7 Simple Steps To Secure Your Computer From Malicious Attacks

Let’s face it, expensive computer repairs are not exciting, fun or make us like our IT professional more. By following these seven simple steps to secure your computer(s) from malicious attacks – while avoiding expensive repair bills!

1. Keep an up-to-date anti-virus software running at all times.

I recommend remote management for two simple reasons: 1) It detects and removes spyware and malware programs that a lot of the more well-known (and more expensive) anti-virus software programs miss, and 2) It does it for about half the price of software packages.
It also has an auto scan and update feature that will make sure your computer is running the most current protection available and regularly scanning for threats.

2. Start using an alternative web browser to Internet Explorer such as Mozilla Firefox.

Just recently, hackers have figured out a way to access and download malicious programs to your computer via a security hole in IE. What is amazing about this is that you don’t even have to click on anything or download a program to get infected. You are especially vulnerable if you have an older version of Windows such as Windows 98.
Mozilla is a completely free web browser that does not have the same security problems as IE. Many of my clients even report back that they like their Mozilla browser better than Internet Explorer.  Switching from IE to Mozilla is a simple and cost-free way to add another layer of security to your computer.

3. Use an alternative e-mail program other than Outlook Express.

Outlook Express is notorious for security holes. If you don’t have the latest security updates, hackers can send you e-mails with viruses that automatically open and install themselves without you even opening or previewing the e-mail and its attachments. I recommend that you either upgrade Outlook Express to a newer, more secure version of Outlook or switch to Mozilla’s Thunderbird E-mail software.

4. Never open suspicious looking e-mails or attachments.

This goes without saying because most viruses are replicated via e-mail. If it looks suspicious, delete it immediately!

5. Stop using peer to peer file sharing sites and downloading “cute” programs.

Think of it like cyber candy. Hackers use these cute and funny programs as bait to get you to download their destructive programs. These are guaranteed ways of contracting malicious viruses, spyware, and malware. Also, peer to peer file sharing sites like KaZaa are mine fields of malicious programs. NEVER access those sites or download the programs that run them.

6. Set up a firewall.

A firewall is simply a device that acts as a buffer between you and the big, wild world of the Internet. Many users will get a DSL or cable Internet connection and plug it directly into their computer with no firewall in between.
The one thing you have to remember about the Internet is that it is a big open field. You have access to the world, but on the flip side, the world has access to YOU. Hackers have programs that automatically scan the Internet for computers connected via a cable or DSL connection without a firewall. Once they find one, they access your computer, download vicious programs, and can even use YOUR computer to send viruses to your friends and other computers, all without your knowledge or consent.

7. Backup your files every night.

Have you ever lost an hour of work on your computer due to a crash or program error? Now imagine losing all of your precious family and vacation photos, e-mails, music files, and documents.  No one really thinks about losing all of the data on their computer until it actually happens. By then, it is either too late and you have lost EVERYTHING or it will take a lot of money paid to a specialist to recover your files.
I cannot stress the importance of backing up your files enough. If the files on your computer are important to you, then it is about time you got serious about protecting them by backing up every night.
The backup solution you chose will depend on the amount or size of the data you need to backup. Sometimes a simple zip drive or CD burner will do the trick. If you have a lot of data to backup, you may want to consider a tape backup system. If you want to know what is best for your specific situation, call our offices and one of our technicians will be happy to discuss the best system backup plan for you.

11 Scary but True Facts About Data Loss

We love sharing fun, educational articles that we find online and ones brought to our attention from our partner resources.

 

When thinking about the many ways data can be lost or how a disaster can affect your company, this list, brought to you by VaultLogix, hits the nail on the head! I’m sure you can think of more ways too!

 

Here are the 11 Scary but True Facts About Data Loss

  1. The average failure rate of disk and tape drives is 100% – ALL DRIVES WILL EVENTUALLY FAIL.
  2. Only 34% of companies test their backups and, of those who do, 77% have found failures.
  3. 60% of companies that lose their data will go out of business within 6 months of the disaster.
  4. Over ½ of critical corporate data resides on unprotected PC desktops and laptops.
  5. Key causes for data loss are:
    • 78% Hardware or system malfunction
    • 11% Human error
    • 7% Software corruption or program malfunction
    • 2% Computer viruses
    • 1% Natural disasters
    • 1% Other
  6. Only 25% of users frequently back up their files, yet 85% of those same users say they are very concerned about losing important digital data.
  7. More than 22% said backing up their PCs was on their to-do list, but they seldom do it.
  8. 30% of companies report that they still do not have a disaster recovery program in place, and 2 out of 3 feel their data backup and disaster recovery plans have significant vulnerabilities.
  9. 1 in 25 notebooks are stolen, broken or destroyed each year.
  10. Today’s hard drives store 500 times the data stored on the drives of a decade ago. This increased capacity amplifies the impact of data loss, making mechanical precision more critical.
  11. You have a 30% chance of having a corrupted file within a one-year time frame.

If you’re worried about data loss or protecting your data from a disaster, we can perform a FREE Consultant’s Review so you’ll know if you are protected!

 

6 Benefits of Backup and Disaster Recovery Systems

Backup and disaster recovery services are no laughing matter these days. Each company needs a robust data protection, a secure and reliable cloud storage provider and a series of local and hybrid backup options. In this post, you’ll understand 6 benefits of backup and disaster recovery systems further, so you can choose what’s right for your company.

 

Managing Your Backups

 

This doesn’t have to be done in-house… after all tape backups are definitely a thing of the past, so why would you trust a daily process when cloud-backup services are so reliable? Don’t restrict your IT department anymore to these archaic practices; trust a solution that fits your needs. Monthly backups? Weekly? Daily? Every 15 minutes? Take control of day-to-day management, monitoring, and verification of your backups with easy-to-implement solutions.

 

Today’s backups consist of a “set it and forget it” solution – one that’s flexible enough to scale with your business, and fully managed and supported to minimize the time you’ll (or your IT consultant) spend hands-on with the platform.

 

Here are the 6 Features and Benefits:

 

1. Complete Disaster Recovery and Cloud Replication

In the event of a disaster, we’ll spin up your complete site as virtual machines on a private network in the cloud, with VPN access for you and your clients. Downtime is minimized, and business operations can continue as usual.

 

2. Secure and Reliable Backup

Data backed up to a local appliance can be replicated offsite to the cloud, so your clients can enjoy true peace of mind knowing that business continuity will be maintained even in a disaster scenario Continuity247 uses a world-renowned reliable public cloud (IBM’s Cloud, SoftLayer infrastructure), and replicates data across multiple datacenters to help guarantee reliability and availability.

 

3. Flexible Hardware Support

Continuity247 is hardware agnostic, meaning we provide system requirements and supported configurations and allow you to choose which hardware vendor you’d like to purchase from – helping you maintain your existing vendor relationships. And if you’ve got clients with varying needs, don’t worry; installing Continuity247 is easy, and you’re free to setup whichever configurations are best-suited for each environment.

 

4. A Proven Technology Foundation: Born in the Cloud

Unlike hardware-oriented solutions, the technology powering Continuity247 wasn’t retrofitted to support the cloud – it was built in the cloud, for the cloud. This proven technology already protects nearly 250,000 servers, and is trusted by nearly 1,800 web hosting providers – and we’re committed to continue expanding and improving it to meet your needs. Continuity247’s Continuous Data Protection (CDP) technology minimizes the amount of storage used on the appliance and in the cloud.

 

5. Single Pane of Glass Management

Easily manage all of your clients’ backups from a central location, with remote access to appliances, protected machines (with Continuum RMM), and the cloud. The ITSupport portal also features real-time reporting on backup deployment and cloud usage, and quick access to complete ticketing support.

 

6. Seamless Integration other programs

When Continuity247 is combined with Continuum’s Remote Monitoring and Management (RMM) platform, you can deliver complete, comprehensive end-to-end IT management and data protection. Installing RMM gives our NOC technicians access to protected machines, expands the scope of issues they can resolve, and provides you with direct access to your machines from the IT Support portal.

 

>> Learn more about our Backup and Disaster Recovery Systems.