All Posts by Keith Mendonsa

cyber security for orange county small business

IT Security Breach at Your Small Business: What Do You Do Now?

You wake up one morning to the news no small business owner wants to hear. There has been an IT security breach. Systems are down, data is lost, or customer’s financial information has been stolen—or all of the above. What steps can you take immediately to mitigate the damage and restore function and trust to your IT systems?

Continue reading

Seven ‘Must Haves’ for Your Small Business Website

 
 
Your website represents your business and so building and maintaining it need to be of primary concern to you as a business owner. We often find business owners struggling with their websites saying things like: “My website looks great, but I am not able to convert” or “I invested so much into creating my website, but I don’t get many hits.” These things are very common pains faced by businesses, especially small business. If you aren’t sure where to start your site improvement project, this post will get you rolling in the right direction with seven key areas you need to pay attention to when it comes to your website.

1. Content – Make sure your site has a significant amount of content and that the content is relevant and meaningful. Having the right amount of good content adds value and appeals to your target audience. Don’t fill the site with jargon and keywords just for the sake of it, lack of relevant content won’t help you improve your conversion rate.

2. Testimonials – Nothing has more impact on your prospects than them hearing about your product/service from their peers. So make sure your site showcases testimonials from your satisfied customers.

3. Social Media Icons – Social Media, when done correctly, it is a great medium to enhance your brand presence online. Get on popular social media networks and invite your website visitors to join you there – that way they will hear more about you from your fans at the social network.

4. Contact Information – Tell your web visitors how to get in touch with you. They shouldn’t have to search the entire site before knowing how to contact you. Provide your contact information/contact form very clearly for them to use.

5. Tracking – Incorporate a web-site tracker that helps you track the leads that come in from your website. You can use services such as Google Analytics that are free and provide you basic details such as number of hits, location, time spent on pages, etc.

6. Loading Time – Web visitors today have little patience and lots of choices. So, it is important that your site loads quickly, otherwise they move on to the next search result.

7. SEO – Search engine optimization is a key factor in determining the ROI of your website. Make sure your site is optimized for search engines so that it shows up when your prospects search for you.

Mitigate Costly New Technology Risks for Continued Stability and Profitability

Partnering with a managed service provider (MSP) is one new approach being used by many companies like yours. Experienced MSPs have access to newer tools that reduce costs by automating many routine in-house labor intensive processes. Break-fix is labor intensive, and labor is one of the most expensive operating costs within your IT infrastructure. The new innovative tools that can be provided by MSPs generate real productivity increases and mitigate the risk of network failure, downtime and data loss from human error.

MSPs deliver a trusted foundation for your team and your customers. Some of the services and tasks offered include:

  • Remote Desktop Management and Support
  • Predictable Management of Critical Patches and Software Updates
  • Fractional Resource Availability of Best-In-Class Expertise – scaled to your needs
  • Implementing and Testing Backup and Disaster Recovery Processes
  • Performance of Inventory and Audits of Computer/Network/Software
  • Enforcement of Network/Security Policy
  • Monitoring of Network/Operating System and Alerts
  • Updating Anti-Virus Software and Detecting Spyware

Erase any misconception that managed service providers are nothing more than “outsourced” tech help priced to displace your in-house IT technician or team. The new MSP has defined new methodologies and technology partnerships to offer valuable preventative services that proactively locate and eliminate threats before a bigger problem arises.

MSPs today put considerable effort into understanding the operational and business needs of SMBs to develop and deliver a set of specific services that align technology with the SMB’s business objectives. This is the reason you hear managed services often referred to as “partners.” A present day MSP offers quantifiable economic value, greater ROI and decreased total cost of operation by streamlining costs and eliminating unnecessary lost productivity, revenue, and avoidable on-site IT consultant fees, in addition to eliminating the need for costly hardware/software repairs or replacement.

Is your Business Safe from Virtual Threats?

 
 
Did you know that 50% of small business owners think their businesses are too small to be targeted by the thieves of the virtual world? Contrary to popular belief, 72% of hacker attacks often happen to smaller firms – firms with less than 100 employees! So how prepared is your SMB? Here’s a checklist to help you find out how vulnerable you are to these attacks.

1. Do you have Antivirus protection? – An antivirus software program can protect you from threats that originate from emails such as phishing and virus attacks. However, the most striking fact is that 61% of small businesses don’t install any antivirus software! If you are one of them, then it’s time to change!

2. How sturdy is your Firewall? – A good firewall system protects your computers from the variety of threats that exist in the virtual world. Examples include harmful cookies, viruses, worms and other such malicious programs used by hackers.

3. Do you use a Spam filter? – Using a simple spam filter for your emails keeps junk out of your inbox. The bonus to having a good spam filter is that your employees save time, as they are not distracted by irrelevant emails, but the major perk here is that the potential virus and phishing threats are lessened as spam emails are unlikely to be opened.

4. Do you do backup your data regularly? – Agreed – backups don’t really protect your data, but they are the only way to recover it if data loss does happen. So, be sure you have a regular and reliable backup plan in place – and it is actually being deployed.

Data loss can prove very costly-especially to SMBs, sometimes even resulting in them having to close down. Prevention is certainly better than a cure in such cases.

Is That Email a Phishing Scheme?

 
 

Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing attempts are often so well-disguised that they escape the eyes of a busy email reader. Here are a few tips that help you identify whether that email really came from your bank or is another attempt at defrauding you…

1. They are asking for personal information – Remember, no bank or financial institution asks you to share your key personal information via email, or even phone. So, if you get an email where they ask for your ATM PIN or your e-banking password, something’s a miss.

2. The links seem to be fake – Phishing emails always contain links that you are asked to click on. You should verify if the links are genuine. Here are a few things to look for when doing that:

  • Spelling – Check for the misspellings in the URL. For example, if your bank’s web address is www.bankofamerica.com, a phishing scheme email could misspell it as www.bankofamarica.com or www.bankofamerica-verification.com
  • Disguised URLs – Sometimes, URLs can be disguised…meaning, while they look genuine, they ultimately redirect you to some fraudulent site. You can recognize the actual URL upon a mouseover, or by right clicking on the URL, and selecting the ‘copy hyperlink’ option and pasting the hyperlink on a notepad file. But, NEVER ever, paste the hyperlink directly into your web browser.
  • URLs with ‘@’ signs – If you find a URL that has an ‘@’ sign, steer clear of it even if it seems genuine. Browsers ignore URL information that precedes @ sign. That means, the URL [email protected] will take you to mysite.net and not to any Bank of America page.
3. Other tell-tale signs – Apart from identifying fake URLs, there are other tell-tale signs that help you identify fraudulent emails. Some of these include:

  • Emails where the main message is in the form of an image, which, upon opening, takes you to the malicious URL.
  • Another sign is an attachment. Never open attachments from unknown sources as they may contain viruses that can harm your computer and network.
  • The message seems to urge you to do something immediately. Scammers often induce a sense of urgency in their emails and threaten you with consequences if you don’t respond. For example, threat of bank account closure if you don’t verify your ATM PIN or e-banking password.
Finally, get a good anti virus/email protection program installed. It can help you by automatically directing spam and junk mail into spam folders and deactivating malicious attachments.

Has Your Website Been Optimized for Mobile Users?

 
 
Did you know that this year there will be more mobile web surfers than stationary ones? That means more prospects are accessing your business website more through their smart phones, tablets or other mobile devices than with a laptop or PC. If you thought you had time to make the switch this year, you may want to reconsider in light of new research. A recent study revealed that around 40% of prospects move on to a competitor if they have a poor mobile experience. How prepared is your business for this change? Well, if you are just starting out, the following checklist will help… Continue reading

Managed IT Services 101

Unless you are a technology company or a computer geek, you would likely be better off focusing on what you do best and leaving your Orange County business’ IT matters to a professional. The problem is, neither your budget nor your infrastructure is large enough to warrant hiring a full-time IT person. In situations like these, managed IT services can fill the gap so your system remains stable, secure and up to date. If you’re new to the idea of managed IT, the following quick primer should help.

Continue reading
data security and it backup services

What are the Most Important IT Services to Get Managed ASAP?

Businesses today rely more heavily on technology than ever before—but unfortunately, many companies still operate on a “wing and a prayer” when it comes to their IT services. They cobble together a system that works only somewhat—largely because they don’t understand the technology itself—and they only call an IT professional when there is a problem. However, by being more proactive with managing your IT services, you can save your company a lot of money and grief, letting the technology work for you instead of against you. Let’s look at a few aspects of your IT for which you should set up effective management as soon as possible.

Continue reading

Data Loss Can Cause You to Shut Down

Small and medium sized businesses today are relying more than ever on IT systems to efficiently run their business, support customers and optimize productivity. These systems house sensitive digital data ranging from employee and customer information, to internal emails, documents and financial records, sales orders and transaction histories. This is in addition to applications and programs critical to daily business functions and customer service.

While corporate-level data losses and insider theft are well publicized, many smaller businesses have also become casualties of data loss and theft. Following a significant data loss, it is estimated that a small-to-medium sized business can lose up to 25% in daily revenue by the end of the first week. Projected lost daily revenue increases to 40% one month into a major data loss.

According to The National Archives & Records Administration in Washington, 93% of companies that have experienced data loss, coupled with prolonged downtime for ten or more days, have filed for bankruptcy within twelve months of the incident while 50% wasted no time and filed for bankruptcy immediately. Finally, 43% of companies with no data recovery and business continuity plan actually go out of business following a major data loss.

Still, a survey conducted by Symantec SMB revealed that fewer than half of SMBs surveyed backup their data each week. Only 23% of those surveyed said they backup data every day and have a business continuity plan in place.

Businesses play on a much bigger playing field than they did two decades ago. Any disruptive technological event – even the smallest of incidents – can have an amplified impact on day-to-day business and profitability. Being proactive with data recovery solutions, and having emergency response procedures in place prior to a disruption or data disaster, is the only way to minimize downtime and soften the impact of such events.

1 5 6 7 8 9 12