As seen in The Maryland Coast Dispatch
Even though cloud solutions have benefits like flexibility, collaboration and simplified backups, some Delmarva businesses are hesitant to migrate to the cloud because of local internet concerns. Delmarva technology leader Sam Card answers questions about how connectivity works and the impact it has on your decision to migrate to the cloud.
Q: I’m thinking of moving some business applications to the cloud. Why is it important to have a reliable internet connection?
Sam Card: The cloud can be very frustrating if you have poor internet connectivity. This is especially true when you need access to your files to meet a business deadline, like a sales proposal. If you have frequent internet disconnections, or don’t have high speed internet, you may be restricted in what you can do with your data in the cloud.
However, the infrastructure on Delmarva has come a long way as many service providers have invested in their networks, bringing better connectivity to businesses. Cards Technology, along with several of our clients, have purchased fiber optic internet service. This reduces the construction costs for internet service providers and makes fiber more affordable for Delmarva businesses.
Q: I’ve been hearing fiber is the best internet connection. What is the difference between fiber optic internet and cable?
SC: Cable, DSL and prior to that, dialup service, used copper wire because it’s a good conductor of electricity. Fiber optics was born with the development of thin, flexible, glass material wrapped in bundles where data is transmitted at the speed of light.
Basically, fiber optic connectivity is dedicated to your business while cable internet is shared with all your neighbors. Imagine 10 kids streaming movies when they get home from school on the same cable line as your business. Trying to have a video skype conversation with your customer becomes a nightmare! With fiber, you are guaranteed speed because the connection is direct to your business. There is also less, if not any, downtime with fiber since the fiber infrastructure is heavy duty and more reliable than cable.
Q: Isn’t fiber going to be too expensive for my Delmarva small business?
SC: It doesn’t matter what size your business is, you want cost effective internet. If you need constant internet connectivity, and it costs you money when the internet is down, fiber is your answer. You have to analyze what downtime costs you compared to the cost of fiber. If your staff is sitting idle, or your customers can’t get answers, that’s expensive!
Your access to the cloud doesn’t have to be stalled by internet connectivity. Consider what level of internet uptime your business needs, and choose the connection that best fits your needs. There’s still room in the cloud for you.
PowerPoint is the go-to app for presentations for business professionals. One of the best practices we’re taught right away is to make slides consistent and clean for the best-looking presentations.
If you’re dealing with multiple images that you want to be the same size – and need to be resized consistently – there’s a feature for that. Let’s say you are using profile pictures for speaker bios and the images all need to be the same size, but they aren’t. Here’s the best way to handle the situation:
A picture is worth a thousand words…
If you work with multiple tabs in Excel routinely, you know the pain of searching through each tab to make the same change repeatedly. You also probably know these changes can be made with the Search/Replace function but – step away from the search key! – here’s a quicker way to make the same change across worksheets.
Bada bing bada boom – all cells changed! Let’s take a look…
OK, OK. That was a really short (although very cool) tip so here’s a bonus Excel tip…
When you want to put today’s date into a worksheet cell, just type Ctrl+; in the cell. Add the time by pressing Ctrl+Shift+;
Take your Word documents from fine to fabulous with these 3 easy steps to adding a table of contents to your reports, proposals and presentations. Printed documents with a table of contents appear more sophisticated, and onscreen documents with a table of contents feature hot-link navigation to make it easy for readers to jump immediately to specific sections. Your readers will quickly find the information they need – and you will look like a rock star!
1. Apply Heading Styles
2. Insert A Table Of Contents
3. Customize your table of contents
Between phones, tablets, and computers, most employees today have at least three devices. It’s not like the early 2000s when companies were just beginning to adopt the internet. Computer servers sat in an office closet. Everybody drove to the office to work, and nobody really cared about accessing information from anywhere else.
Today, work on Delmarva is just as likely to happen at a main or remote office, as it is at home or a coffee shop. You and your staff have higher expectations for accessing information – you want to be able to get to it instantaneously.
That’s where cloud technology helps.
To help you determine if cloud technology is right for your business, consider these five advantages.
1. Flexibility to work from anywhere.
When your company is working from the cloud, you can get to your applications and information quickly. Employees can work from home, in the field, or in the office. One of our Delmarva plumbing clients has enabled their field employees to review and update data in a Microsoft Excel spreadsheet from their job sites. Now both the field and office staff have real-time access to information. No more waiting to get back to the office. Not only has productivity soared, but employees are happier because they can get their jobs done faster.
2. Improved staff collaboration.
Traditional business applications don’t allow you and your staff to collaborate easily on projects and documents. Accounting software lets you do a great job managing your company’s payables and balancing your checkbook, but it doesn’t help your staff work together on other projects. Cloud collaboration allows you to share data, and work on documents together in real time, all in one place.
3. Simplified backup and safer data.
No business owner wants to discover their server crashed and they’ve lost access to their data. With the cloud, you aren’t at risk of losing information you’ve saved on your server or device due to a hardware failure, virus, or employee error. Because your data is saved in the cloud on systems that have multiple redundancies, downtime is virtually eliminated. And if something does go wrong? The cloud allows for quick data recovery, usually without a call to the helpdesk.
4. Fluctuate with seasonal demand.
As your business changes throughout the seasons, cloud technology allows you to quickly and easily add and remove users to software applications. No longer do you have to worry about paying for perpetual software licenses that you only use during the high-season. With cloud solutions, you can accommodate the fluctuations in your staffing and sales.
5. Grow efficiently and cost effectively.
Many cloud solutions, like Microsoft Office 365, have built in tools or capabilities that most companies aren’t even aware of until they begin to grow. Other cloud solutions are similar. They include these capabilities to meet your business needs without disruptive upgrades or software switches. You may not need all the capabilities they have today, but by choosing a cloud solution, you preserve your flexibility for when you do grow. Those capabilities are there, waiting to be implemented as your business grows and evolves.
Not everything is sunny in the cloud. As you consider cloud technology, there are two considerations to keep in mind.
1. Back-ups are still necessary.
The cloud simplifies your backup strategy, but doesn’t eliminate it. You don’t have to back up your applications like you do with a server in your office because the cloud does that for you. However, you still want to back up your data. It’s the backbone of your business. At Cards Technology, our experts review your backup strategy as part of your move to the cloud to safeguard that your data will be protected.
2. Know where your data is stored in the cloud.
While the cloud can be an extremely efficient way to store your data, it’s important that the cloud provider you select has a secure, reliable environment. The security experts at Cards Technology conduct regular security audits, offer you written documentation of our security policies and show you an audit report that verifies we adhere to standard data privacy regulations.
Like the idea of the cloud, but you’re concerned about the reliability of your internet connectivity? We hear that frequently. Don’t let it rain on your cloud vision.
If you’re having problems with internet connectivity, step back and examine why it’s happening. With the internet as accessible as it is today, you really shouldn’t be experiencing problems. When we encounter it with our clients, our top two recommendations are:
1. Get a second internet connection. A second connection will give you redundancy. If one connection goes down, you have a backup.
2. Move to a fiber-optic internet service. This uses physical fiber-optic lines to your office and is typically more reliable than DSL or cable.
To ensure you’re on the right path as you move to the cloud, partner with a trusted IT provider, like Cards Technology, that understands cloud and cloud security. If you’d like to discuss how you might implement the cloud in your business, click here or call us at 410-208-3933. We’ll conduct an assessment to identify the best strategy for you.
As seen in The Maryland Coast Dispatch
In the past 12 months, over 50% of small businesses have been breached by a hacker. Fears are on the rise and many people worry they’ll be the next one attacked. The key to learning how to outsmart a hacker is understanding how they operate. Sam Card answers questions about how hackers operate and what you can do to avoid being hacked.
Q: How do hackers access my computer system and how will I know if I’m being hacked?
Sam Card: It used to be that hackers used brute force to gain access to small businesses’ systems. Now, however, they’re much more cunning. Some use social engineering tactics to target your LinkedIn page, monitor connections, then use phishing scams to trick people into providing their credentials. Others monitor the dark web for stolen passwords and confidential information they can use or sell.
If you’ve been hacked, detecting the hacker’s presence might not be immediately noticeable. They may spend time lurking in your system learning your habits to better impersonate you for malicious purposes. Only when a colleague inquires why you sent an email asking him to “wire $10,000 to a Florida bank” will you recall clicking on an unusual email link several days earlier.
Q: Why is it so difficult to find out who these hackers are?
Sam Card: Unfortunately skilled hackers are not easy to catch. They mask where they came from and cover their tracks. They intentionally use hard to trace payment systems, like Bitcoin, that are easy to obtain and exchange, and provide anonymity.
The best strategy for your business is to take precautions to avoid being hacked.
Q: Will my cybersecurity system protect my business from losing everything and what should I do to protect my network?
Sam Card: Cybersecurity systems are only as good as the tools in them. First, consider what level of security your business needs, and how much risk you can tolerate. What if your business is hacked? Will you pay the ransom? Can you afford to have stolen data used inappropriately? Your answers to questions like these help you determine how you should protect your business.
It’s essential that you develop a multi-layered approach. Educate your staff on cybersecurity awareness so they can identify potential scams. Implement strict password policies. Change passwords often and employ multifactor authentication to help prevent unauthorized access. A good IT provider will provide continuous monitoring of your systems to identify any suspicious activity and take immediate action.
You have to make it difficult for a hacker to attack you. By creating a multi-layered security system you can help protect yourself from becoming another statistic.
Imagine this. You’re sitting at your desk, trying to respond to all of your emails, when all of a sudden your screen goes red and the following message pops up:
The first thing you probably do is start having a panic attack. You start hitting the escape key, hoping against hope that the message will just go away. But it doesn’t. You quickly switch to, maybe I’ll just pay the $300 worth of bitcoin and no one will ever know. But as you begin to pick up your phone to start googling, how do I pay a ransom in bitcoin, your team starts knocking on your office door, bursting with the bad news. It’s not just your data, everything is encrypted. And what’s worse, you don’t have an up-to-date backup.
This nightmare scenario has been played out in over 50% of SMBs that were breached in the past 12 months. 50%. That’s 1 out of 2 businesses. A flip of a coin. Even if you are a gambler, those aren’t good odds.
Knowing how the hackers are able to get to SMBs is the key to understanding how to outsmart them. Here are the top 3 techniques that hackers employ to attack your system:
1. Diverse delivery systems
Cyber attackers are not just one-trick ponies. They utilize a variety of delivery systems to increase their chances that someone in your company is going to click on something they shouldn’t. From social engineering tools like phishing spam and clickbait to malicious spam and advertising, hackers use a variety of means to trick you into clicking so they can take over your computer.
2. Complex coding
All of the publicity surrounding cybersecurity has helped encourage companies to beef up their security system. But that hasn’t stopped the attacks. Hackers frequently update their code to get past signature-based counter-measures that the first line of defense security programs typically perform. They also develop code that is meant to worm its way from system to system in order to infect as many machines as possible.
3. Difficult to trace payment system
Bitcoin remains the most popular choice of payment when it comes to paying a ransom. Bitcoin is easier to obtain and exchange, while providing a lot of anonymity. Ransom demands are made easy since attackers provide instructions on how to create a virtual wallet, buy the bitcoins to pay the ransom that will provide the code that will unencrypt your data.
Understanding how cyber hackers use these techniques is the key to getting a step ahead. Developing a multi-layered security system while educating your team on the best cybersecurity practices, will help ensure that your business will not become the next statistic.
Come to our free lunch and learn on Tuesday, May 8 at the Bethany Beach Ocean Suites to hear from a Watchguard cybersecurity expert and learn more about the best defense system to outsmart ransomware attackers. We look forward to seeing you there!
As seen in The Maryland Coast Dispatch
Ransomware is an increasingly common method of attack for hackers against individuals, small businesses and enterprises alike. While the first incidents of ransomware were discovered as early as 2005, the last three years have seen this type of threat explode in popularity and compromise millions of computers and mobile devices around the world. Sam Card discusses why SMBs are a target and what you can do about it.
Q: Why would hackers be interested in my small business when they can go after the big guys?
Sam Card: You may hear about the larger organizations in the headlines, but lately it’s the small businesses that are becoming the primary targets for cyber-attacks. The main reasons that hackers find small businesses to be an easier target than larger corporations are because of vulnerable security systems, minimal formal security training and weak security policies.
Vulnerable security systems can include things like out-of-date anti-malware and endpoint security, network firewalls and email security solutions. Also, there seems to be an absence of regular cybersecurity training for staff to avoid phishing email scams or improper data sharing. Finally, infrequent network monitoring and poor password practices have been reported as “low hanging fruits” that hackers look out for.
Q: What are some immediate things I can do to protect my business?
SC: Understanding the techniques that cyber hackers use to attack your systems is a great first step in getting ahead. Things like diverse delivery systems and complex coding are common entry points into your system, and the more you know about how they are getting in, the better you can protect yourself.
Developing a multi-layered security strategy is another crucial element to protecting your organization. You may think a simple anti-virus program is enough, but there are much better tools now that work together in tandem to ward off sophisticated attacks and ensure the correct back-up options are implemented.
Educating your team on the best cybersecurity practices is another imperative step in the security puzzle. Today’s employees are regularly exposed to attacks through everyday entry points like email and mobile. Training employees to recognize threats is an essential part of complete cyber security.
Did you know that 42% of small businesses consider ransomware to be the most significant threat they face today? That’s not surprising considering SMBs can lose over $100,000 per incident as a result of downtime. You might be thinking that your business isn’t a big enough fish to be spotted by cybercriminals, but that’s not the case at all.
Studies have shown that hackers find small businesses to be an easier target than larger corporations due to:
Just like a bank robber, hackers will go where the security is the weakest, even if the payout isn’t quite as big. This makes SMBs a prime target for ransomware since they tend to have weaker security systems and lack a full backup system. This can typically lead to businesses like yours paying the ransom to recover their data.
And if you are unlucky enough to be hit with ransomware and decide to pay the hackers, it is not uncommon that they refuse to provide the decryption keys or target your business again, requiring even more money the second time around.
This disaster will cost you money and impact your reputation – since customers are reluctant to entrust their data to a business with a poor security track record. But your business doesn’t have to be a victim. At Cards Technology, we have the experience, expertise and customized security solutions to prevent you from being the next victim.
Come to our free lunch and learn on Tuesday, May 8 at the Bethany Beach Ocean Suites to hear from a Watchguard cybersecurity expert and learn more about the current threat landscape for small businesses and the best defense system to prevent attacks on your system. We look forward to seeing you there!
As seen in The Maryland Coast Dispatch
The modern workplace relies heavily on the use of technology and a stable IT environment is the backbone of how you do business. So, when a problem emerges, the time spent waiting around for your IT provider can really add up. Sam Card discusses why some IT providers have slow response times, and what you can do about it.
Q: My technology partner promises immediate service, but sometimes I am waiting days to get things addressed. Why is this happening?
Sam Card: Some IT providers make a lot of promises in regard to meeting your company's needs, yet many don’t have the systems in place
to deliver service when you need it most. There are a few reasons for this. First, if organizational roles are not clearly defined, then there is no
set process for how to move through issues quickly. For example, a provider might not have a designated person on hand to answer the phone, or online
requests are treated differently than phone calls. There’s also the risk of different people scheduling overlapping appointments, resulting in double
Not having a proven process to distinguish calls is another reason you might be waiting long for a response. Quick calls should be handled differently than diagnostic visits. Also, there should be a service manager in the office specifically assigned to service issues. If there is no accountability system in place to work through more complicated issues quickly, that could lead to a delayed response.
Q: The IT provider I work with usually comes out the same day, but only if I am in touch before 9:00 a.m. Is this standard procedure?
SC: Unfortunately, you can’t always predict when an issue will arise. And it usually happens once employees have arrived and the day has started. Instead of sticking to rules and timelines, a better way to address tickets is to base them on priority and age. Calculations can be used to figure out where in the pipeline an issue belongs and then work on an appropriate solution. That way, you don’t have to contend with antsy employees, lost revenue and frustrated clients.
Q: So, what should I ask or look for to ensure I don’t experience more downtime than necessary?
SC: Ask about team structure first. You want to make sure your provider has a dedicated service dispatcher that operates as the communication “hub” between the clients and the company. Second, look for a company with a multi-tiered help desk. Smaller, quick turnaround requests should be immediately assigned to T1 technicians, while more complicated issues can be sent to the more seasoned and knowledgeable T2 technicians. This system provides quicker resolution times with the appropriate level of skill.