So hackers have become more skilled and have adapted their phishing methods into a new form of catching people out with what experts have labeled as spear phishing.

What is spear phishing?

Spear phishing is a specialized type of phishing that instead of targeting a mass number of users, as normal phishing attempts, targets specific individuals or groups of individuals with a commonality e.g., an office.

Generally a hacker will first pick a target and then try to learn more about the related people. This could include visiting a website to see what a company does, who they work with, and even the staff. Or they could try hacking a server in order to get information.

Once they have some sort of information, usually a name, position, address, and even information on subscriptions, the hacker will develop an email that looks similar to one that another organization might send e.g., a bank. Some hackers have been known to create fake email accounts and pose as a victim's friend, sending emails from a fake account.

These emails are often similar to official correspondence and will always use personal information such as addressing the email to you directly instead of the usual 'dear sir or madam'. The majority of these emails will request some sort of information or talk about an urgent problem.

Somewhere in the email will be a link to the sender's website which will look almost exactly like the real thing. The site will usually ask you to input personal information e.g., an account number, name, address, or even passwords. If you went ahead and followed this request then this information would be captured by the hacker.

What happens if you are speared?

From previous attack cases and reports, the majority of spear phishing attacks are finance related, in that the hacker wants to gain access to a bank account or credit card. Other cases include hackers posing as help desk agents looking to gain access to business systems.

Should someone fall for this tactic, they will often see personal information captured and accounts drained or even their whole identity stolen. Some spear phishing attacks aren't after your identity or money, instead clicking on the link in the email will install malicious software onto a user's system.

We are actually seeing spear phishing being used increasingly by hackers as a method to gain access to business systems. In other words, spear phishing has become a great way for people to steal trade secrets or sensitive business data.

How do I avoid phishing?

Like most other types of phishing related emails, spear phishing attempts can be easy to block. Here are five tips on how you can avoid falling victim to them.
  • Know the basic rule of business communication - There are many basic rules of communication, but the most important one you should be aware of is that the majority of large organizations, like banks, social media platforms, etc., will not send you emails requesting personal information. If you receive an email from say PayPal asking you to click a link to verify your personal information and password, it's fake and you should delete it.
  • Look carefully at all emails - Many spear phishing emails originate in countries where English is not the main language. There will likely be a spelling mistake or odd wording in the emails, or even the sender's email address. You should look out for this, and if you spot errors then delete the email immediately.
  • Verify before you click - Some emails do have links in them, you can't avoid this. That being said, it is never a good idea to click on these without being sure. If you are unsure, phone the sender and ask. Should the email have a phone number, don't call it. Instead look for a number on a website or previous physical correspondence.
  • Never give personal information out over email - To many this is just plain common sense - you wouldn't give your personal information out to anyone on the street, so why give it out to anyone online? If the sender requires personal information try calling them or even going into their business to provide it.
  • Share only essential information - When signing up for new accounts online, there are fields that are required and others that are optional. Only share required information. This limits how much a hacker can get access to, and could actually tip you off. e.g., they send you an email addressed to Betty D, when your last name is Doe.
  • Keep your eyes out for the latest scams - Pay attention to security websites like those run by the major antivirus providers, or contact us. These sites all have blogs where they post the latest in security threats and more, and keeping up-to-date can go a long way in helping you to spot threats.
If you are looking to learn more about spear phishing or any other type of malware and security threat, get in touch.

Contact Us Today!

Download Whitepapers now!

Published with permission from TechAdvisory.org. Source.
Topic Security
February 20th, 2014

Hardware_Feb17_AAccording to statistics, about 64% of American adults, business owners included among them, own their own laptops. That’s a huge increase from 2005 where the numbers were only at 30%. Considering how much value that laptops can bring to the table, it's imperative that we get to know the device better so we can maximize the benefits of having one.

Let's take a quick look at the five most important parts of every laptop you will hear techies talk about on a regular basis and what they do.

1. Hardware

The hardware is the tangible/physical parts of the equipment. Think about your touchpad, keyboard or basically the body of your laptop and everything contained within. Essentially, every computer part you can touch, or see, is hardware. This includes the device itself and all the physical components that make it up.

2. The motherboard

A motherboard is where you usually find chips, power connectors, and memory slots (among many others). This board contains the components that make the computer work and is usually located in the center of your laptop with all other parts connected to it. It is also sometimes called the system board or MoBo for short.

If you take your laptop apart - something we don't advise doing because it will likely void any and all warranties - you should be able to see the outer components of a motherboard, with the memory and hard drive usually visible. The board will be below these components and you will usually have to dismantle other components to access it. All components, or parts, connected to the board are delicate, so it is best to let a trained professional deal with the board and any repairs.

3. The case

The case or the computer tower is where the laptops/computers inner components are housed. Many retailers will refer to this as the shell or body.

These days most laptop cases are made with a strong plastic or some form of aluminum and the size is usually dependent on the motherboard’s components and the screen. While many manufacturers say that their cases are made of strong aluminium or some other material, many are there to simply house the hardware or take damage, protecting the delicate inner components.

4. The processor

The processor is the laptop’s brain. It works together with the OS (operating system) to control the laptop. An important thing to note about processors is that it produces a lot of heat. This is why fans and cooling devices are in place and usually located at the back or bottom of the laptop.

The processor is among the most important parts of the laptop because it allows the computer to function. It can read the code stored in the memory of the computer and tell the other parts to do what the code states.

5. Memory

The memory in laptop is where data is stored. The data can be stored in either a chip with a short term memory or a drive.

There are two types of memories. The first is RAM - Rapid Access Memory which is where instructions the processor may need in the near future are stored. RAM relies on electricity to store this information and quickly loses any data stored on it without power.

The second type of memory is the Hard Disk. This device, or drive, is where all data is stored including your files and the code for all the programs installed. When in operation, code the processor needs will be copied from the hard disk to the RAM. Hard disks usually have a high amount of storage - averaging at least 500 GB or Gigabytes, while RAM usually has a small amount - averaging 4 to 8 GB.

When looking at the specs, or specifications, of a computer many manufacturers and stores will list a number under memory and another under storage. Memory is RAM, while storage is usually related to the hard disk. That being said, some stores will group both together, so it is a good idea to pay attention to the specs.

You’re time to share!

If you need help with your laptop, be it upgrades, maintenance or perhaps you just need some expert advice, then call us now. We’ll be more than happy to help you.

Contact Us Today!

Download Whitepapers now!

Published with permission from TechAdvisory.org. Source.
Topic Hardware
February 19th, 2014

BCP_Feb17_ASmall to medium businesses continue to struggle when developing a comprehensive disaster recovery plan. DRPs or Disaster Recovery Plans, can spell the difference between your business’s outright destruction when unforeseen calamities occur or a careful and systematic recovery to normal operations with little loss to operations or profits.

When creating a disaster recovery plan for your business, there are certain key elements that you need to consider.

Basics of a Disaster Recovery Plan

In building an effective disaster recovery plan, you should include thorough documentation that lays out the details of the ins and outs of the plan. You need to know that there is no right type of DRP, nor is there a single template that fits all. But there are three basic aspects to a disaster recovery plan: Preventive measures, detective measures, and corrective measures.

In addition, before building your disaster recovery plan, make sure that it can provide an answer to these basic questions:

  1. What is the objective and the purpose of making one?
  2. Who are the assigned team responsible when certain events occur?
  3. What is the framework and the procedure to be followed?

Plan for the worst case scenario

Since you’re planning for an unforeseen event, you might as well make sure that you have plan for the worst case scenario. That way, you’ll never be overwhelmed and you’re as prepared as you can be for any situation.

Having different tiers of backup plans is also advisable. It gives you a better assurance that when bad comes to worst, you have a system in place to make sure that these disasters are handled correctly, regardless of the disaster’s severity.

Data issues

One of the objectives of disaster recovery plan is to protect the collection of data. Almost half of the total population of business organizations experiences data loss from both physical and virtual environments. This is often due to corruption of the file system, broken internal virtual disks, and hardware failures. Thus, there is a real need for established data recovery plans such as backup features offered by many IT solution vendors.

Test-drive

Before deploying your disaster recovery plan, you need to have a sort of a test-drive to check if it works. Aside from making it work, you also need to know if it’s going to be effective. Through testing, any shortcomings can be identified and will garner corresponding resolutions to improve on your plan. Although the real score of its effectiveness can only be identified once a disaster occurs, at least you will have an idea of how your business and the recovery plan can operate during a disaster.

Building an effective disaster recovery plan is a must for your business. This might not directly lead to a positive impact on productivity but it will surely save you in the events that can possibly crush your business. Anticipating and adjusting for the things that might happen is one of the keys to a company’s success.

Setting up an effective DRP can be quite an intricate process since there are several elements that you need to consider. Should you want to learn more, give us a call and we’ll have our associates help you develop and test a plan that works best for your business.

Contact Us Today!

Download Whitepapers now!

Published with permission from TechAdvisory.org. Source.
February 18th, 2014

2014February18_Motivation_AWant to get fit and give your health a positive boost? Lack the willpower or don't know how to go about creating a new, improved you? The good news is you're not alone. The even better news is that there are lots of way to motivate yourself to make beneficial changes in your life. The best news of all is that the way forward can be enjoyable and make you feel good too.

Berating yourself for your failings doesn't do anyone any favors, least of all you. Motivation doesn't succeed from feeling bad. If you want to inspire a stronger practical drive to get in shape then you may want to focus not so much on what you should be doing but on giving your whole life a motivation boost. Want some ideas on how to do that? Here's 10!

  1. Create some space - Cut yourself some slack from your busy schedule. Take a long weekend if you can and relish some 'me' time where you have headspace to let new ideas and thoughts come in and grow.

  2. Surround yourself with happiness - Watch a comedy; meet friends who make you laugh; read inspirational stories. Avoid negative types, depressing news, and anxiety-inducing situations...at least for a while.

  3. Don't try and be and do it all - So many people put this internal pressure on themselves in a bid to live up to some image of what they should be. Forget it! Be yourself and reconnect with the real you. Likewise, don't go OTT with health and fitness either or your good intentions may not last.

  4. Open up your world - Whether it's changing the sandwich you eat every day or climbing a mountain, do something different once in a while and open yourself up to new experiences. Not only will your perspective change but so might your behavior too.

  5. Eat better - Motivation isn't simply a cerebral process. A good diet can make you feel energized and this in turn can give you the power you need to tackle your life differently, including your health and fitness levels.

  6. Stop criticizing - It's not easy feeling motivated when you are surrounded by negativity. Each time you put yourself down, or speak badly about others, you are putting the damper on the fire of your motivation.

  7. Be altruistic - It's interesting that when you do something good for someone else that it makes you feel good. And feeling good motivates you to want to continue feeling good. Since a good diet and healthy lifestyle can make you feel good too, then you might be more motivated to follow this plan.

  8. Get moving - Don't sit on the sofa and imagine that one day you'll be working out a few times a week. Instead, start moving right now. Once you've actually started to get more active, and got the ball moving, your motivation will gather speed.

  9. Don't bury your head in the sand - If you're overweight or not in the best shape then facing up to this in a positive way can instigate change. Avoiding looking at your lifestyle won't motivate you to make changes.

  10. Make a plan and create a strategy - Motivation needs direction and goals. Create them and find ways to fulfil them too.


Contact Us Today!

Download Whitepapers now!

Published with permission from FitnessAdvisory. Source.
February 14th, 2014

Security_Feb11_AOur computer systems need a high level of protection against harmful viruses, worms and other malware currently spreading like wildfire over the Web. If you have a layered security or defense in depth strategy in place, then you’re probably well protected. But if not, then our guide will surely help you protect your computer systems.

Just like the human body, a computer system can also be attacked by many viruses that can infect and disrupt computer operations. And what's worse is it doesn’t just disrupt the operations of your computer, but these viruses and other malware can gather sensitive information or even gain access to other private and secured computer systems on the same network.

Although computer viruses aren't deadly, they can spread at an unimaginable rate across your entire computer system, affecting your database, networks and other IT-related sources. You can get these viruses by opening bogus email messages, downloading unknown file attachments, and accidentally clicking ads that pop up your screen. This is why there is a need for a strong and effective security system to protect your network.

One of the tested and proven security strategies used today is defense in depth. This concept focuses on the coordinated and organized use of multiple security countermeasures to keep your database safe from intrusive attackers. Basically, this concept is based on the military principle that a multi-layered and complex defense is more difficult to defeat than a single-barrier protection system.

The defense in depth strategy assures network administrators by working on the basis of the following guiding principles:

Defenses in multiple places

The fact that many viruses can attack the network system from multiple points means that you need to deploy strong defense mechanisms at multiple locations that can endure all types of attacks.

Defense in depth focuses on areas by deploying firewalls and intrusion detection to endure active network attacks and also by providing access control on servers and host machines, to resist distribution attacks from the insiders. This multi-layered defense also protects local and area-wide communication networks from denial of service attacks.

Multiple layered defense

Defense in depth is an extremely effective countermeasure strategy, because it deploys multiple layered defense mechanisms between the attacker and its target. Each layer of the defense has a unique mechanism to withstand the virus attacks. Furthermore, you need to make sure that each layer has both detective and protective measures to ensure the security of the network.

The reason for wrapping the network with multiple layers of defense is because a single line of defense may be flawed. And the most certain way to protect your system from any attacks is to employ a series of different defenses that can be deployed to cover the gaps in the other defenses. Malware scanners, firewalls, intrusion detection systems, biometric verification and local storage encryption tools can individually serve to protect your IT resources in a way others cannot.

Perhaps the final layer of defense should be educating your employees not to compromise the integrity of the computer systems with potentially unhealthy computer practices. As much as possible, teach them the dos and don’ts of using the computer, as well as how they can prevent viruses and other computer malware coming in and destroying your system.

If you’re looking to give your computer systems better protection against the harmful elements that the internet can bring, then give us a call now and we’ll have one of our associates take care of you and help defend your business.

Contact Us Today!

Download Whitepapers now!

Published with permission from TechAdvisory.org. Source.
Topic Security
February 13th, 2014

Windows_Feb10_AServers are an important tool to many businesses, largely because they support the important technology systems required to do business. While servers can host nearly every type of software solution, one of the most common is email and office support, of which Microsoft Exchange is widely considered to be the best. If you are looking into a new email solution, you have likely come across Hosted Exchange. The question many have however, is what exactly is it and can it help?

What is Hosted Exchange?

Microsoft Exchange is first and foremost a messaging system. It offers businesses a number of services, including email, calendars, task management, address lists, and more. By integrating Exchange into your business, you can also gain the ability to access all of these servers from any location, on almost every device.

Many companies that purchase Exchange will actually install it on servers that are usually in the office. The thing with this is that it can be a bit expensive, especially for smaller businesses, and the server needed to host it can take up space that a business may not have. Other companies simply prefer to operate on cloud-based systems.

In order to meet demands, and offer a reliable product to companies of all sizes, many IT companies, including Microsoft, started to offer Hosted Exchange. How this works is your IT partner, who is your provider, makes space available on one of their servers. They then install Microsoft Exchange in a space which is only accessible to your company, over an Internet connection.

A provider is in charge of ensuring the data stored within is secure and accessible to the client, you, at all times. Many Hosted Exchange providers will also offer extra features like improved security, full-time management, and even data backup.

In other words, Hosted Exchange is the cloud-version of Exchange and is often managed by the host company. You and your employees will still be able to access it as you would if it were hosted in your business, meaning there is no real visible difference.

What benefits can Hosted Exchange offer?

There are a wide variety of benefits that Hosted Exchange can bring to companies looking to integrate it into their business. Here are four of the most common

1. It makes costs more predictable

Like many other hosted services, the majority of Hosted Exchange services are offered on a monthly, per user basis and the host will take care of the maintenance and hosting. This makes your costs predictable as you will only have to pay a fixed fee.

2. It can lower costs

If a business were to tabulate the cost of purchasing a new server, Exchange and the other infrastructure required in order to use it, plus add in any expected maintenance fees, the total and per user cost will likely add up quite quickly.

By going with a Hosted Exchange solution, you will pay a monthly fee only. For many small businesses this will usually be far less expensive than hosting an Exchange solution on premise. Add into this money saved on maintenance overhead and growth, and Hosted Exchange quickly becomes a service that can undoubtedly help reduce IT costs.

3. It's easier to implement and manage

If you were to implement Exchange in your office you would have to find space for the server, install the server and then Exchange, and then ensure that Exchange is installed correctly and working. Once it is, you will likely have to keep managing it and adding new accounts and users while reducing others. And if something happens, say the service goes offline, you will have to fix it.

For many business owners, this is simply beyond the scope of their skills and time. If you go with a Hosted Exchange solution, your IT partner will usually take care of hosting - you won't need to worry about a server - and will also manage and install it. This leaves you to focus on managing the solution, and if you don't have time some providers can even take care of this as well. In other words, a Hosted Exchange solution is far easier for many businesses.

4. It's more flexible

If you are a fast growing company, and need to scale an Exchange solution, one hosted in house is often limited by the capacity of the server. While some businesses won't go beyond this, others will. For those that don't, an on-premise Exchange solution will likely be perfectly useable.

If your company is growing it may be tough to scale an in-house Exchange solution. With Hosted Exchange, you can usually just contact your provider and they can help ensure that the space and resources are available. The same goes for if you move offices and you will likely be up and running again as soon as you have an Internet connection.

Looking to learn more about Hosted Exchange and how your business can benefit from it? Contact us today for a chat, we'd be happy to help.

Contact Us Today!

Download Whitepapers now!

Published with permission from TechAdvisory.org. Source.
February 12th, 2014

SocialMedia_Feb10_AThere are three common social media services that can benefit businesses if used in the right way. One of the most popular is Twitter, which is a service that allows users to broadcast their thoughts and ideas in short form to the public or their followers. At first look, Twitter is straightforward but there is one mistake many users make that could harm the reach of their posts.

Social media is an always evolving idea, so what works one day won't necessarily work in the near or foreseeable future. Combine this with the various changes and features of the different social media platforms and it is nearly impossible to master every service.

When it comes to Twitter, one of the most popular features is using @username to bring the tweet to the attention of the user and to tweet about them. When you do this you and the person will be able to see it, along with people who follow that person.

What is the #1 mistake Twitter users make?

The problem is, many people put the @username at the beginning of the tweet. What this does, as we stated above, is only make the tweet visible on your feed, to the user and their followers. Why is this a problem? Well, it comes from how most businesses use Twitter. They use it to share content, e.g., a blog article or a video, etc.; to essentially tweet about the person, not at them. You see this in many tweets, for example, "@microsoft's new blog is great. Read it!"

While you want to share the content with people other than those who created it, putting @user at the front of your tweet actually limits the audience to the person who created the content and their followers - in other words the opposite of what you intend, unless Microsoft is your target audience of course!

How do you avoid mistake tweets?

If you are looking to tweet about someone or the content that user has created, using the @user is still a good idea because it will bring to the content-creator's attention that you are sharing their content. This is a great way to form relationships and even have these individuals and businesses share your content. In turn, this can help increase the potential of your content being seen by a wider audience.

For many tweets it makes sense to put the @username first as it helps make the overall tweet easier to read. The problem is, this will also limit your audience. So, for those who want to have their cake and eat it too, so to speak, add a period before @username e.g.," .@microsoft's new blog post is great. Read it!".

What this does is ensure that the tweet isn't addressed only to the user, but can be seen by everyone.

Looking to learn more about utilizing Twitter or any other social media as a part of your marketing strategy? We have a lot to tweet about and can help you tweet too.

Contact Us Today!

Download Whitepapers now!

Published with permission from TechAdvisory.org. Source.
Topic Social Media
February 11th, 2014

Security_Feb10_AThe 2014 Olympic Winter Games is underway and athletes from all over the world have made their way to Sochi, Russia to compete. As with almost every other Olympic Games, there have been a number of issues for organizers to deal with. However, unlike the last Olympics, one of those complaints is about hacking of mobile devices and computers.

Hacking at the Winter Olympics 2014

Well before the Olympics even started in Russia, the Russian government said that they will be surveilling phone and computer communications. Many scoffed at this, writing off the government as being overly ambitious and boasting about a nearly impossible task. The thing is, the Internet in Russia may not be as secure as many believe, being full of hackers. At least according to a report aired on NBC shortly before the games started.

In the report, reporter Richard Engel took new, never opened laptops and mobile devices to Russia and used them. He found that within 24 hours all of the devices had been hacked, exposing the data stored within.

In part of the segment, Engel and a security expert go to a local coffee shop in Moscow and search for Sochi on a mobile device. Almost immediately the device is hacked and malicious software downloaded. Engel notes that the hackers have access to data on the phone along with the ability to record phone calls.

In a follow-up segment, Engel explains a bit more about the laptop issues. When he boots one up and connects to the Internet, hackers are almost immediately snooping around the information, transferring from the machine to the networks. Within a couple of hours, he received a personalized email from a hacker welcoming him to Russia and providing him with some links to interesting websites. Clicking on the link allowed the hackers to access his machine.

One issue is that it hasn't been stated in any reports whether the Russian government is behind this, or if it's hackers out to steal information. While you can be sure that the Russians are monitoring communication during the Winter Olympics, it is highly likely that they are not the ones installing malware on phones, rather it's probably organized crime rings or individual hackers.

I'm not at Sochi so why do I care?

As a business owner half the world away you may be wondering why this news is so important to you, or why you should care. Take a look at any tech-oriented blog or news channel and you will quickly see that the number of attacks on devices, including malware, phishing, spam, etc. is on the rise. It's now likely a matter of when you will be hacked, not if.

Combine this with the fact that many businesses are going global, or doing business with other companies at a big distance. This has caused many people to go mobile and the tools that have allowed this are laptops and smart devices. Because so many people are now working on a laptop, phone or tablet, these devices have become big targets. The main reason for this is that many people simply don't take the same safety precautions they take while on the office or even the home computer.

Hackers know this, so logically they have started going after the easier targets. The news reports concerning Russia highlight this issue and is a warning business owners around the world should be aware of, especially if they are going to be traveling with computers or phones that have sensitive information stored within.

That being said, there are a number of tips you can employ to ensure your data is secure when you go mobile. Here are six:

1. Use cloud services wherever possible

Cloud storage services can be incredibly helpful when traveling. They often require a password to access and are usually more secure than most personal and even some business devices. If you are traveling to an area where you are unsure of the security of the Internet or your devices, you could put your most important data in a trusted cloud storage solution.

This is also a good idea because if your device gets stolen, the data is in the cloud and is recoverable. If you have data just stored locally on your hard drive, and your device is stolen, there is a good chance it's gone forever. For enhanced security, be sure to use a different password for every service.

2. Back up your data before leaving

Speaking of losing data, it is advisable to do a full system backup of all the devices you are taking with you before you leave. This will ensure that if something does happen while you are away, you have a backup of recent data that is recoverable.

3. Secure and update all of your devices

One of the best ways to ensure that your data is secure is to update all of your devices. This means ensuring that the operating systems are up-to-date and any security updates are also installed.

Also, ensure that the programs installed on the devices are updated. This includes the apps on your phone, including the ones that you don't use.

You should also secure your devices by not only having an antivirus and malware scanner but also requiring a password to access your device.

4. Watch where you connect

These days Internet connections are almost everywhere. In many public spaces like airports, coffee shops, restaurants, etc. many of the connections are open, or free to connect to, and don't require a password.

While this may seem great, hackers are known to watch these networks and even hack them, gaining access to every bit of information that goes in and out of the network. When you are traveling, try avoiding connecting to these networks if you can. If you really have to, then be sure not to download anything or log into any accounts that hold private data.

5. Know the risks of where you are going

Before you leave, do a quick search for known Internet security issues in the area you will be visiting. If you find any news or posts about threats you can then take the appropriate steps to secure your system ahead of time.

6. If in doubt, leave it at home

In the NBC report, Engle finishes by telling viewers that if they are at all unsure about the security of their devices, or are worried about their data, they should leave the device at home, or delete the data before going. This is a good piece of advice and maybe instead of deleting data completely, you could move it to a storage device like an external hard drive that you leave behind.

If you are looking to learn more about ensuring the security of your devices while you are away from the office contact us today. We have solutions to help.

Contact Us Today!

Download Whitepapers now!

Published with permission from TechAdvisory.org. Source.
Topic Security