Is Your Orlando Business Data Backed Up?

Many of you have no backup or business disaster recovery strategy in place!

According to a research conducted by Optus, more than half of all Orlando businesses do not have a website! Sounds depressing doesn’t it?

But more depressing than that is the fact that only 21% of the 850 SMBs surveyed actually bothered regularly backing up their data. Out of the 21% who regularly backed up their data, 53% reporting doing it onsite, while just 8% said they did it offsite. Well, it’s great that some SMBs are taking measures to keep their data safe but we have a bone of contention here… is backing up data onsite the right thing to do? We mean, how useful is having data backed up right beside the original data when both of them could be destroyed by a fire or any other natural disaster?

So what should you do? Try cloud-based services instead! They allow you to back up data regularly and your data is stored offsite. Plus, they also allow relatively cheap access to online back-up services. Trust us; there is no time to waste pondering over what to do. Back up your data today, if you haven’t, and choose ASysTech and stop gambling with your backups today? We are your trusted Orlando backup and disaster recovery professionals.

Feds Want Super Cyber Security

Do you have regulators from three or four different federal agencies auditing your network security compliance every single year? If you do, you must know how tiring it is and not to mention, costly too! Because it saps their budgets, regulatory compliance has become a burden for CIOs and CISOs lately. Take for example a speaker at the SINET Innovation Summit in Boston last week who said his agency spends 40% of its budget on complying with regulations. It’s more for others! But thanks to recommendations from a congressional task force set up by House Speaker John Boehner in June, you will be able to cut back the number of annual audits to just one, meaning you’ll be able to save more time and money!

The congressional task force recommends a super standard that would incorporate cyber security mandates issued by disparate agencies into a single set of standards that would satisfy all their requirements.

So what other recommendations has the congressional task force made? Read on to find out:

  • The government should have someone else do the investigation of cyber attacks. That’s the only way it will ever be able to get the big picture. For this, the task force recommends that an organization (which is separate from the government) be set up; it should gather data on cyber attacks for government and private groups for the government to tap into when it needs a picture of ongoing cyber activity threatening critical infrastructure. The organization would also respond to ever changing threats in a timely manner, something that the government is too slow to do. In other words, the role of the government should be limited. Similar thoughts were expressed at the SINET Innovation Summit.
  • There should be a set of incentives that encourage businesses to do the right thing to defend their networks against cyber attacks. The task force’s report recommends that incentives such as reducing data-breach liability, tax credits, insurance breaks and tying government grants to cyber-compliance be considered. Extending or expanding tax credits such as the current research and development credits so that it includes cyber-upgrades is yet another possible incentive. While giving out grants to businesses, Congress could require compliance with minimum cyber security protection standards if the grants pertain to national security, law enforcement and critical infrastructure.
  • Congress should look into whether insurance companies could encourage better cyber security among policy holders. The task force didn’t seem to know how insurance companies handle this, though. But it did recommend finding out.
  • Further regulation may be warranted in cases of industries that control critical infrastructure, but the new requirements be kept light. Businesses directly involved in these critical areas should contribute to developing these additional standards, according to the report. Plus, if businesses comply and are breached anyway, their liability should be reduced by virtue of compliance.
  • Investigating into whether it makes sense for businesses to report more cyber-incidents than they are required to under current laws with the goal “to improve both law enforcement response and protection of critical infrastructure.” Rather than just reporting incidents in which personally identifiable information such as credit card numbers are stolen, businesses might also have to report when intellectual property was stolen.
ASysTech works with Orlando business to ensure that all their business and personal information is completely secure. Speak with us today about our IT security services.

Systems Engineer At ASysTech Expands Microsoft 365 Knowledge With Recent Training

Continuing education in the Information Technology (IT) field is critical to keeping up with new and innovative releases of hardware and software as they appear in the marketplace. Leo Vieira, Systems Engineer at ASysTech, gained invaluable knowledge and expertise on Microsoft 365 deployment strategies during recent training that took place in Miami.

With the recent global release of Microsoft Office 365 by Microsoft, new learning opportunities for Information Technology (IT) specialists everywhere opened up. Such was the case with Leo Vieira, Systems Engineer at ASysTech, Inc.

Mr. Vieira jumped at the chance when training opened up in the last week of September for O365 Deployment Training for Partners. The 3-day workshop that was held in Miami was focused on Office 365 deployment capabilities. Leo Vieira gained an in-depth look into the planning, preparing and migrating phases of deployment for this latest software that includes the Microsoft Office suite of desktop applications and hosted versions of Microsoft’s Server products.

The intense training was centered around the two separate modules of gathering information and developing strategies for deploying Office 365 service offerings and successfully configuring Office 365 SharePoint and Lync, with plenty of time in between sessions to reflect and build upon the learning gained from the previous lectures and discussions.

As a Microsoft Office 365 partner, ASysTech is uniquely positioned to offer Orlando business IT support to small to medium-sized businesses who are contemplating switching to Microsoft Office 365. As the number of business owners and managers decide to make that all-important change-over, the call for qualified support will increase dramatically. This places Mr. Vieira at an advantage for sharing the knowledge and expertise he has gained from the deployment training. “The training has definitely been a worthwhile investment for ASysTech to make on my behalf,” said Leo Vieira. “For that, I thank management, in particular Rick Hardin, for making the decision to send me to the 3-day training.”

ASystech is a leading provider of managed services to small and medium-sized businesses at an economical price while providing exceptional quality. The company is well-known for offering the best IT services and tech support packages that Orlando and Central Florida businesses can utilize. As a matter of fact, they recently came out with a new trial invitation on Microsoft Office 365 for those business owners and managers that are interested.

###

About the Company: If your business can’t justify the expense of full-time IT staff, we provide the perfect solution: A managed IT services package, which provides you with access to our managed service provider specialists for all your IT needs.

To get your free consultation and find out how ASysTech can make your technology worry-free, call 407-647-7787 or contact us to see how more than 50 years of industry experience can benefit your business. We make I.T. work!

Is your Orlando business wireless network secure?

Do you have a wireless network? Are you sure it’s secure? If you do and you aren’t, you should definitely keep reading and find out why you need to secure your wireless network and how you can do it.

So, why should you secure your wireless network? Unless you use some older wireless technologies, like Bluetooth (whose access is limited by physical proximity to the corporate network), you probably have one with long range connectivity that can’t be contained within an office meaning anyone within range of your network can gain access. If you happen to have this kind of network which hasn’t been secured, you could have hackers capturing the information you send back and forth. This could mean effects that range from simple to devastating for you. Some of them are:

  • Slower access: If you have additional users on your network, especially those who may be downloading and uploading content, you will have slower internet access.
  • Data usage overages: Your monthly data usage may be limited by your ISP. Unwanted users can cause your account to be in violation of those limits.
  • Breach of privacy: You could have hackers stealing info being passed back and forth which means access to passwords, financial records, customer information, private data, and much more.
  • Illegal traffic: Unwanted users may access your network for illegal Internet activity and you’ll be the one in legal trouble.

Now that you’ve come to know what the effects of leaving your network unsecure are, it’s time you learned about securing it too. And when it comes to securing a wireless network, encryption is the name of the game. The most important security measure for a wireless network, encryption scrambles the information you send to the internet or to your wireless printer making it unreadable to outsiders. Encryption means creating a difficult network password (you may also call it an encryption code or passphrase) and there are different methods of encryption. Not all of them are secure, though. Here are some of them:

  • WEP (Wired Equivalency Privacy): Although not considered secure, you might have to opt for this basic level of encryption if you have an old wireless printer (which only supports WEP). This calls for lowering the level of security for your entire network to WEP and connecting your printer using an Ethernet or USB cable. However, you can always choose to upgrade your printer which lets you go for better protection.
    If you want to create a WEP password, and a strong one at that, make it a case-sensitive password using 10-58 digits (use the numbers 0-9 and the letters A-F).
  • WPA and WPA2 (Wi-Fi Protected Access): Considered safer than WEP, WPA and WPA2 are the preferred methods of encryption, which use passwords and passphrases. But wait! What’s the difference between a password and a passphrase?
    It’s simple; a password is generally one grouping of letters, numbers, and/or punctuation without spaces whereas a passphrase contains spaces too and is usually longer than a password (a passphrase is more like a sentence).
    For a strong WPA or WPA2 password, make it a case-sensitive one that uses at least 13 characters, including upper- and lowercase letters, punctuation, and numbers. Include spaces if you’re going to make it a paraphrase. Remember, by including spaces, a passphrase is much harder to break than a password. Having trouble creating a strong password? You can turn to online sites that generate random passwords for you!
Need help securing your Orlando wireless network? Contact your team of Orlando IT support specialists today to learn more about how we can help you secure your business wireless network.

Blackberry Outages Hit Orlando Business

Attention Blackberry users:

It has come to our attention that RIM, the maker of Blackberry devices, is experiencing a network outage resulting in service interruption to Blackberry users.

From the RIM website ( http://www.rim.com/newsroom/service-update.shtml ) :

Wednesday 12th October – 9:45 (GMT-5)
BlackBerry subscribers in the Americas may be experiencing intermittent service delays this morning. We are working to resolve the situation as quickly as possible and we apologize to our customers for any inconvenience. We will provide a further update as soon as more information is available.

Thank you…

Rick Hardin and the team at ASysTech

Is Server Virtualization Right For Your Orlando Business?

For those of you that may not know exactly what server virtualization is, how are you supposed to know if it’s good for your business or not? So in order to go into the benefits, let me first go into a little bit about what it is.

Server virtualization is the separating of one physical server into multiple smaller virtual servers. The resources of the server remain invisible to the user, and the use of software is implemented to handle the division of the physical server into multiple virtual environments. Those multiple virtual environments are called virtual or private servers.

Let’s use a common illustration of server virtualization that everyone is familiar with — that of Web servers. Virtual Web servers have become very popular as a means of supplying low-cost web hosting services because you don’t need a separate computer for each server. Instead, one computer can handle dozens of virtual servers co-residing on the it.

Now that we’ve looked at what server virtualization is, why would this be a benefit to your company? There are multiple reasons that I’ll go into right now.

  • Each virtual server runs its own operating system.
  • If one virtual server crashes, you can reboot it independently of the other virtual servers.
  • You can run a wide array of applications on a smaller number of physical servers. This does away with the stress of worrying about application incompatibilities and support issues.
  • Disaster recovery — or any kind of application backup and recovery — can be done almost as easy as snapping your fingers.
  • If you have a virtualized server and need to transfer data, configurations, etc. to a different virtual server, the length of time is cut down considerably because you can basically just copy what you need.

Do you need help with your VMWare or Microsoft Hyper-V installations?

Are you still not convinced whether or not server virtualization is a good solution for your small business? Contact us today at ASysTech. We have solutions that are designed to satisfy the needs of our clients’ short-term and long-term goals of our clients.