Let’s look at the definition of disaster. dis?as?ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure. To White Mountain IT Services, a disaster is anything that involves a major loss of data or major downtime. When one of our clients experience a server malfunction that leaves most employees sitting idle unable to work, that is a disaster. The Cost of a Disaster Downtime is a very terrible expense to not try to avoid. Try this simple formula for yourself: Number of Employees Affected by an IT Outage X Average Employee Hourly Cost (NOT WAGES)+ Average Company Hourly Income X Percentage of Income Lost Due to the IT Outage This simple formula will tell you about how expensive every hour of downtime is for your company. The hardest value in the formula is understanding the percentage of income lost. Not all companies might have a figure, but you will want to consider it as you do the math. This doesn’t include the cost of repair, consultation, parts, or any of the remediation required to get things back up and running. Disaster’s Harbinger Disaster can strike from any direction. Hard drives can go, data can be corrupted, hardware can fail, and networks can go down, and systems can become infected with viruses and malware. User error can cause disaster, as well as theft and other malevolent activity. While companies should take precautions to safeguard themselves against threats both external and internal, and managed maintenance can prevent a lot of foreboding issues, having a solid disaster recovery plan can mean faster turnaround when there is devastating downtime. Employing a disaster recovery plan starts with the data – your most important IT asset. Computers can be replaced, hardware can be repurchased and software can be reinstalled. Your data is the culmination of countless hours of work by all of your employees ever. It’s no wonder why most businesses that suffer a major data loss go out of business within the first year. You can lose your credibility, and things go into disarray. Data needs to be backed up. Your backed up data should be archived regularly offsite. Most importantly, your backup solution needs to be easy to test, and tested regularly. You don’t want to find out your backups are corrupted when it is too late. The time to put together your company’s disaster recovery solution is now. Contact White Mountain IT Services at (603) 889-0800 to talk about solutions for safeguarding your data and your business in the event of a disaster, large or small.
First of all, what shocked us the most is that according to the FTC, in the United States, 9 million individuals have their identities stolen each year. Identity theft is a little different than identity fraud, however. Theft is when personal information is exposed and taken without permission. This is happening all the time by malicious software like spyware, but it can also happen when legitimate websites and services get infiltrated by cybercriminals. If a reputable online store (or even a database for a brick and mortar store) gets hacked into, your personal information can be stolen. That’s identity theft. Identity fraud is when that data is misused for financial gain. This is when things start to get very dangerous. In 2009, $56 billion dollars were accumulated by cyber criminals through identity fraud. The good news is in 2010 that number went down to “only” $37 billion. What does that mean to the average person? On average, victims of identity fraud had $4,841 dollars stolen per victim. Trouble is, the world has had to improve drastically to protect consumers from identity fraud. This means higher costs of doing business which then get reflected on prices of products and services. In other words, because of identity fraud, we all lose. How does your data get stolen? There are plenty of ways, but here are a few popular methods: Hackers can pick up credentials via public Wi-Fi and public PCs. Credit Card Skimming – a process that involves your credit card data being stolen when your credit card is swiped at a standard ATM or credit card terminal. Selling or discarding used computer equipment that isn’t properly wiped can expose personal information. Hackers can infiltrate networks and databases. Dumpster diving and paper mail theft. Malware and viruses Phishing. In almost half of reported identity theft cases, the victim knew the criminal. What do you do if your identity is stolen? Almost half of all reports of identity frauds are discovered by the user first, although banks and credit card companies have methods in place to stay on top of it as well. If your financial credentials are stolen, you need to contact your bank and/or credit card companies immediately, both by phone and in writing. You’ll want to file a police report with details about where your identity was stolen, what you believe was or could have been stolen, and documented proof of the crime. You don’t want to risk identity fraud. Monitor your credit reports closely, shred sensitive mail and documents before throwing them away, and ensure your computers and network are running latest security updates and antivirus, as well as other security measures. For a complete review of your security, contact us at (603) 889-0800 and we will help pinpoint vulnerabilities and fill in the cracks before a costly event occurs.
There are several factors that contribute to the speed of a PC. Let’s very briefly break these down: CPU/Processor The CPU handles all of calculations a computer performs. These days consumer-class CPUs handle billions and even trillions of instructions per second. While dated processors can greatly influence the actual speed of a computer, if your PC is fairly new (as in 1 or 2 years old, and possibly older for higher end builds) it’s likely not bottlenecking your performance. Today, CPUs are equipped with two, four, or even more cores, which means the CPU can handle an more calculations exponentially and consume less electricity. RAM/Memory Random Access Memory is basically the short-term memory of your computer. While your computer is loading and running applications, they get stored in the RAM. The RAM is much faster than the hard drive, so your computer doesn’t need to spin it’s wheels looking for specific files and parts of applications. The more RAM you have, the more “stuff” that can be stored in it. The faster your RAM, the faster your computer can sift through the data that gets temporarily pushed into it. Once your RAM is full, your computer will depend on the hard drive to retrieve information, and that’s where things get sluggish. Once you stop running a program, it will remove itself from the RAM to free up some space for everything else running. Hard Drive The hard drive is the storage device of a computer. For extremely high-end PCs, the hard drive is the bottleneck. Hard drives, when compared to RAM, are very slow to access and write information. Once your computer needs to rely on your hard drive heavily for RAM, things are going to start getting bogged down. While it’s great that your PC can rely on your hard drive in this way for those times it needs some extra memory, it is likely this is the slowdown. Unfortunately, because hard drives are mechanical and have moving parts, there’s limitations to how fast science can make them perform. There are costly solid-state drives, but as a performance-improving factor on a standard workstation, typically solid state drives aren’t the cost-effective answer. Of course, there are software factors as well. Malware and Spyware can bog down your system, and after a lot of use, temporary files can bog things down. Before upgrading hardware, you’ll want to have a technician run a quick evaluation on your PC – it’s possible a little cleanup can make all the difference in the world. Otherwise, the next step is upgrading the RAM. RAM is usually relatively cheap, even to double or triple your existing RAM with faster, higher performance memory. Often the cost of the new RAM itself will be between $50 and $100, and more than likely less than that, and that’s for a substantial increase, but it depends on your PC. Is your computer running slow? Does it get bogged down by the time you have all of your day-to-day applications open? Contact us at (603) 889-0800 for a quick evaluation to see if a simple, cost-effective upgrade will help you perform your job more effectively.
Spam Inundation If you’ve been using email for a while either professionally or personally you have almost certainly gotten email from people you don’t know. Most of these emails are blatantly unwanted while others can look ‘almost’ legit, as if a real person is trying to contact you. Often (and unfortunately) spammers can get your email address when you put it online or use it to register for accounts on sites on the internet. The good news is standard spam protection is getting better these days, and more advanced spam protection is cost effective for businesses that need the extra layer of protection. Spam can cause a lot of harm for a business network if it isn’t kept under control – spam can bog down email servers and eat up network bandwidth and plus it drastically slows down employee productivity because they need to sift through it all just to find their real email. If you and your staff are getting more than a few spam emails a day, contact us at (603) 889-0800 and ask about our anti-spam solutions. Don’t Open Attachments from Unsolicited Emails This has been a golden rule for general email usage for a very long time. If you received an email from a stranger and there is an attachment, don’t touch it. If you receive an email from a contact and there is an attachment, but anything is suspicious, don’t touch it. This goes the same for links – if the email was unexpected and just seems fishy, it is possible your contact’s email may have been compromised. Use your judgment on this, but remember it isn’t your contact trying to trick you, they are merely the victim of a similar hoax from one of their contacts. If you have any doubt, simply reply or pick up the phone and ask them about it before continuing. Keep your Computer Safe Be sure to keep antivirus definitions up to date, and run scans regularly. Running adware and spyware removal software at regular intervals is important too. Be sure your Windows Updates are up to date as well. For businesses, you’ll want to invest in network protection to keep external threats from leaking in. Even for small New Hampshire businesses, security and threat management is important to keep operations running smoothly and to prevent expensive downtime and data theft. Don’t Rely on Email for Storage Everyone has done this at least once; you are working on a report or document on one computer and you email it to yourself in order to pull it up on another computer. That’s fine as long as you mind your inbox capacity, but you shouldn’t rely on email for storing files, not even as a reliable backup. Imagine having to painstakingly pick through all of your email to restore your most important files. It doesn’t sound like a good idea now, does it? On top of that, email isn’t any less prone to data corruption or loss than any typical storage solution, and unless the server hosting your email is backed up with a reliable solution, it could be here today and gone the next. Encrypt Sensitive Data If you send sensitive data to other recipients, you will want to consider email encryption. Some industries require this. Email encryption simply scrambles the message […]
Tablet devices are very similar to modern day smart phones. In fact, in most cases, the apps you run on the phone usually translate to the apps ran on the tablet. You get the basics; email, web surfing, streaming video, calendar, note taking, and more, but the difference is you get all that on a larger device. Ask yourself if you would like that basic functionality that your smart phone gets with a larger playing field, and you’ll have a pretty good inclination of you want to jump on the tablet bandwagon. However, the future of tablets is looking even more robust; Microsoft’s Windows 8 operating system is being built for both desktops and laptops and also tablets. This means you’ll get the same OS you would run on a desktop PC on your handheld tablet. Although the hardware in a tablet isn’t quite as beefy as what you’d find in a desktop, dual and quad-core CPUs and integrated graphics and generous amounts of memory are found in the cutting-edge devices, so expect tablets in the not-too-distant future to be major contenders to laptops as far as mobility and compatibility. As for the tablets on the market now, there are plenty to choose from. Let’s take a short look at a few of the leading contenders. iPad 2 The Apple iPad established itself as the gold standard for tablets. The device is sleek, well designed, easy-to-use, and boasts a great set of features and capabilities. With it being the most popular tablet device, it also has the most apps developed for it. Remember, you can’t just take software that works on your desktop and put in on a tablet; so you are limited to the apps available. Fortunately the Apple App market place is very extensive, and often enough when a developer makes software for tablets, they start with the iPad. The iPad2 starts at $499. Samsung Galaxy Tab 10.1 The Galaxy Tab is essentially the iPad’s closest rival. Instead of using Apple’s iOS, the Galaxy Tab is powered by Google’s Android 3.0 Honeycomb OS. If you own and like your Android smart phone, you’ll feel right at home with this tablet. Android’s App marketplace is continually growing, and while it isn’t as massive as Apple’s, it’s getting very close. The Samsung Galaxy Tab 10,1 is also $499, although some carriers offer a 4G mobile version for a little bit more. Amazon Kindle Fire Amazon’s foray into the tablet world is a little smaller than the 10 inch tablets mentioned so far. The 7-inch tablet is also cheaper at $199, and packs quite a bit of functionality using Amazon’s multimedia ecosystem. The Kindle Fire lets you surf the web, read books, watch streaming videos, and more. Since the Kindle Fire has just come out, it’s a little too early to decide if it has what it takes for business use, but the low price makes it very attractive for multimedia and ebooks. Nook Tablet Much like the Kindle Fire, the Nook isn’t really built to perform. At $250, the tablet is more geared towards handling ebooks, email and other basic multimedia. Toshiba Thrive Not the prettiest tablet of the bunch, the 10 inch Thrive is thick and heavy. However, it supports a full USB port, HDMI and SD card slot, […]