Tag Archives: Computer network security

Safeguarding Your Laptop

In today’s fast paced world, business is always on the move. If you are like many businesses today, this means more than just some glossy metaphor. With lighter, more powerful laptops, your office can travel with you. You don’t have to be out of touch with your critical information simply because you’re “on the road”. With cloud computing and virtual desktops, every aspect of your business can be available to you at the tips of your fingers.

But what happens when you lose the ability to use that laptop? What happens when you have information stored on your laptop that you just can’t afford to lose? Perhaps it’s that latest details of your next major project or the start of a presentation you’re planning on delivering. Perhaps it’s a copy of an agreement or revision notes you’ve taken while you were speaking with a client. Can you afford to lose that work?

As we’ve discussed before, information is one of the most valuable assets of your business. Losing it can cost you and your business a lot.

There are many ways you could lose your laptop, including but not limited to:

  • theft
  • hardware failure
  • damage or dropping your device
  • hard drive corruption

Is the information on your laptop safe from these situations?

According to FBI’s Computer Crime Survey, the estimated cost of computer security incidents is $67.2 billion annually. And based on a recent study by Ponemon Institute, organizations lose up to $7.2 million each data breach and an average of $49,246 of data per lost laptop.

If you are concerned at all, consider the StaySafe Protection program. The Protection program is the newest member of our StaySafe suite of services all designed to help keep your most valuable asset, your data, safe. What makes StaySafe Protection unique is that is has a laptop specific component, Mobile Vault, designed for the “on-the-go” business person.  Mobile Vault provides your laptop will receive industry leading business-class backup service, fully encrypted data transfers, IP tracing and remote data removal. Compare this with traditional backup strategies.

Traditional Backup Plans StaySafe Protection Mobile Vault
Business-class backup of data
AES 256-bit encryption of data ?
Load balance/silent data transfer ?
IP Tracing of devices
Remote data destruction

Business-class backup of data

Let’s face it, not all backups are created equal. Business-class backup comes with a level of integrity that you can’t get from at home versions of backup. Business-class backup includes:

  • redundant systems to ensure optimal uptimes
  • professional level software enabling greater level of control over data
  • ability to apply policies and create procedures the increase compliance of data

AES 256-bit encryption of data

One of the greatest dangers of working with data over the Internet these days is the fear the information can be stolen. Without proper encryption, your business intelligence and competitive advantage is just floating out there for someone to pick up and steal. AES 256-bit encryption is the latest and greatest in industry techniques.

Load balancing and silent transfer of data

Most traditional backup plans will require you set a time to “run” the backup. It utilizes all of your system’s resources to upload the computer’s information into a remote location. This process can take hours to complete and tie up critical systems, slowing down the internet and any other operations on that system. As such, most businesses schedule traditional backup plans to run late at night, when they expect low traffic on their network.

But with remote systems, you can’t always predict when you’ll be hooked up to the internet and available to do this backup. Under the traditional backup plans, that could mean your computer will miss these critical backups. Or worse, your already slow remote connection will move even slower because you’re trying to share the bandwidth with your backup process. Many times, you’re not connected to these remote internet services long enough to truly perform a full backup, thus potentially corrupting your backups and losing your critical data.

Under Mobile Vault, the service is intelligent enough to perform data transfer in increments, transferring small packets so it not only using less bandwidth but can optimize on your limited remote access. If you lose connection to the internet, it will simply resume where it left off and thus prevent data corruption.

IP Tracing and Remote data destruction

One of the scariest things that can happen to any business person is losing their laptop. Not only is it a physical asset loss, it could also mean the loss of critical information and compromise of the business. With Mobile Vault, businesses are now able to track and remove critical information even if the computer is physically lost.

Using the administrative interface, Mobile Vault can put a listener out on the Internet. As soon as the computer tries to connect to the internet again (which is a standard process triggered when most computers turn on), the system will retrieve the location of the computer via IP address. From here, the lost device can be located and any critical information removed remotely from the system.

Interested to learn more about what StaySafe Protection or any services under the StaySafe line can offer your computer? Just give us a call or email today. We’d be happy to assist you further and help evaluate if this service is right for your business.

Symantec Says: Small Business Not Protecting Data When Virtualizing Servers

The good news about virtualization among small businesses is that it is growing in popularity (though small businesses are still learning how to adopt it in their organizations). The bad news is that as they implement server virtualization, small businesses are putting their data at risk.

In the 2011 Small Business Virtualization Poll conducted among 658 respondents from 28 countries worldwide, Symantec Corp. found out that most small businesses aren’t taking the most basic steps to secure and protect their virtual environments.

The survey also found that financial benefits were the main reasons for businesses to turn to virtualization.  Seventy percent of respondents said their organizations are considering virtualization. 70 percent cited that reduced capital expense would drive their decisions to deploy virtualization while 68 percent said it was reduced operating expense. The ability to use fewer servers for the same number of applications (67 percent) and improved server scalability (65 percent) were found to be other reasons.

Despite the growing interest in virtualization, small businesses have been forced to limit virtualization only to discussions. What could be holding them back? The answer is “Limited IT Skills”. On the other hand, nearly a third of small businesses not planning virtualization blamed it on lack of experience. Out of those surveyed, only 10 percent have deployed virtualized servers and even they are focusing their early-stage efforts on simpler, less critical application areas. Performance (60 percent), backup (56 percent), and security and patch management (56 percent) were cited as top challenges.

The survey also found out a shocking fact; only 15 percent always back up their virtualized servers and 23 percent do it infrequently or not at all. And even worse is the fact that only 40 percent completely secure their data. Budget and staffing issues were cited to be the main hindrances by respondents. Even those who said they are somewhat or completely secure are less secure than they think. The survey found that 78 percent don’t have antivirus on their virtual servers, 48 percent don’t have a firewall, and 74 percent forego endpoint protection.

So, what should small businesses do? Here are a few recommendations for them to make sure they are properly protecting their data and systems:

  • Define a virtualization strategy by working with an IT consultant. By assessing your data protection and security needs, build a strategy complete with guidelines. Also determine if moving to these cloud services are right for you. Once you have a strategy in place, develop a plan and follow it.
  • Secure your virtual environments by considering what security solutions you need to secure your virtual environment; think firewall, antivirus, and endpoint security. Don’t forget to establish security practices.
  • Protect your data with backup solutions for both physical and virtual environments. Want to save space and time? Consider a data deduplication solution.
Talk with us today, Solve-IT specializes in helping business throughout the Niagara region with all their computer and business network support.  We look forward to serving your Niagara computer support needs.

What Is Wardriving and Why Should Your Hamilton Business Be Concerned?

If you happen to run a small business, beware! At one time, making sure our computers were locked to our desks and we had the right passwords were just enough to secure confidential corporate data. Maybe having your server locked in a secure room gave you the peace of mind that everything was secure. Times have changed especially since the invention of wireless networks. Today, crooks simply need a WI-FI connection to break into your office.

These Wardrivers drive around cruising neighbourhoods, shopping centers and office buildings looking for open or WI-FI networks that can be easily hacked into. All businesses are at risk! Small Business right through to large corporations can fall victim to a compromise of their WI-FI network. There are almost daily stories of corporations having their WI-FI networks hacked into and customer data compromised. A few years ago it was TJ Maxx; tomorrow it could be your business.

Right now, these wardrivers might make you a target. Here is how they will typically do it…

Wardrivers cruise around in vehicles, usually the ones with tinted windows to make sure no one outside sees what is happening inside the vehicle. Inside the vehicle will be laptops connected with long-range antennas that collect the list and locations of wireless networks. When they come across a vulnerable wireless network, they tap into it and steal credit card numbers and even personal information.

And if you are using an unsecure Wi-Fi standard called Wired Equivalent Privacy (WEP), you may be at risk. Consumer-grade WI-Fi routers (normally sold at your local office supply store) are often the targets of these wardriving attempts to hack into your business network. Your business might be using one of them. But the point here is that WEP’s encryption can be easily cracked with a little help from sophisticated tools by unsophisticated hackers, so it is time you reviewed your network security and our team of Hamilton IT security specialists can help you.

Just over a year ago, a hacker named Albert Gonzalez was convicted of stealing more than 130 million credit card numbers, most of which were robbed using wardriving.

What does your business need to be secure?

It starts with having a review of your overall business security systems, physical and virtual. It is great to have alarms on your building, controlled access to your business but what about your employees who connect from home via remote access or your WI-FI connection that is broadcasting to the world that your business is “open for business”. Having a trusted Hamilton IT support team like ours will ensure your network is completely secure, all possible gaps are filled and you can rest assured knowing that the right team is on the job.

Wireless networks are great and they are convenient. But what are the risks? Contact Solve-IT today to learn more about how to secure your business network.