Sarasota IT Company | Orlando Computer Consultant | Tampa Technology Firm


5570 Bee Ridge Rd.
Sarasota, FL 34233 
T:941.378.4377
T:855.358.9397
F:941.378.5004


  • Home
  • What We Do
    • Managed Services
    • Backup and Recovery
    • Business Technology Consulting
    • Email Hosting and Management
    • Virus & Spam Protection
    • Software Deployments
    • Servers & Workstations
    • Technology Partners
  • Why We're Different
    • Client Bill of Rights
    • What Our Clients Say
  • Support
  • Contact Us
  • Blog

Keep It Up (to date)

6/25/2014

4 Comments

 
Picture
A recent ArsTechnica Article discusses an update Microsoft release to fix a long-time, nagging hole in internet explorer. The hole allowed hackers to install malicious software onto users computers in order to take control of their machines to perform all sorts of nefarious tasks. Still, many people that use IE as their primary browser will ignore warnings from Microsoft to update their PC's because they're to busy to worry about that sort of thing right now. What these people don't understand, is that a short upgrade process is going to be the least of their worries if they become victim to a hacker that utilizes the exploit.

The important point to understand is that when that little bubble in the taskbar pops up to notify you that updates are available, it should be treated as an urgent message. Imagine for a second, you come home from work to find a note in you mailbox from the manufacturer of your oven. The note states that the model you own has a 50% chances of spontaneously bursting into flames and you should schedule a repairman to come fix the problem right away. How long are you going to wait? Obviously, the ramifications of your oven exploding are a bit more dire than having your PC hacked but the latter can cause a nightmare for you or your business.

Malware programmers are very talented people. They have the ability to create software that can  wreak havoc on your life and tuck all that code into a very small package. On an individual basis, they can access all of your online activity by activating a keylogger that tracks every keystroke you type and sends that back to someone to sift through to find your bank and credit card information, social media logins, email accounts and anything else they can take advantage of. On a corporate level, they can do the same thing but now they've accessed not only the end-users information, but potentially that of your clients as well. Think it can't happen to you? It can. To get an idea of just how common it is for companies to suffer a data breach, check out this site to see how many have affected the residents of New Hampshire alone.

So what's the best way to avoid this? The foremost and easiest way to protect yourself and your network is to keep Windows updated. Those updates that Microsoft pushes out should be considered a top priority in your company. Is it convenient? No. Look, we know it's a pain to have to reboot when you're working on something and have 3 documents open and a browser with 9 tabs that have all of your sources up. Is looking all that up again worse than having to cancel all your credit cards or having to send out a notification to your clients that they have to cancel their cards? You know the answer. 

The good news is, we're happy to help you make the whole process easier. We can arrange for the updates to download and install automatically at off-peak hours. All of the machines on your network can be consistently updated to the latest version of windows. Including the oft-overlooked servers. Give us a call, and we'll walk you through how it works. You'll be thankful you did. If you choose not to, some guy in a country ending in "-stan" will be thankful you didn't.

4 Comments

Sharing is Caring

6/3/2014

3 Comments

 
Picture
If many of the technology industry insiders are to be believed, email is all but dead. 99% of all email messages circulated through the internet are spam. Here are BDCon, we spend a considerable amount of time ensuring our customers are seeing only relevant messages in their inbox and protecting them from phishing and malware attacks. The amount of email messages being sent to each other is rapidly decreasing in favor of things like text messaging, Skype and Face Time calls, and online video conferencing services such as GoTo Meeting. However, there is one aspect to enterprise email that continues to be a struggle for end users. The problem of sharing files, specifically large files, has been a thorn in the side of business for years. Here are some thoughts on what you can do to help deal with what is inevitably going to be more and more prevalent in the coming years.

The problem of how to securely share files has been a plague among business for years. So much so that there are dozens of ways that business have solved the problem for themselves. The problem with having so many solutions is that they either: A. Require others to sign up for services to be able to participate in file sharing or B. Depend upon other methods of delivery that seem to kill the idea of productively sharing files all together.  

An example of the latter is the system of dropping files onto a form of portable media such as a USB drive or writable disc and then manually delivering the media to the recipient. This method has several obvious weaknesses. Speed is the first that comes to mind. If the recipient happens to be located a considerable distance away, than shipping the media involves additional costs and a considerable amount of time. Need to get those files to someone today? The "Sneaker Net" method is not going to get it done in most cases.  There are also considerable security concerns with this method. If the files being transported are sensitive in nature, how do you insure that they are delivered and viewed only by the intended recipient?

As far as cloud based file sharing services are concerned, there are dozens, maybe even hundreds, of choices. It can be overwhelming trying to determine which is the best option for your business but there are some things you should consider first when evaluating a provider. First, it's important to determine if the service you're looking at is designed for business. Many services are built around sharing photos of the kids and not 30 megabytes of medical records. It really all comes down to two factors: Security and Collaboration.

A top quality enterprise cloud storage service should have top notch security. DropBox, one of the most popular services, has been plagued by security issues. Most of these stem from the fact that the service was built on a platform designed for consumers. Another issue with services like DropBox and Drive is that accounts are individualized for the most part. It is very difficult to administer the use of these services since many users are using individually created accounts. There is virtually no difference between allowing this, and allowing employees to put their files onto their personal computers. IT security has no way of tracking what files are where, and who has accessed them. When an employee leaves the company, they still have access to any company files that are stored there. These problems face nearly all of the cloud file sharing services out there. 

There is one service that we highly recommend for use in an enterprise environment. The system is called Soonr and the reason you've probably never heard of it is because they originally only marketed their system as a private, cloud based service to Fortune 500 companies. Soonr allows companies to  manage their cloud file sharing in any number of ways that make it much safer. The platform utilized very robust permissions to restrict file access. Users can make files read only, downloadable, editable all within the Soonr environment. And since it's managed at the enterprise level, when an employee leaves, their access to anything in the system is revoked with a few mouse clicks. Sharing files with clients is as easy as email them a link. Soonr users can even email a special link to clients to enable uploading into their Soonr workspace. 

If you're working with larger files that need to be shared with others outside or even inside your organization, you owe it to yourself and your clients to take a look at Soonr. Feel free to contact us for more information and we'll help you.



3 Comments

    Archives

    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All
    Heartbleed
    Internet
    IT
    Passwords
    Security
    Websites

    RSS Feed


BDCon

5570 Bee Ridge Rd.
Sarasota, FL 34233 
T:941.378.4377

T:855.358.9397
F:941.378.5004

solutions@bdcon.com

Click Here for Support


Florida IT Support
BDCon is Florida's premier Information Technology Consulting Firm. The services listed on this website only scratch the surface of what we can do. If you have a need that isn't specifically addressed here, let us know.  We're happy to help.
Florida IT Services including backup and recovery, virus protection, spam filtering, managed services, server installations, work station replacement, computer repair, computer networking, email, web filtering, information technology, law firm technology, charter school technology and computers.  Covering Sarasota, Tampa, Orlando, Miami, Fort Lauderdale, Jacksonville, Kissimmee, Lakeland, Bradenton, St. Petersburg, Clearwater, West Palm Beach, Melbourne, Daytona Beach, Ocala, Gainesville, Orange County, Seminole County, Hillsborough County, Sarasota County, Miami-Dade County, Manatee County Pinellas County, Brevard County, Palm Beach County, Broward County, Polk County, Osceola County and all of Florida.
Proudly powered by Weebly

BACK TO TOP

© BDCon | All Rights Reserved