10-part series CyberSecurity for the Small Business – Introduction

Cybersecurity experts often refer to the 10/90 rule. The rule suggests that 10% of cybersecurity is reliant upon technology such as firewalls, anti-virus software and related tools. 90% of cybersecurity is up to the users. This past September (2017), the IRS released they were receiving reports of data breaches with tax professionals at the rate [...]

By | 2017-11-10T17:36:57+00:00 November 10th, 2017|Business, Policies, Procedures, Security|0 Comments

What is PACE?

 PACE is a planning tool I learned in the ARMY. PACE is an acronym for Primary, Alternate, Contingent and Emergency. Specifically, at the time, it was used to describe the communications plans for a unit in different situations. Over time, I have learned to apply PACE to many other aspects of life and business. Here [...]

By | 2017-11-07T13:54:26+00:00 November 7th, 2017|Business Continuity, Policies, Procedures, Readiness|0 Comments

Helping us help you

Often times it is easier if when helping you we can see the same thing you are seeing, as it is happening. Our monitoring tool includes a screen sharing solution, but not everyone wants to sign up for our monthly billed services agreement. In these cases, we still offer remote support, just with a different [...]

By | 2017-11-06T17:09:29+00:00 November 6th, 2017|Business, Procedures, Services|0 Comments

Another Ransomware Attack Raging Across Europe

And ... Here we go, again. Another Ransomware attack is raging across Europe, right now, and has hit at least one US business.  Here is the basics of what you need to know:  The Petya virus is successfully detected by only a few of the tested anti-virus softwares. Webroot (which I offer to my clients) [...]

By | 2017-06-27T11:49:02+00:00 June 27th, 2017|Backups, Business, Monitoring, Policies, Procedures, Security, Services|0 Comments

How-To Protect Against Ransomware

Today in a networking meeting, I was asked "What is the best way to protect against these ransomware threats?" As an I.T. guy, my immediate answer was … well, sarcastic. Something about air-gapped systems with no internet access and so on. In reality, not a practical, though accurate answer. Fortunately, Stephanie understood I was giving [...]

How to Backup Single User Data on a Windows 8 Systems

A Facebook conversation today lead a contact to ask how to perform a Windows 8 backup. This lead to a few questions and answers and a promise to create this blob post. So, let's just jump into it. Before getting started, we need to recognize that Microsoft removed the NT Backup utility from Windows 8. [...]

By | 2017-02-02T18:49:14+00:00 February 2nd, 2017|Backups, Business, Business Continuity, Documentation, Policies, Procedures|0 Comments

10 Benefits of Managed IT Services

The problems with traditional IT Services are that they operate in a "Break-Fix" or "Pain=Pay" model. When something is breaks, you call someone to fix it. When you are in pain, they track their time and materials for the repair process. Often a close relationship is never established, so the technician may not be familiar [...]

By | 2016-12-06T09:34:57+00:00 December 6th, 2016|Business, CIO/CTO, Documentation, Policies, Procedures, Services|0 Comments

The 4 C’s of Business Continuity Planning

If you have or run a business, then you have had those nights of no sleep, as you worry about 'What if'. Every business owner has had these worries. Ranging from 'What if the weather guy is wrong and we are hit with a blizzard?' to 'Fred is my strongest employee. What would we do, [...]

Why hire a Managed Services Provider?

Let's start with a simple scenario where a company has Jenny who is paid $20 an hour whose computer has stopped working. He spends 15 minutes, rebooting and such, trying to fix the issue himself. When that fails to resolve the issue, Jenny contacts Bill, the 'computer expert' on the staff, a lower level person [...]

Backups — Documentation

With most every client I take on there are two weaknesses I can count on encountering. Documentation and Backups. In the years I've been operating as a consultant, new clients have had little or no documentation of their computer systems. The documentation is at the previous consultant's house, in his head or does not even [...]