October 7th, 2015

Security_Oct2_AVulnerabilities in the web-based version of popular instant messaging app WhatsApp recently left up to 200 million users exposed to hackers and malware. The bug was picked up by an Israeli IT security firm, and WhatsApp put a fix in place before news of the potential threat spread. Nevertheless, it highlights the need to remain vigilant when using apps like WhatsApp, whether for business reasons or in a personal setting. Here’s what you need to know about the security incident and how to protect yourself going forward.

The web-based version of the WhatsApp app was only launched a few months back, initially for WhatsApp accounts on Android and Windows Phone devices and later for those on iPhones, but has already grown in popularity. The recent security vulnerability related to vCards, electronic business cards shared by WhatsApp users, and effectively amounted to a kind of phishing.

An error in the WhatsApp web client meant that less-than-innocuous vCard business cards created by hackers were not properly filtered out by the app. As a result, these phishing-style cards made it through to users who, if they clicked them, were at risk of the cards converting themselves to more harmful executable scripts once downloaded - and potentially accessing and playing foul with users’ personal data. There are even reports of a ransomware approach being taken by hackers in this case, with attempts being made to extort cash from WhatsApp users in exchange for restored access to their infected devices and hijacked data.

WhatsApp put a fix in place, by releasing an updated version of the app, prior to making public news of the security vulnerability. It’s worth making sure you have the latest version of WhatsApp installed on your phone, if you haven’t checked recently - WhatsApp’s phone and web versions are linked to one another, so ensuring you are up-to-date on your phone is the way to ensure you’re safe when using the web client too. The patch is also available directly through the web client, though this won’t update your phone’s version of the app at the same time.

The whole affair also serves as a timely reminder that it pays to be vigilant when it comes to using WhatsApp and other instant messaging platforms - including email. Avoid opening links or downloading files that you’re not expecting to receive, and proceed with caution even if you were anticipating them. It’s better to double check with the sender that they’re consciously passing a file to you, and that they’re fully aware of its contents, than to wait until your device has been infected and damage has potentially been inflicted on your vital data.

Want to learn how to keep your devices safe from phishing attempts and other potential security vulnerabilities? Give us a call and let us equip you with tamperproof solutions.

Published with permission from TechAdvisory.org. Source.

Topic Security
October 5th, 2015

BusinessIntelligence_Oct5_ABusiness intelligence (BI) tools are powerful platforms that allow organizations to gain significant insight into their business activities, clients, employees, infrastructure, and much more. But as data volume continues to grow exponentially, more and more business owners are realizing that traditional BI tools are becoming less effective - and so they turn towards a more modern, efficient, and self-service approach.

What is self-service business intelligence?

Self-service BI is a reporting and analytics platform that business users with limited IT knowledge and experience can use for themselves. Simply put, if an end user trying to find an answer to a business question can access, use, and generate reports without bothering the IT department or data analysts, then they’ve done self-service BI.

The end goal of self-service BI is to eliminate redundant processes where users have to request access and assistance from data analysts and technology experts. With self-service BI, users are able to gather information, analyze it, and share the reports with others, without having to know the technical protocols required to access the data.

Traditional vs. self-service

In traditional BI systems, analysts create reports based on input data, and deliver them to key decision makers. In the case where the decision makers need more detail or different data, or change their business questions, analysts have to adapt the report or create new ones.

Self-service BI is designed to eliminate this time-consuming reporting process, placing much of the responsibility for report creation on end users. It opens the door to data exploration and new possibilities. Instead of asking analysts to generate reports, end users have the ability and tools to find the answers to their own business questions whenever they want.

How self-service BI can benefit your business

Self-service BI helps improve organizations in various key areas. Here are just some of the benefits it has for your business.
  • It saves time - most likely there are far more people asking business questions than there are IT experts creating reports to answer them. By removing the dependency on data analysts and technical staff, companies are able to improve the efficiency of their analytical process and save time, as end users can find the answers to their questions themselves.
  • It eliminates mistakes - the more decisions users have to make, the less likely they are to make the right ones. Self-service BI helps ease the decision-making process by delivering nearly instant reports and visualizations that are easy to understand. Users can analyze their data from any angle and deduce answers without having to consult specialists.
  • It reduces costs - since end users are able to utilize self-service BI with little to no training, training and support costs are significantly lower than other BI solutions. What’s more, self-service BI platforms can be accessed from anywhere and at any time, without the need to install expensive hardware and servers, allowing businesses to save money.
There are plenty of benefits of adopting self-service BI. As more employees are able to analyze and explore data by themselves, decisions can be made much faster and at a far lower cost. Want to learn more about business intelligence and how you can implement it in your organization? Give us a call today.
Published with permission from TechAdvisory.org. Source.

September 30th, 2015

We’ve heard that one person’s trash is another person’s treasure, but if a Massachusetts company has its way, they’ll turn waste into WiFi. The maker of the popular BigBelly waste receptacles has applied for a grant from the New York City Mayor’s office to turn hundreds of their trash bins into mobile hotspots, focusing on underserved neighborhoods. Imagine being able to surf the Internet on a park bench while sipping your coffee, only to throw your cup away right into your WiFi provider.

According to Engadget, BigBelly “has been making high-tech solar-powered trash cans and recycling containers, which can detect if the garbage is too smelly, notify trash collectors and even compress their contents if they’re near capacity, for a long time. The company tested its first two hotspot containers last winter in New York, measuring their activity and signal quality for a few hours per day.”

The story falls on the heels of a recent update about the project to turn old New York City payphones into free WiFi hotspots. While we covered details of the project in a blog post when it was announced last year, The Guardian reported in June that the project recently moved a big step closer to fruition: “Sidewalk Labs, the new Google-backed startup that was created last month to improve city life through technological innovation, has announced it is investing in a project to turn the city’s payphones into WiFi hotspots.”

According to The Guardian, “New York is only the beginning: Sidewalk Labs envisions spreading this concept to other cities. The model is scalable, according to company officials. And Intersection says it will help other cities update ageing [sic] infrastructure, such as old street lights and bus shelters, to ‘create a cohesive network of dynamic messaging across these assets’ – including emergency notifications, real-time transit information and wayfinding.”

“By integrating new technologies into existing infrastructure, cities can reinvent these assets – providing not just more modern, free services to citizens but even more revenue to cities,” said Sidewalk Labs CEO Dan Doctoroff, who previously served as a deputy mayor of New York from 2001 to 2008.

In addition to providing free WiFi to a radius of up to 150 feet, the payphone kiosks are being designed to provide mobile device chargers, an interactive screen that would also offer Internet access, free nationwide phone calls and access to local services and information. The WiFi garbage cans will serve up more than free Internet, as well, and can display public announcements and alerts. To generate advertising revenue, the kiosks will serve as digital billboards, and it’s likely that the garbage cans will do the same.

After six months without any updates, this project now looks promising. Aside from becoming a new revenue stream for Google, turning New York City’s underused assets, such as garbage cans and payphones, into free WiFi and information hubs will test the role technology can play to close the digital divide and change the ways people experience and interact with cities. For instance, a restaurant could advertise its lunch specials on a garbage can right around the corner. And, while online security has not yet been addressed, we hope that this project will also force these Internet and advertising providers to address the risk of data breaches over public WiFi (see Sinu blog, “How to protect your data when using public Wi-Fi”).  

Topic Articles
September 30th, 2015

While we used to eagerly anticipate the latest and greatest from new tech rollouts, smartphone announcements, such as Apple’s Special Event on September 9, have gone from glamorous to mundane in short order. In fact, CNET writes, “Our boredom doesn’t mean Apple won’t sell millions of phones, but it does mean consumers may think a little longer before shelling out cash for an iPhone 6s when their old devices are ‘good enough.’”

Pew Research reports that 64% of U.S. adults own a smartphone, up from 35% in 2011, and 46% say “they couldn’t live without” their smartphone. This brings up an interesting point about service. Individuals are quickly moving away from mobile company phone contracts and toward pre-paid plans that provide them the freedom to seek out and get the best mobile deal. Traditionally, much of the phone cost was built into the cost of the contract, meaning users could pay a small up-front fee for a new phone. Without the contract, users are paying full price, often upwards of $500, for a new phone.

While there was news at the Apple Special Event about the new 3D touch and more Apple Watch features, the real innovation may be the Apple iPhone Upgrade Program.Instead of owning your phone, you would lease it directly from Apple. Plans begin at $32.41 per month and include Apple’s warranty program, AppleCare.

This may prove to be a game changer for mobile service providers. ZDnet reports, Apple “removes the carriers further from the customer. Anyone using the iPhone Upgrade Program has a direct hardware relationship with Apple and in a way that encourages yearly updates. That’s key because the upgrade cycle has been slowing of late.”

For years, the mobile telecommunications industry has set prices for phones and contracts, and we were tied to their contract cycle before we could upgrade or pay full price to upgrade a device. But as consumers have more buying options, the competition will help drive prices down. Pre-paid phone providers helped drive the industry toward unlimited talk and text and reasonably priced data plans. By breaking the connection between the mobile service provider and the phone consumer, the telecommunications industry is going to have to add new value to compete for customers. For Apple, it means they no longer have to negotiate exclusivity agreements with one service provider as they did with AT&T when the original iPhone launched.

It’s interesting to see one of the most striking technological innovations from Apple is about value and service rather than hardware or software. Sinu’s philosophy has always been that “people matter, objects don’t.” Apple just took that philosophy and brought it to life in a way that could prove disruptive for the mobile telecommunications industry, increase sales for Apple, and provide better value for all of us.

Topic Articles
September 30th, 2015

By John Christie, co-founder & COO

This time of year, many organizations begin budgeting for the upcoming year. Sinu offers several Business Intelligence tools and best practices to help you allocate your operating budget wisely.

Consider Your Hardware Replacement Cycle

As you plan your company’s operating budget, consider the lifespan of your business devices. Consider a replacement cycle of 3 to 4 years for desktop PCs and servers, and 1 to 3 years for mobile devices. If your business is ready to commit in budget, not only in preference, for tablets and smartphones, then plan accordingly for the maintenance costs and replacement cycles.

Use the Sinu Store as a guideline of what today’s devices cost and plan to replace 20-30% of your company’s devices yearly to ensure no device is more than 4 years old. (To access the Sinu Store, go to Sinu Support and click the STORE tab on the far right.)

If capital outlay is an impediment to proper lifecycle management, Sinu has several Hardware-as-a-Service (HaaS) offerings – with no upfront costs and no need to budget for support or replacements. (See Sinu Now Provides Hardware-as-a-Service (HaaS) for more information about this service.)

Are You Using the Most Effective IT Solutions?

Consider the cost and efficiency of the solutions you have in place today. We encourage many of our customers to rethink their IT infrastructure and software because most critical applications, including payroll and accounting software, have a cloud strategy that was not available just a few years ago. Furthermore, there are immediate benefits that most organizations can experience when adopting some of these hosted solutions; not only do you reduce the risk of data loss and disrupted service, these solutions can offer better remote access and cost savings.

Review Available Data from Sinu’s IT Reports and Business Intelligence 

There are several IT Reports and Business Intelligence tools that are included in the Sinu platform as part of our all-inclusive IT service. These tools are easily found on the Sinu website, just click LOGIN at the top right-hand side of the page and enter your email address and click PORTAL LOGIN. 

These tools provide answers to many operational questions that can affect your budget:   

  • Who are my key IT vendors?
  • What computer hardware do I own?
  • What software licensing is installed on my computers?
  • What computers should I replace in the next 6 months? 

Also on the Dashboard, you’ll see the availability of monitored systems, including your email system, web sites, and Internet connections. 

Click on the reports tab for additional Business Intelligence. The reports page includes employee accounts reports, hardware and software inventory, maintenance reports, backup reports, IT vendor information, and your network diagram. The monitors on this page show 30 days of availability history.

The “My Computer Replacement Plan” is another example of one of the Business Intelligence reports we offer. The report parses your hardware inventory and looks at the warranty expiration date, ship date, Operating System version and memory to make a recommendation about the machine: Retain, Replace or Update.

We hope that these automated tools will help you visualize some of your most important IT metrics and inform your organization’s budgeting process. If you have any questions about Sinu’s Business Intelligence tools or our HaaS offerings, please contact your Relationship Manager.

Topic Articles
September 28th, 2015

164_A_SMDo you ever feel like your social media efforts are going nowhere? Does it feel like you spend more and more time marketing your small business on Facebook, Twitter and other social media platforms, but with little return? Well, a recent survey reveals just how much ROI small business owners are actually gaining from their social media efforts, and the results are eye-opening.

Survey details

The survey was conducted by a small business directory and support network known as Manta. They surveyed 540 of their small business members with the aim of learning how much ROI these companies are gaining from social media marketing.

The results

Based on data on the 540 participants, 41% of businesses are receiving a return from social media marketing, which leaves nearly 60% with nothing to show for their investment of time and money. And as for the businesses that are gaining a return, over 80% earn less than $1,000 a month from their social media efforts. More surprisingly, close to half bring in less than $100 a month.

As a small business owner, should these numbers be cause for alarm? According to the CEO of Manta, John Swanciger, part of the reason the return is so low for most businesses is that their social media priorities are misguided. He notes that social media is less about bringing in new customers, and more about community building. "For a long time, the mantra was that social media could bring in new customers,” he says. “In reality, social media is a community builder, and your biggest fans are your already-loyal customers. When small businesses treat social media as the new word-of-mouth community, the real return will follow."

One of the oldest marketing tactics around is word-of-mouth marketing. Every day, people recommend products, restaurants and businesses they love to friends and family members. And social media is the perfect platform to cultivate your fans’ love of your brand. But according to the Manta survey, less than 8% of business owners cited building community as their primary social media goal.

So how do you build a community on social media?

Besides the obvious investments of time and money, here are a few quick tips to get you started:
  • Regularly post content that is valuable to your social media following - the keyword here being valuable.
  • Ask your followers questions to start conversations, and then engage with them. This builds a connection between your brand and customers.
  • Show your followers that you genuinely care about them, and they’ll likely do the same for you with glowing recommendations to friends and family.
Of course there is much more to it than this, but these quick tips can help you get started. If you’re struggling with your own social media efforts and would like to learn more, we’re happy to point your business in the right direction. Call us today to speak with one of our experts.
Published with permission from TechAdvisory.org. Source.

Topic Social Media
September 21st, 2015

One of the most neglected aspects of a Business Continuity Plan (BCP) is what happens to employees. Much emphasis is put on protecting and recovering data, but your employees are just as valuable to keep your company running. By setting up your company’s BCP with detailed instructions on working from home during a disaster, your employees can help you make it through anything. Here’s how you can do it.

Step 1 - Prepare

What good is a BCP if your employees don’t understand or even know about it? Saving your data and information is important during times of emergency, but so is making sure your employees can execute their day-to-day functions. Guarantee they understand what is expected from them during a disaster by explaining this in a dedicated meeting. This will also provide a forum for your staff to ask questions and better understand how they fit into the BCP as a whole.

Among the most important things to include in the formulation of any planning are clearly defined roles and open lines of communication. Everyone should know who they report to, as well as who his or her backup is. This will help ensure your company has all its bases covered if a disaster should strike.

Step 2 - Give them the right tools

You can’t expect employees to work from home during a disaster if they do not have the proper tools to succeed. Of course, these also have to be cost effective as well; it’s not feasible to simply hand out workstations to everyone to store at home in case of emergency. For starters, investing in cloud-based solutions will help make it possible to keep service interruptions to a minimum. Microsoft Office 365, for instance, lets users access its programs and files from anywhere and on any device. This means that, if your office is no longer accessible, staff can keep working on their existing projects at home from their own device.

Cloud-based VoIP is another tool that can keep employees up and running from home. These systems can make sure all calls to your office are forwarded to your employees’ cell phones. This allows for communication between your clients and employees to continue uninterrupted even if your office is closed.

Step 3 - Practice

Have each employee take a day to work from home so they are able to get hang of how the process will go if a disaster strikes. This will get them comfortable with the workings of everything, as well as seeing if there are any issues that crop up. Rarely, if ever, does anything go perfectly on the first attempt, so practicing before a disaster can help eliminate any problems that might occur during the real thing.

Make sure you take the time to review how it went with each employee. This will give you an opportunity to see how practical this aspect of your BCP is, and which areas can be made stronger. The idea of the exercise is to allow each employee to feel confident in his or her ability to work during a disaster, and to give you the reassurance that they understand their role as it relates to the wider BCP.

Step 4 - Be alert

Finally, it’s important to keep an eye on possible events that could force you to shut down your office, and make sure your staff is also aware of the situation. The more time they have to prepare to work from home, the more ready they will be. Of course, not every event is possible to predict ahead of time, but if the a blizzard is forecast or there have been protests nearby, alert your staff of the possibility that your BCP may go into effect.

A comprehensive Business Continuity Plan can be the difference between your business surviving or failing if a disaster occurs. Let our experts find a BCP that ensures your company can carry on through thick and thin.

Published with permission from TechAdvisory.org. Source.

September 14th, 2015

Productivity_Sep14_AWe’re all in the same boat - a million and one things to get done, and seemingly never enough hours in the day to fit them all in. But technology can come to your aid and, by using the best productivity tools you can find, you’ll add valuable minutes and hours to your workday. That all adds up, and you’ll quickly discover there’s more time to squeeze in the strategic tasks that so often fall by the wayside, but which are so crucial to defining the future direction of your business. Here are four tools to start using if you’re not already.

Google Alerts

Every business wants to keep track of what others are saying about it and, in this modern age where the likes of blogs and social media rule the roost, it’s more important than ever before. In an ideal world you’ll pick up on positive references to your company, and will be able to share these to enhance your good name further. But of course, every so often even the world’s best companies suffer a blip, and in those scenarios reputation management becomes a question of damage limitation, proactively responding to negative feedback, and putting right what harm has already been caused.

Yet doing all that manually is a real time-drain, if not next to impossible to do effectively - just think of all the websites you would have to scroll through to check for mentions of your company’s name, all the while knowing you’ve not even really scratched the surface. Thankfully Google Alerts relieves the pain of this crucial task; the tool allows you to set up alerts for specific terms, and receive an email notification when something crops up that you ought to know about. It can save you hours and enable you to do more justice to your reputation management efforts than you considered feasible.

Chrome to Mobile

If you’re like the vast majority of modern business people, you’re never sat at your desk for very long. That means you’re not always able to use your desktop computer, and probably have to do what you can to make the most of time spent traveling, between meetings and so on. Yet truly being productive during those down periods necessitates having access to the same materials you have when you’re in the office; that way, you’re actually contributing to clearing your overall to-do list rather than just picking a random task to work on so that you’re at least getting something done.

The Chrome to Mobile extension for Google’s signature web browser allows you to quickly transmit to your phone all the web pages you’re currently viewing on your desktop or laptop. When you’re away from your desk, you can pick up right where you left off without any interruption - no more emailing yourself links to everything you’re working on, and then having to open it all afresh on your phone or tablet. If you know you’re going to be away from a reliable internet connection for a while, you can even opt to send an offline version of those pages, so you can continue working regardless. You just need to have a mobile device that runs Android 4.0 or later, or have an iPhone, iPad or iPod Touch that has Chrome installed.


The inclination to keep too many tabs open in your web browser is practically a chronic condition among business professionals, symptomatic of us trying to get too much done in too little time, and never really finishing one task before moving onto the next. Whatever the cause, it’s something lots of us have to deal with every day; we all stumble across news articles, blogs and other online resources that are infinitely useful to us, but which we don’t have the time to stop and act on there and then.

Pocket solves that problem - this simple tool allows you to save content that you find online to one central place, so that you can go back to it with ease when the time is right. It will save you from needing to keep those hundreds of tabs open until you have a spare moment to go back and plough through your reading list (or more likely until you decide is enough is enough, and close all the tabs to stop them slowing down your computer any further - and in the process you lose all that valuable information without keeping a copy).

Rescue Time

If you’ve ever wondered how much time you waste between tasks while you’re reading your email, updating your social media, checking the news and so forth, then Rescue Time could be the answer to your curiosity - even if you might not actually want to know the truth! Once you activate Rescue Time on your devices, it will track how long you spend not only on different websites but also in the various computer software applications that you use on a day-to-day basis - whether that’s Microsoft Word, Photoshop or Sage.

This helpful little program sends you a regular email report detailing how many hours you’ve logged in total - discovering how long you routinely sit at your computer can be revealing in itself - along with a breakdown of the percentage of time spent on various work- and non-work-related tasks, and an overall ranking for your productivity. It even sets you goals, for example to spend less than two hours a day on what it classes as non-productive activities (which you can customize to suit your line of work, since it’s hardly fair to penalize yourself for being on Facebook if that’s a key part of your job).

Are you ready to use these tools, and other intelligent technology, to streamline your workflow and get more out of your day? Give us a call and see how we can help you put IT at the forefront of a more efficient approach to business.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
September 7th, 2015

Business_Value_Sep7_AWe all know IT plays a valuable part in your company’s operations, but is it possible to quantify that value? By asking your IT guy the right questions you should be able to get an idea of what they are adding, or subtracting, from your business’s value. Whether your IT is handled in-house or through a Managed Services Provider, here is some advice on what you can do to help determine its value.

Don’t accept metrics

IT people love using metrics to show how they are contributing to your business. The problem is most of these metrics don’t show you anything. Sure, high uptimes sound great and low mean-time resolutions are probably a good thing, but how do these impact your business? Don’t arbitrarily accept these as signs IT is contributing to the value of your bottom line. Dig deeper and get an explanation as to why these metrics matter. There is a reason your IT department wants you to see these metrics, but it is important to have them explain it.

Ban “tech speak”

There was a time in the world when it was impossible to avoid “tech speak”, but that era has passed. Your modern-day IT person should be able to explain just about everything to you in plain English. Realistically, if they are doing a good job, they should want to share that information with you in a way you will understand easily. If you find your IT department relying heavily on “tech speak”, chances are there is something they don’t want you to know about.

Make sure your IT provider understands business goals

If you want your IT working for you and adding value to your company, then those responsible for it have to know what your goals are. It is then, and only then, that they will be able to manage your technology with these goals in mind. Too often companies assume their IT provider knows what their priorities should be, founded on company principles, but the reality is that the contractor will operate on the basis of what it thinks is best. These two entities pulling in separate directions can hurt your business in many ways. By making sure your IT department - again, whether in-house or outsourced - is pulling in the same direction as everyone else, technology can add a whole lot of value to your company.

Meet with your IT provider often

It doesn’t matter if you have in-house IT or use a Managed Services Provider, you should be meeting with them on a regular basis to understand what they are doing. There is no need to banish them to some dark corner of the building, or only summon them when something breaks. By incorporating them into the operations process and maintaining open lines of communication, you are likely to see things in your office run a whole lot more smoothly. Not only will you get a better understanding of how IT is providing value to your business, they will gain a deeper appreciation of how your company operates. This will help both sides understand how the other operates, and enable you to find new ways to help each other.

Listen to IT recommendations

Chances are that whoever is handling your IT has numerous different ideas on how your company can use technology to decrease costs, increase productivity, and become more profitable. You would be foolish to not at least consider what they have to say. One of your company’s most valuable assets is technology,and your IT department should be up-to-date on what improvements can be made. There could be nothing more valuable to your company than an IT department proactively finding ways for you to get ahead of the competition using technology.

Is IT hurting your business value? Want to instead use it to drive increased bottom-line profits for your company? Contact our technology experts and find out how we can help.

Published with permission from TechAdvisory.org. Source.

August 31st, 2015

You’re probably all too aware of the Ashley Madison hack by now. Maybe you are closely following the names and people involved, perhaps you don’t care or most likely you are somewhere in the middle. No matter where you find yourself standing on this issue, it should be used as a valuable learning tool for your company’s security. Here are three lessons your business can take away from the scandal.

1. Make sure your company’s security data is actually secure

You probably tell clients their information is secure, but just about every company makes that claim. One of the biggest mistakes made by Ashley Madison was the failure to know if its data was truly secure. The company publically lauded its security, but it now seems like those claims were rather hollow. In fact, it appears as if no one at Ashley Madison knew a whole lot about its security practices until it was too late.

Don’t simply pass off your business’s security to the IT department. Being involved will allow you to see how it works. You don’t need to be a tech expert to understand how your data is being secured. Your security provider, whether it be in-house or via a managed services provider, should be able to explain security practices in layman’s terms. This will allow you to ask questions and be proactive because chances are if you see a weakness, others will notice it as well.

2. Beware of your employees and their email and Internet activities

Another takeaway from this scandal was the fact many employees, both from private companies and government offices, were using business email accounts to sign-up for Ashley Madison and office Internet connections to access the site. Putting the ethical questions aside for a moment, public sentiment is undoubtedly negative and companies with employees who used Ashley Madison at work have been exposed to the scandal’s backlash.

By placing the appropriate email and Internet security solutions in place at your business, you can reduce the amount of risk your company is exposed to by employees. No one really wants to put restrictions on their employees’ Internet and email access, but it is important to be smart. Being connected to scandals like this can bring unwanted publicity to your business. Worst of all, your employees might not even realize they are putting your company in harm’s way when they access this type of content at work.

3. Be prepared for data loss

As the Ashley Madison case has shown us, massive data theft or loss can be the end of your business. When clients trust your business with their data, they are confident in your ability to protect it. Of course, things do happen and if your data does go missing, it’s important to have a plan of action ready. While it’s unlikely your company’s data breach is unlikely to garner the attention of Ashley Madison, it means a whole lot more to you, your company and your employees. Just because your company isn’t big doesn’t mean it’s invincible.

A disaster recovery plan can help your company ensure it has backups and even backups of your backups. If you believe your data has been stolen by hackers, it is important to act immediately. You’ll need to quickly assess what information has been stolen and inform the appropriate parties so they can take the necessary steps to protect themselves. From there, you will want to re-secure your company closing any security loopholes that have been found. Finally, access your backups and make sure your business continues to operate as close to normal during the crisis.

Worried about your security? We can show you how to protect yourself. Contact us today for more information on how to keep your company safe.

Published with permission from TechAdvisory.org. Source.

Topic Security