An Ounce of Prevention is Worth a Pound of Cure

An Ounce of Prevention is Worth a Pound of Cure

Benjamin Franklin was certainly correct when he coined the phrase, “an ounce of prevention is worth a pound of cure”. This time-honored quote is just as true in today’s world of information technology, as it was true hundreds of years ago in completely different sets of circumstances.

When it comes to technology — specifically, data loss prevention, an ounce of preparedness can go a long way in either avoiding a data disaster altogether, or at least mitigating its impact if a business should ever encounter a man-made disaster.

What is Data Loss Prevention?

Data loss prevention is both a set of software technologies and an overall business strategy. Combined together, and both sharing the same goal of ensuring users are prohibited from sending vital or sensitive data to entities outside the sphere of their corporate network, companies can be assured they are doing everything they can to protect one of their most vital corporate resources — their data. 

Why is it Needed?

While some of the more obvious pieces of data that an employee would not share with others, such as employee social security numbers, birthdates, and proprietary information about a company’s key business processes, some information is not so black and white. A company may want to list an employee’s name and contact information somewhere on their website so they will be accessible to potential clients.

However, by making this information public, it also creates the potential for hackers to pose as the employee and then attempt to contact another employee within the company, perhaps asking for confidential information. Unfortunately, the unsuspecting employee doesn’t realize they’ve just been a victim of a phishing attack until it’s too late.

Making it Happen 

As today’s hackers become more sophisticated, the creation of a data loss prevention strategy means it’s critical for businesses to review every piece of data that employees deal with and determine the level of protection needed. Once a business reviews all the information that flows through their company, it’s time to turn to software technologies to make sure their data is continually protected.

Fortunately, there are fully automated software technologies available that can examine all of a company’s data, along with the organization’s policies for handling each data type. The software application then decides the level of protection required based upon the company’s outlined policies. If an employee attempts to pass along information to someone who is not cleared to receive the data, a warning message from the security software will pop up, alerting the employee to their incorrect action and the software will prevent the information from proceeding any further.

How to Find Help 

While it certainly sounds like a good idea to evaluate all corporate data, devise a strategy, and then find software that will fit within a company’s strategic plan, in reality, it’s a daunting task for most companies. Corporate leaders are simply not so immersed in the world of technology to stay focused on all the new and more complicated ways in which hackers attempt to steal data.

It just isn’t realistic to think a business whose focus is on running their organization in an entirely different industry, has the technological expertise to sift through all their data to determine the level of protection required for each piece of information. And it takes some expertise to marry the right security technologies to an individual company to ensure they have just the right amount of data protection they need.

Summary

If you would like to know more about creating a data loss prevention strategy, we can help. We can assist in evaluating your organization’s data, as well as select the right software applications that will provide the level of protection you need.

Please contact us today for more information.

How to Avoid Disaster – 6 Steps to Business Continuity

How to Avoid Disaster - 6 Steps to Business Continuity

Robert Burns was correct when he wrote, “The best-laid plans of mice and men often go awry.” As much as every business owner wants to (and should) plan for success, at the same time they should also understand their ability to continually thrive may very well depend on surviving an unexpected crisis. Businesses that proactively plan for unforeseen events will likely be able to meet the rare but really tough challenges, while those companies who only focus on day-to-day challenges will find it extremely difficult if not impossible, to thrive beyond a true disaster.

What If?

A positive thing about considering “what if”, is that brainstorming about the worst that can happen provides immense value in helping business owners prepare beforehand to meet a potential challenge. If you are a business owner, consider how prepared your company will be if ever faced with one of these unexpected crises:

  • Physical Damage – What if a natural disaster occurs such as a flood, fire, or an extensive power outage that results in physical damage to company building(s), equipment, inventory, etc.? Is your business prepared if such an event occurs?
  • A Lost Resource – Vital resources are not always physical. Sometimes a business might rely very heavily on a supplier or a key employee that makes a valuable contribution to the company. If one of your suppliers goes bankrupt or a valued employee decides to leave, is your company prepared for that?
  • Crime – Depending upon the type of business, a company could become a crime victim through theft of a physical asset, a virtual loss of data, or theft of intellectual property. Do you have a plan in place if your delivery truck is stolen or a hacker is holding your data for ransom?
  • Data Loss – Data loss can occur in a variety of ways. Online data thieves and hackers are always looking for companies to exploit. Poorly trained employees may make an error that results in a significant loss of data, or perhaps a disgruntled employee sabotages the company before they leave. Regardless of the reason for the loss, most companies would be significantly hampered by a loss of corporate data. 
  • Equipment Failure – Sometimes equipment fails as part of a natural disaster. Perhaps a fire or flood has destroyed a company’s telecom systems, core IT equipment, or perhaps an owner was neglectful in replacing old, outdated equipment in a timely manner. 
  • Lost Access – Sometimes an external resource has its own data breach which wreaks havoc on your ability to do business. Perhaps a bank account or credit card is frozen due to suspected fraud by a third party, or a fired employee removes the ability for employees to access corporate software systems. As a business owner, are you prepared for such events?

Preparing a Plan

No business needs to fall victim to an unexpected disaster. Avoiding a crisis is within reach of every company willing to prepare a plan for potential disaster. An ideal way to start preparing is by employing a six-step process designed to tackle every catastrophic challenge. The first step begins with an analysis of a company’s vulnerabilities and risks. The second step involves assessing one’s current state of readiness, along with identifying weak areas. Step three consists of constructing a plan designed to thoroughly cover every area of a business with regard to each potential crisis.

It should come as no surprise since communication is so important, that step four consists of communicating the plan to the entire team so everyone is thoroughly trained on how to respond to a disaster. Step five includes regular monitoring and updating of “the plan” since over time most businesses naturally change and evolve. Lastly, step six involves bringing a fresh perspective to the table by employing external help. A new perspective that can help fill in the gaps by providing an additional level of expertise.

If you would like to know more about how to ensure your business survives and thrives beyond every potential crisis, please contact us.

Office 365 vs. Office 2019 for Business

Office 365 vs. Office 2019 for Business
Office 365

Microsoft is an essential part of many business’ operations. Businesses rely on Microsoft Word for their word processing needs, Excel for spreadsheets and PowerPoint for presentations. The cloud has become an integral part of Microsoft’s offerings, and this had led the company to offer two different versions of Microsoft Office: 

  1. Office 365
  2. Office 2019

 Each version can be used for business, but which is ideal?

Office 365: Cloud-based

Office 365 is cloud-based, so you pay for a subscription either monthly or yearly. Cloud-based, Microsoft worries about updates, infrastructure and security. You or your employees simply log into Office on your web browser and can make Word documents, spreadsheets or any other file under the Office suite of products.

What’s nice about Office 365 is that it can be accessed anywhere on any Internet-connected device.

You can work on a document in the office, go home, and then work on the document some more. Automatic saving makes the process streamlined. Office 365 for business comes with the following office applications:

  • Access (only on PC)
  • Excel
  • Outlook
  • PowerPoint
  • Word

All versions come with OneDrive, but the higher version comes with a few extras:

  • Exchange
  • SharePoint
  • Teams

You will receive a desktop version of Office applications with Office 365. The maximum number of users on the business plan is 300, so everyone in the office can have access to Office 365.

Office 2019: Standalone Version

Office 2019 is a standalone product, so it’s a one-time purchase. You won’t have to pay subscription fees, but you won’t have the benefit of online collaboration on the cloud. Licenses are valid for one PC or Mac, and fully-installed versions will include the following:

  • Excel
  • OneNote
  • Outlook
  • PowerPoint
  • Word

You’ll need to update Office 2019, and all of your files will be stored on your computer or server. A disaster recovery plan should be in place when using the standalone version of Office 2019, or you risk losing your data if your hard drive fails, you get a virus, or data becomes corrupted.

Which Office is Best for Your Business?

If you don’t have the budget for Office 365, Office 2019 may be the best option. In most other cases, Office 365 will offer the most flexibility. Not only does Office 365 come with its own version for your PC or Mac, but it will also offer:

  • Regular updates from Microsoft (you never need to upgrade)
  • Cloud-based data storage
  • Ease of collaboration for larger teams
  • Linking directly to files in the cloud
  • Access to all applications on multiple devices

Office 2019 will need to be updated when Office 2020 is released, but you can continue using Office 2019 for as long as you wish.

Contact us today to develop an Office 365 solution for your small- or medium-sized business.

What Is The Best Way To Protect Your Business From Hackers

What Is The Best Way To Protect Your Business From Hackers
Protect Your Business

According to Small Business Trends online 43 percent of all small businesses across the United States face a cyber attack. In fact, over half of those businesses that suffer a cyber attack eventually fail. These known statistics make it necessary to protect your business from hackers. A hacker gains unauthorized use to your business data through your computer. The question is, what can you do to protect your business against a cyber attack?

What Does The AE Technology Group Do To Protect Your Business? 

IT Support Services

What is IT support services? Our IT services provides tech support against cyber bullies. When your operating system is under the threat of an attacker, we’re there to help. Our customers receive efficient monitoring of their operating system against hackers and other technical issues. We understand how effective IT support can keep your business productive. 

24 Hour Support 

There is no set time for a hacker to attack your operating system. The AE Technology Group is there to support your needs around the clock. Our customers receive 24/7 IT security, backup data services, disaster recovery, monitoring, and customized support IT software. 

Unfortunately, a hacker will go through great lengths to infiltrate your business data. Businesses that operate financial services are at a greater risk of a cyber attack. Cyber bullies are after data that can help them financially gain from your business. Basic anti-virus software isn’t enough to stop malware and the threat of spy software used by hackers. Get the backup and recovery services your business needs when you need it. We also provide in-office IT support services with Office 365 and VoIP. 

Amazingly, the AE Tech Group has proudly served the New York City area for over 17 years with a worldwide audience. We specialize in backup and recovery for small and medium size businesses. We’re there to protect you against ransonware, SQL injection, and worms used by hackers. You’re invited to contact us for more details on an exemplary 90 day trial to protect your business from unwanted hackers today. 

Cloud Computing – The Future of Disaster Recovery

Cloud Computing - The Future of Disaster Recovery
Cloud Computing

Disasters happen. Whether they be natural or man-made – hurricanes that flood your company’s headquarters or viruses that contaminate your IT department’s servers – the consequences can be devastating.

Studies have shown that 43% of companies that cannot retrieve their data due to a disaster strike never reopen and that 29% of these companies close within two years.

How can your business protect itself in the face of these inevitable calamities? Look to the clouds! Cloud computing offers cost-effective solutions to help your business recover lost data and resume normal operations effectively and efficiently.

Despite its lofty nomenclature, cloud computing is really a down-to-earth concept. In simple terms, cloud computing means relying on the Internet – rather than on hardware – to store the information and programs that are vital to your business. This system allows you to access integral data remotely – an especially handy benefit if, say, your hard drives are corrupted.

Cloud computing, therefore, is essential to disaster recovery. A cloud-based system allows you to make a virtual copy of your company’s server – including the operating system, data, software, and other information contained therein. Because it stores this virtual copy on the Internet, no hardware is required. And if no hardware is required, none can be compromised.

When it comes to disaster recovery, cloud computing can save your business more than just time and money – it can flat out save your business. Even if your headquarters had been located in Pompeii on the day that Vesuvius erupted, cloud computing would have made it possible for you to restart your business (hopefully in a volcano-free zone) with a minimal outlay of money, time, and effort.

Disasters happen. But when they do, cloud computing allows your business to look to the sky and keep its feet on the ground.