Blog

March 19th, 2014

BCP_Marc17_BDRPs (Disaster Recovery Plan) although seemingly expensive or hard to implement, are a must have for your business. Since businesses spend thousands of dollars optimizing and upgrading their systems, doesn’t it make total sense to protect your investment? With a good DRP in place, you should be able to mitigate risks in case of a disaster.

While there are several facets to a DRP that are going to determine whether it will be effective or not, making sure that you’ve considered these 5 tips is definitely a good start.

1.) Commitment from management

Because the managers are the ones who will coordinate the development of the plan and be the central figures who implement the recovery plan, it’s crucial that they are committed to it and are willing to back it up.

They will also be responsible for setting an allocated budget and manpower to creating the actual plan. That said, it’s very important that they know the concept behind it and how huge of an impact a DRP can have on a business.

2.) A representative on each department should be available when creating a DRP

It’s unthinkable to believe that your DRP is well optimized when you haven’t had a representative from each department coordinate with you while creating the recovery program.

Considering how they themselves are the front line of your organization with the best knowledge about how their department works, it’s a huge plus that you should take advantage of when creating a DRP.

With the representatives on your team, you’ll be able to see things from their perspective and gain first-hand knowledge from those who do the actual work.

3.) Remember to prioritize

In an ideal world, you should be able to restore everything at the same time after a disaster strikes. But since most businesses usually have a limited amount of resources, you will usually have to recover systems one at a time.

Because of this, you need to have a hierarchy or a sense of priority when determining which systems should be recovered first. That way, the most important systems are immediately brought back up while the less important ones are then queued in order of their importance.

4.) Determining your recovery strategies

This is one of the main focal points of a DRP since this phase tackles the actual strategies or steps that you’ll implement to recover your systems.

When determining your actual strategies, it's important that you brainstorm and think about all the options that you have to recovering your systems. Don’t simply stick with the cheapest possible strategy or even the most expensive ones.

You have to remember though that the simplest strategy to implement is probably the best one. That is, as long as the simplest strategy covers the critical aspects of your system recovery.

That said, avoid over complicating your strategies as you might face unnecessary challenges when it comes to the implementation of the recovery strategy.

5.) Do a dry run at least once a year

Your DRP shouldn’t end with the concept alone. No matter how foolproof you think your strategy is, if you haven’t tested it you most likely have missed something important.

It's during the dry run phase that the need for extra steps (or the removal of one) are made even more evident. You can then start polishing your strategies according to how your dry run plays out. It would also be a good year to practice your plan each year and update it accordingly.

These tips will help you ensure that your DRP will remain effective should a disaster occur. If you’re having a hard time figuring out how to go about the process of creating a DRP, then give us a call now and we’ll help you with the process.

Published with permission from TechAdvisory.org. Source.

March 7th, 2014

Productivity_Mar03_BWhen it comes to productivity, many business owners rely on to-do lists. However, writing an effective to-do list can be quite a challenging task. Though a lot of people jot down their tasks for the day or week ahead they don't always fully realize the benefits of their list because it is either poorly crafted or even missing items. The result is decreased effectiveness. Hopefully our tips will help you create an effective way forward to boost productivity.

Here are 5 tips which will help you devise an effective to-do list:

Add a notes section

A notes section is a general area for all the tasks in your to-do list. Its main purpose is to provide you with space to add notes about your tasks. Or, instead you can use this area to type in challenges that you encountered when handling specific tasks.

On the flip side, it could also contain the best practices that you employed which enabled you to finish the task effectively and efficiently. These notes are important because by revisiting these jottings you can learn from them and be better able to optimize your way of doing things and your approach.

Prioritize

Ignoring client meetings because you're supposed to be fixing your cabinet, for example, based on what’s written in your to-do list, is a sure fire way of negatively impacting your business.

Your to-do list needs to be devised in such a way that there is a clear sense of priority. The most important tasks should be added to the top most part of your list just to make sure that you don’t miss these and they are tackled and completed first.

Break down your tasks to bite-size activities

Can you imagine writing down 'work' in your to-do list? Having a to-do list with broad topics like this won’t help you in the slightest bit.

You need to break down your lists into more specific tasks so that they provide the clarity that you need to achieve. Here’s a good example of a well-constructed list:

  1. Send 20 outreach emails to prospects.
  2. Discuss with the team the concept of having a systems' mindset.
  3. Review the offer of client X and decide whether to accept it or not.
Notice how the examples above are more tangible compared to simply writing down 'work'? With a list like the one above, you should be able to comfortably tick each task with a clear idea of when it has been completed.

Add a deadline whenever possible

Adding a deadline helps you gauge your output. By being able to see whether you’re lagging behind you can make any necessary changes.

A deadline also prevents you from procrastinating since you’ll be more conscious of time and a definitive end point.

Be realistic

Adding a week's worth of tasks to your daily to-do list will just discourage and frustrate you. Be as realistic as you can when writing up your list. If you honestly think that you can’t finish all of the tasks within one day, then add some of them to the next. That way you won’t be frustrated with a long list of tasks that you haven’t completed at the end of each day.

If you are faced with productivity issues and are struggling to get the kind of output you're hoping for in your business, then put giving us a call at the top of your to-do list.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
March 6th, 2014

Security_May03_BEnsuring the security of your systems and computers can sometimes seem like a full time job and an uphill battle, especially with the increasing number of security issues being discovered. From bugs in software to malware, there is almost always some attack challenging the system security and potentially leading to a security breach. The other week a number of articles highlighted a bug in Apple's systems that poses a potential security flaw.

About the bug

News broke on many security websites mid-February about a potentially critical security flaw in Apple's systems following the company releasing an update to their mobile operating system, iOS.

The update notes released by Apple noted that the patch "provides a fix for SSL connection verification." This is a fairly common update as it is aimed at improving the security of communications between websites and the device. However, security experts found out that without the update attackers who can connect to a network are able to capture sensitive information being sent in banking sessions, email messages, and even chat messages using what's called an SSL/TSL session.

What exactly is SSL/TSL?

Secure Sockets Layer (SSL) and Transport Layer Security (TSL) are used in networks to essentially establish an encrypted link between a server and your computer. They are most commonly used to secure websites and the transmission of data. Take a look at some websites and you may see a padlock on the URL bar, or https:// in the URL. This indicates that the website is using SSL or TSL encryption to protect the data that is being transmitted e.g., your bank account information on a website.

In other words, SSL and TSL are used to ensure that information is exchanged securely over the Internet.

What was the problem and what software was affected?

It was found that there was a bug in the code Apple's software uses to establish a SSL connection which causes the whole SSL system to fail, potentially exposing data that should have been encrypted to anyone connected to the network with the right tools.

According to security experts, this bug has been found to affect devices running older versions of iOS 7, OS X 10.8 and newer, Apple TV, and possibly iOS 6. It is important to note that the bug is only found in Apple's SSL technology. Any app that uses Apple's version of SSL could be affected.

Has Apple solved this?

Luckily, Apple has released updates to all of their devices that should solve this security exploit. If you have not updated your device or computer since the middle of February you could be at risk.

How do I prevent my systems from being affected?

The first thing you should do is to update all Apple related apps and devices, including all mobile devices. If you are unsure about whether your apps are secure enough, try using another app, especially another browser. The reason for this is because browsers like Chrome and Firefox all use a different SSL technology and are unaffected by this bug.

You should also remain vigilant and not connect to any open or public Wi-Fi connections or even secured Internet connections that could be easy to break through. Basically, as long as you update you should be fine. However, it may be worthwhile using another browser if you are really worried about whether you have a secure connection.

If you are looking to learn more about this security flaw, or how you can secure your business from threats like this, contact us today. We can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 5th, 2014

BusinessValue_Mar03_BMany business owners are looking for different ways in which they can connect with their customers while also building a company brand or adding value to their products or services. While a business website and a presence on social media sites can be a big help, blogging can sometimes be a better way to connect with your customers and potential customers.

If you're looking to get people more involved and connected with your company, spread your brand image and message, and perhaps establish your company as an industry leader, then blogging might just be the answer.

There is little doubt that companies that blog effectively do see an increase in overall value. That being said, it can be a challenge to develop and maintain a successful blog.

Here are 7 tips for businesses looking to start a blog or develop an existing one into a more successful platform:

1. Define your topics and your audience

As with almost every business process, there needs to be a solid foundation on which to build your blog, such as the topics you write about and your audience.

Take a minute to establish who your target audience is, such as your average customer. Pick some basic characteristics that cover the majority of this group. Focusing on who you are writing articles for can make writing not only easier but more relevant and effective.

Many of the most successful business blogs choose blog topics based on their services or products and news. The key is to select topics based on what you think your audience will find useful or interesting. You might not want to spread your blogs over too many topic areas as these can be hard work to cover on a regular basis. About 4-8 is a good amount to aim for.

2. Be consistent

With defined topics and a target audience in mind, you are well on your way to establishing a solid foundation for your blog. The next element is to devise a calendar of how often you write blogs and cover certain topics. If, for example, you picked four topics this could equate to one article a month for each topic.

What you are striving for is consistency. You should be writing and posting a new article at least once a week, or more. If you establish a calendar based around your topics you will find it easier to write content on a regular basis and soon it will become a natural part of your weekly tasks.

3. Be relevant

Even with defined topics, it can be a struggle to come up with new ideas for blogs. It can be tempting to write about a new product or feature, but you have to be careful that it doesn't read too much like boring marketing material.

Instead, focus on what your audience would like to read. Often the most successful articles are those that answer common questions asked by clients, or talk about how a product or service can help a client. Other articles could be related to your products rather than directly about them. For example, if you own a coffee shop then writing about food that goes well with coffee might be an interesting blog idea.

Personal opinions can provide an interesting perspective and many readers find these types of business blogs refreshing. However, you do need to be careful of ostracizing those who might not agree with you or putting people off with negative blogs.

4. Don't forget the CTA

Remember, your business blog needs to have a purpose: You want to not only develop interest in the company, but to drive business. At the end of most if not all of your articles you can include a call to action (CTA) that suggests to the reader to contact you, come in for a visit or email.

5. Keep articles easy to read

It can be tempting to write a 4,000 word article with a ton of great information. Google and many search engines do look positively at long-form content and this might work well for your search rankings. The only problem is that when many of us read articles online we skim them, looking for salient points and skipping up to 90% of the article.

To that end, keep articles on the shorter side - around 500-1,000 words. Use shorter sentences and headings like H3 and bold to separate content and make it more scannable. Writing a longer article? Split it into two, three or even four parts. This helps drive interest to return to check out the new parts when they are posted.

6. Promote and share your content

Share your blog content on your social media profiles. This increases the reach of your blog, but also drives traffic to your website. You can put an easy to see link to your blog on your homepage and even in email headers.

Many writers also find success in contributing, or writing a blog for other websites. This helps not only spread your ideas, content, and company name, but can also help find content for your blog as other writers contribute to yours. Try contacting friends and colleagues to see if they would like you to write a post for their blog.

7. Remember you don't have to be the only contributor

Finally, you don't have to be the only person writing your blog. Ask your employees if they have any article ideas they would like to write about. The more writers contributing, the more content there is. This also takes the pressure off of you having to develop, write, and post everything, as well as offering a different voice for variety.

If you are looking to launch a blog, contact us to see how we can help.

Published with permission from TechAdvisory.org. Source.

February 28th, 2014

BI_Feb24_BIf there is one thing all businesses rely on it's data. As the integration of new systems and features continues, the amount of data available to a businesses grows. In order to be able to get more out of this data, businesses have started looking at adopting Business Intelligence (BI) systems. These come with their own language, and three of the more confusing terms are data mart, data warehouse, and data mining.

What is a data warehouse?

The concept of a data warehouse is an interesting one and also a difficult one to define and pin down largely because it can cover such a broad area. The most concise definition we can give is that it is a database that integrates data from many different locations and databases into one consolidated database.

Data warehouses store both current and historical data, and rarely contain unique data. Instead, they aggregate data from other sources in order to make this more accessible. They might store important information from sales, marketing, ERP, customer interactions, and any form of database in order to quickly generate BI related reports.

The name undoubtedly conjures up the idea of a large warehouse-like building storing infinite amounts of data. However, most data warehouses are actually tables which are created by taking data from various sources and cleaning it up so that relevant data is stored in the warehouse in a way that makes it easier to reach when needed.

What is a data mart?

A data mart is a smaller data warehouse that stores data. These are based on a specific area or business function e.g., finance or marketing, etc. In fact, most modern data warehouses are actually made up of a series of smaller data marts.

The key difference between a data mart and a data warehouse is that data marts are usually smaller, focusing on one specific area, while a data warehouse covers the whole organization.

What is data mining?

When talking about Business Intelligence, many experts will refer to data mining. This is the act of analyzing data in order to identify patterns. The data that is mined can then be transformed into useable information. Many companies store this mined data in databases, a data warehouse, or a data mart.

Want to learn more about these terms and how your company can benefit from a BI solution? Contact us today.

Published with permission from TechAdvisory.org. Source.

February 20th, 2014

Security_Feb17_BComputer and network security is an important issue to many business owners and managers. One of the most common security threats companies come across is phishing. Because phishing has become so prevalent, most people are aware of these underhand methods. This has led to hackers having to come up with new phishing methods, one of which is spear phishing.

What is spear phishing?

Spear phishing is a specialized type of phishing that instead of targeting a mass number of users, as normal phishing attempts, targets specific individuals or groups of individuals with a commonality e.g., an office.

Generally a hacker will first pick a target and then try to learn more about the related people. This could include visiting a website to see what a company does, who they work with, and even the staff. Or they could try hacking a server in order to get information.

Once they have some sort of information, usually a name, position, address, and even information on subscriptions, the hacker will develop an email that looks similar to one that another organization might send e.g., a bank. Some hackers have been known to create fake email accounts and pose as a victim's friend, sending emails from a fake account.

These emails are often similar to official correspondence and will always use personal information such as addressing the email to you directly instead of the usual 'dear sir or madam'. The majority of these emails will request some sort of information or talk about an urgent problem.

Somewhere in the email will be a link to the sender's website which will look almost exactly like the real thing. The site will usually ask you to input personal information e.g., an account number, name, address, or even passwords. If you went ahead and followed this request then this information would be captured by the hacker.

What happens if you are speared?

From previous attack cases and reports, the majority of spear phishing attacks are finance related, in that the hacker wants to gain access to a bank account or credit card. Other cases include hackers posing as help desk agents looking to gain access to business systems.

Should someone fall for this tactic, they will often see personal information captured and accounts drained or even their whole identity stolen. Some spear phishing attacks aren't after your identity or money, instead clicking on the link in the email will install malicious software onto a user's system.

We are actually seeing spear phishing being used increasingly by hackers as a method to gain access to business systems. In other words, spear phishing has become a great way for people to steal trade secrets or sensitive business data.

How do I avoid phishing?

Like most other types of phishing related emails, spear phishing attempts can be easy to block. Here are five tips on how you can avoid falling victim to them.
  • Know the basic rule of business communication - There are many basic rules of communication, but the most important one you should be aware of is that the majority of large organizations, like banks, social media platforms, etc., will not send you emails requesting personal information. If you receive an email from say PayPal asking you to click a link to verify your personal information and password, it's fake and you should delete it.
  • Look carefully at all emails - Many spear phishing emails originate in countries where English is not the main language. There will likely be a spelling mistake or odd wording in the emails, or even the sender's email address. You should look out for this, and if you spot errors then delete the email immediately.
  • Verify before you click - Some emails do have links in them, you can't avoid this. That being said, it is never a good idea to click on these without being sure. If you are unsure, phone the sender and ask. Should the email have a phone number, don't call it. Instead look for a number on a website or previous physical correspondence.
  • Never give personal information out over email - To many this is just plain common sense - you wouldn't give your personal information out to anyone on the street, so why give it out to anyone online? If the sender requires personal information try calling them or even going into their business to provide it.
  • Share only essential information - When signing up for new accounts online, there are fields that are required and others that are optional. Only share required information. This limits how much a hacker can get access to, and could actually tip you off. e.g., they send you an email addressed to Betty D, when your last name is Doe.
  • Keep your eyes out for the latest scams - Pay attention to security websites like those run by the major antivirus providers, or contact us. These sites all have blogs where they post the latest in security threats and more, and keeping up-to-date can go a long way in helping you to spot threats.
If you are looking to learn more about spear phishing or any other type of malware and security threat, get in touch.
Published with permission from TechAdvisory.org. Source.

Topic Security
February 19th, 2014

BCP_Feb17_BLet’s accept the fact that disasters are inevitable. These kinds of situations can be threatening to human lives and business operations as well. In order to prevent further disruption in your business operations, you need to implement a comprehensive disaster recovery plan. These emergency plans can help expedite your business's recovery, making it more painless for the management to handle.

When creating a disaster recovery plan for your business, there are certain key elements that you need to consider.

Basics of a Disaster Recovery Plan

In building an effective disaster recovery plan, you should include thorough documentation that lays out the details of the ins and outs of the plan. You need to know that there is no right type of DRP, nor is there a single template that fits all. But there are three basic aspects to a disaster recovery plan: Preventive measures, detective measures, and corrective measures.

In addition, before building your disaster recovery plan, make sure that it can provide an answer to these basic questions:

  1. What is the objective and the purpose of making one?
  2. Who are the assigned team responsible when certain events occur?
  3. What is the framework and the procedure to be followed?

Plan for the worst case scenario

Since you’re planning for an unforeseen event, you might as well make sure that you have plan for the worst case scenario. That way, you’ll never be overwhelmed and you’re as prepared as you can be for any situation.

Having different tiers of backup plans is also advisable. It gives you a better assurance that when bad comes to worst, you have a system in place to make sure that these disasters are handled correctly, regardless of the disaster’s severity.

Data issues

One of the objectives of disaster recovery plan is to protect the collection of data. Almost half of the total population of business organizations experiences data loss from both physical and virtual environments. This is often due to corruption of the file system, broken internal virtual disks, and hardware failures. Thus, there is a real need for established data recovery plans such as backup features offered by many IT solution vendors.

Test-drive

Before deploying your disaster recovery plan, you need to have a sort of a test-drive to check if it works. Aside from making it work, you also need to know if it’s going to be effective. Through testing, any shortcomings can be identified and will garner corresponding resolutions to improve on your plan. Although the real score of its effectiveness can only be identified once a disaster occurs, at least you will have an idea of how your business and the recovery plan can operate during a disaster.

Building an effective disaster recovery plan is a must for your business. This might not directly lead to a positive impact on productivity but it will surely save you in the events that can possibly crush your business. Anticipating and adjusting for the things that might happen is one of the keys to a company’s success.

Setting up an effective DRP can be quite an intricate process since there are several elements that you need to consider. Should you want to learn more, give us a call and we’ll have our associates help you develop and test a plan that works best for your business.

Published with permission from TechAdvisory.org. Source.

February 14th, 2014

Security_Feb11_BEven the most reliable business network security and sophisticated user credentials can be vulnerable to cyber attacks to some extent. The concept of a comprehensive layered security, called defense in depth, is based on a strategy which has been around since the time of the Romans. A multiple-layered defense is created to prevent the advancement of attack. This strategy has been proven to be an effective IT security method these days.

Just like the human body, a computer system can also be attacked by many viruses that can infect and disrupt computer operations. And what's worse is it doesn’t just disrupt the operations of your computer, but these viruses and other malware can gather sensitive information or even gain access to other private and secured computer systems on the same network.

Although computer viruses aren't deadly, they can spread at an unimaginable rate across your entire computer system, affecting your database, networks and other IT-related sources. You can get these viruses by opening bogus email messages, downloading unknown file attachments, and accidentally clicking ads that pop up your screen. This is why there is a need for a strong and effective security system to protect your network.

One of the tested and proven security strategies used today is defense in depth. This concept focuses on the coordinated and organized use of multiple security countermeasures to keep your database safe from intrusive attackers. Basically, this concept is based on the military principle that a multi-layered and complex defense is more difficult to defeat than a single-barrier protection system.

The defense in depth strategy assures network administrators by working on the basis of the following guiding principles:

Defenses in multiple places

The fact that many viruses can attack the network system from multiple points means that you need to deploy strong defense mechanisms at multiple locations that can endure all types of attacks.

Defense in depth focuses on areas by deploying firewalls and intrusion detection to endure active network attacks and also by providing access control on servers and host machines, to resist distribution attacks from the insiders. This multi-layered defense also protects local and area-wide communication networks from denial of service attacks.

Multiple layered defense

Defense in depth is an extremely effective countermeasure strategy, because it deploys multiple layered defense mechanisms between the attacker and its target. Each layer of the defense has a unique mechanism to withstand the virus attacks. Furthermore, you need to make sure that each layer has both detective and protective measures to ensure the security of the network.

The reason for wrapping the network with multiple layers of defense is because a single line of defense may be flawed. And the most certain way to protect your system from any attacks is to employ a series of different defenses that can be deployed to cover the gaps in the other defenses. Malware scanners, firewalls, intrusion detection systems, biometric verification and local storage encryption tools can individually serve to protect your IT resources in a way others cannot.

Perhaps the final layer of defense should be educating your employees not to compromise the integrity of the computer systems with potentially unhealthy computer practices. As much as possible, teach them the dos and don’ts of using the computer, as well as how they can prevent viruses and other computer malware coming in and destroying your system.

If you’re looking to give your computer systems better protection against the harmful elements that the internet can bring, then give us a call now and we’ll have one of our associates take care of you and help defend your business.

Published with permission from TechAdvisory.org. Source.

Topic Security
February 12th, 2014

SocialMedia_Feb10_BModern marketing is made up of a number of increasingly complex functions and systems, with one of the most important elements being social media. There are a number of platforms available to businesses and a popular one is microblog Twitter. While Twitter is fairly easy to use, there is actually a really common mistake that many users make which can harm the reach of their posts.

Social media is an always evolving idea, so what works one day won't necessarily work in the near or foreseeable future. Combine this with the various changes and features of the different social media platforms and it is nearly impossible to master every service.

When it comes to Twitter, one of the most popular features is using @username to bring the tweet to the attention of the user and to tweet about them. When you do this you and the person will be able to see it, along with people who follow that person.

What is the #1 mistake Twitter users make?

The problem is, many people put the @username at the beginning of the tweet. What this does, as we stated above, is only make the tweet visible on your feed, to the user and their followers. Why is this a problem? Well, it comes from how most businesses use Twitter. They use it to share content, e.g., a blog article or a video, etc.; to essentially tweet about the person, not at them. You see this in many tweets, for example, "@microsoft's new blog is great. Read it!"

While you want to share the content with people other than those who created it, putting @user at the front of your tweet actually limits the audience to the person who created the content and their followers - in other words the opposite of what you intend, unless Microsoft is your target audience of course!

How do you avoid mistake tweets?

If you are looking to tweet about someone or the content that user has created, using the @user is still a good idea because it will bring to the content-creator's attention that you are sharing their content. This is a great way to form relationships and even have these individuals and businesses share your content. In turn, this can help increase the potential of your content being seen by a wider audience.

For many tweets it makes sense to put the @username first as it helps make the overall tweet easier to read. The problem is, this will also limit your audience. So, for those who want to have their cake and eat it too, so to speak, add a period before @username e.g.," .@microsoft's new blog post is great. Read it!".

What this does is ensure that the tweet isn't addressed only to the user, but can be seen by everyone.

Looking to learn more about utilizing Twitter or any other social media as a part of your marketing strategy? We have a lot to tweet about and can help you tweet too.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
February 11th, 2014

Security_Feb10_BThe Olympics is one of the most popular and well known sporting events in the world, and the 2014 Olympic Winter Games are well underway. This round, they are in Sochi, Russia and like every other event, there have been various organizational issues to deal with. Unlike the last Olympics however, one of those issues is the risk of hacking of mobile devices and computers.

Hacking at the Winter Olympics 2014

Well before the Olympics even started in Russia, the Russian government said that they will be surveilling phone and computer communications. Many scoffed at this, writing off the government as being overly ambitious and boasting about a nearly impossible task. The thing is, the Internet in Russia may not be as secure as many believe, being full of hackers. At least according to a report aired on NBC shortly before the games started.

In the report, reporter Richard Engel took new, never opened laptops and mobile devices to Russia and used them. He found that within 24 hours all of the devices had been hacked, exposing the data stored within.

In part of the segment, Engel and a security expert go to a local coffee shop in Moscow and search for Sochi on a mobile device. Almost immediately the device is hacked and malicious software downloaded. Engel notes that the hackers have access to data on the phone along with the ability to record phone calls.

In a follow-up segment, Engel explains a bit more about the laptop issues. When he boots one up and connects to the Internet, hackers are almost immediately snooping around the information, transferring from the machine to the networks. Within a couple of hours, he received a personalized email from a hacker welcoming him to Russia and providing him with some links to interesting websites. Clicking on the link allowed the hackers to access his machine.

One issue is that it hasn't been stated in any reports whether the Russian government is behind this, or if it's hackers out to steal information. While you can be sure that the Russians are monitoring communication during the Winter Olympics, it is highly likely that they are not the ones installing malware on phones, rather it's probably organized crime rings or individual hackers.

I'm not at Sochi so why do I care?

As a business owner half the world away you may be wondering why this news is so important to you, or why you should care. Take a look at any tech-oriented blog or news channel and you will quickly see that the number of attacks on devices, including malware, phishing, spam, etc. is on the rise. It's now likely a matter of when you will be hacked, not if.

Combine this with the fact that many businesses are going global, or doing business with other companies at a big distance. This has caused many people to go mobile and the tools that have allowed this are laptops and smart devices. Because so many people are now working on a laptop, phone or tablet, these devices have become big targets. The main reason for this is that many people simply don't take the same safety precautions they take while on the office or even the home computer.

Hackers know this, so logically they have started going after the easier targets. The news reports concerning Russia highlight this issue and is a warning business owners around the world should be aware of, especially if they are going to be traveling with computers or phones that have sensitive information stored within.

That being said, there are a number of tips you can employ to ensure your data is secure when you go mobile. Here are six:

1. Use cloud services wherever possible

Cloud storage services can be incredibly helpful when traveling. They often require a password to access and are usually more secure than most personal and even some business devices. If you are traveling to an area where you are unsure of the security of the Internet or your devices, you could put your most important data in a trusted cloud storage solution.

This is also a good idea because if your device gets stolen, the data is in the cloud and is recoverable. If you have data just stored locally on your hard drive, and your device is stolen, there is a good chance it's gone forever. For enhanced security, be sure to use a different password for every service.

2. Back up your data before leaving

Speaking of losing data, it is advisable to do a full system backup of all the devices you are taking with you before you leave. This will ensure that if something does happen while you are away, you have a backup of recent data that is recoverable.

3. Secure and update all of your devices

One of the best ways to ensure that your data is secure is to update all of your devices. This means ensuring that the operating systems are up-to-date and any security updates are also installed.

Also, ensure that the programs installed on the devices are updated. This includes the apps on your phone, including the ones that you don't use.

You should also secure your devices by not only having an antivirus and malware scanner but also requiring a password to access your device.

4. Watch where you connect

These days Internet connections are almost everywhere. In many public spaces like airports, coffee shops, restaurants, etc. many of the connections are open, or free to connect to, and don't require a password.

While this may seem great, hackers are known to watch these networks and even hack them, gaining access to every bit of information that goes in and out of the network. When you are traveling, try avoiding connecting to these networks if you can. If you really have to, then be sure not to download anything or log into any accounts that hold private data.

5. Know the risks of where you are going

Before you leave, do a quick search for known Internet security issues in the area you will be visiting. If you find any news or posts about threats you can then take the appropriate steps to secure your system ahead of time.

6. If in doubt, leave it at home

In the NBC report, Engle finishes by telling viewers that if they are at all unsure about the security of their devices, or are worried about their data, they should leave the device at home, or delete the data before going. This is a good piece of advice and maybe instead of deleting data completely, you could move it to a storage device like an external hard drive that you leave behind.

If you are looking to learn more about ensuring the security of your devices while you are away from the office contact us today. We have solutions to help.

Published with permission from TechAdvisory.org. Source.

Topic Security