Monday, April 4, 2011

Advice When You Lose Your Device

A laptop is stolen every 12 seconds, according to "The Billion Dollar Lost-Laptop Study," conducted by Intel Corporation and the Ponemon Institute. "Transportation venues, such as airports and train stations are not the riskiest places; seemingly safe locations, such as homes and hotel rooms account for more than 40 percent of laptop disappearances."

So what should you do? Most people do not even do the basics: encryption, back-up and anti-theft technologies. Laptops and smartphones allow you to password protect them. It's simple. Yet for some it is cumbersome; it adds a step or two. However, if important or sensitive customer or company information is kept on these devices, shouldn't at least the fundamental protections be put in place?

For laptops, think about storing passwords and sensitive info in a storage app like KeePass, TrueCrypt, or BitLocker. Some laptops like Lenovo come with one. Record the serial and model numbers now. Asset management software is available to track such items as 3G/4G data cards, laptops, cellphones, projectors, flash drives, external hard drives, iPads, e-readers, and copiers.

Did you know copiers have a hard drive that should be removed or wiped before replacing? Many smartphones like Blackberries and iPhones have a data wipe application available for remote usage. (SmrtGuard SmrtApps is BlackBerry data wipe, for example). The value of the laptop or other device pales in comparison to the data loss. How often has a friend asked for your contact info because he had to replace his phone - and had no backup! It's easy to backup data today. Carbonite, Mozy, SugarSync and so many more online data services are easy to use and fairly inexpensive. Dropbox is another service to store documents safely since it is password protected. Phone contacts can be backed up by syncing to a laptop. These can be further saved by uploading to Gmail or another email service.

It is suggested that all music, video and photos be saved on DVD and an online service like Picasa or Flickr. You won't get these memories back. A security leash is available as well. Examples include MyLaptopGPS, Adeona, Undercover antitheft software and PreyProject (for phone or laptop). GadgetTrak is available for Mac, PC, and smartphones. Just 30 minutes of preparation to load a security leash, a data wipe app, and set up passwords will go a long way in peace of mind if your devices are lost or stolen.

Thursday, March 10, 2011

The Pervasive Web

Without even knowing it – before the buzz word was Cloud – the Internet became a utility. As important as electricity for business.

The Internet is the foundation for the largest information resource ever created. The Internet is the conduit of communications. Email, chat, instant message, VoIP, digital voice, Skype and now this called UC (unified communications).

Businesses rely on the Internet to access banking, order supplies, check order status and shopping. More businesses want to sell products and services over the web, like Borders Bookstores as they close brick-and-mortar stores to focus on online stores and e-books. Many businesses have already switched to credit card processing over IP as well as shifting fax orders to a web platform. Social networks like LinkedIn, Twitter and Facebook are primary lead generation streams and marketing mediums.

So many businesses count on applications, software and systems that are not on premise.

As a business owner, if you stopped to think about it, the Internet has become as necessary for your business as electricity without even noticing.

Given this situation, a business continuity plan is necessary to consider what happens if data or applications become unavailable for any reason – outage, security breach, hardware crash, virus or malware, or financial reasons. Recently, the federal government has been closing down hosting companies that may be associated with copyright infridgement (via ICE). In the process, legitimate businesses have been affected.

This is simply a reminder that as a business owner a plan as to how your business would continue to run if your Internet or electricity was down or if your data or applications provider was unavailable.

No one thinks it will happen to them, until it does.

Tuesday, January 18, 2011

What to Do When you Lose Your Device

A laptop is stolen every 12 seconds, according to “The Billion Dollar Lost-Laptop Study,” conducted by Intel Corporation and the Ponemon Institute.

“Transportation venues, such as airports and train stations are not the riskiest places; seemingly safe locations, such as homes and hotel rooms account for more than 40 percent of laptop disappearances.”

So what should you do? Most people do not even do the basics: encryption, back-up and anti-theft technologies.

Laptops and smartphones allow you to password protect them. It’s simple. Yet for some it is cumbersome; it adds a step or two. However, if important or sensitive customer or company information is kept on these devices, shouldn’t at least the fundamental protections be put in place?

For laptops, think about storing passwords and sensitive info in a storage app like KeePass, TrueCrypt, or BitLocker. Some laptops like Lenovo come with one.

Record the serial and model numbers now. Asset management software is available to track such items as 3G/4G data cards, laptops, cellphones, projectors, flash drives, external hard drives, iPads, e-readers, and copiers. Did you know copiers have a hard drive that should be removed or wiped before replacing?

Many smartphones like Blackberries and iPhones have a data wipe application available for remote usage. (SmrtGuard SmrtApps is BlackBerry data wipe, for example).

The value of the laptop or other device pales in comparison to the data loss. How often has a friend asked for your contact info because he had to replace his phone – and had no backup! It’s easy to backup data today. Carbonite, Mozy, SugarSync and so many more online data services are easy to use and fairly inexpensive. Dropbox is another service to store documents safely since it is password protected.

Phone contacts can be backed up by syncing to a laptop. These can be further saved by uploading to Gmail or another email service. It is suggested that all music, video and photos be saved on DVD and an online service like Picasa or Flickr. You won’t get these memories back.

A security leash is available as well. Examples include MyLaptopGPS, Adeona, Undercover antitheft software and PreyProject (for phone or laptop). GadgetTrak is available for Mac, PC, and smartphones.

Just 30 minutes of preparation to load a security leash, a data wipe app, and set up passwords will go a long way in peace of mind if your devices are lost or stolen.

VoIP Hosted PBX Phone Service for Michigan Business

Being from Michigan, iM1 understands the struggles facing the economy of the area. iM1 is therefore introducing a communications solution that is far superior to other available options and is also financially responsible in these challenging times.

Known as “ iM1 Voice”, this hosted, Voice over Internet Protocol (VoIP) solution helps businesses upgrade their current communications systems quickly, painlessly and economically. Unlike many VoIP providers, iM1 is dedicated to creating a customized communications solution that works for your unique business. iM1 Voice helps create efficiencies in your business that will allow you to to be more productive which keeps your staffing costs lower while you grow.

The hosted communication solution allows for businesses to utilize hundreds of the same features and functions that are available to Fortune 500 companies, without the high cost of installing and maintaining traditional premises based equipment. Small to medium sized companies can now have a large appearance without the large budget.

For more information, to view customer comments, or to schedule a free demonstration, call 88.VOICE.IM1 (888.642.3461) or visit www.im1.com.

Wednesday, December 22, 2010

Just in time for the Holidays: TeachParentsTech.org

Google launches TeachParentsTech.org where kids can send their parents a personalized Tech Support Care Package. There are 50+ videos covering everything from “how to copy and paste” to “how to attach a file to an email”. Videos are divided into 5 categories, including The Basics, World Wide Web, Communication, Media, and Finding Information. Wrap up your video with a custom email and off it goes! Mom and Dad will receive your message and a link to the video(s) you selected. While TeachParentsTech.org may not answer all your parents questions, it will at least shave some time off your tech support duties.



Happy Holidays from iM1!

Thursday, December 16, 2010

iM1 launches new website for Healthcare Real Estate Services in Brighton, MI

iM1 launches a new website for Healthcare Real Estate Services in Brighton, MI. Healthcare Real Estate Services was founded to provide healthcare professionals with the options, analysis, recommendations and solutions to all of their real estate requirements. Visit the new Healthcare Real Estate Services website at www.healthcarerealestatesvcs.com.



Learn more about iM1 at www.iM1.com.

Friday, December 3, 2010

How Important is Your Data?

In the wake of Katrina, a number of businesses called to order phone lines for new offices. The move was the result of severe flooding in the offices that they had before Hurricane Katrina struck the New Orleans area. Flooding and the resulting water damage is something every business should think about (and determine if they have insurance coverage for).

The shock came a week later when these same business owners – doctors, lawyers, accountants – had to cancel phone line orders because they could not open their offices. Client files, invoicing, scheduling were all destroyed. How important is your data?

Effectively this meant that they had No Business. They had to piece everything together from scratch.

These were paper files. No backups. No electronic copies. Even the computer files were not backed up.

We live in a Digital Age. Your photos, music, video, notes, messages, reminders, schedule is all digital. On your phone – which when you lose it or it breaks – all your stuff is gone. On your laptop or computer, when that hard drive fails or a virus cripples your machine, all digital information, memories, data are gone.

The Cloud is all about high availability of your data. Access your data wherever you are, on whatever device is Internet connected.

Data storage and back-up are cloud offerings for peace of mind. Not only should you back up all your computer files regularly, you should back them up to a remote site. Having a removable hard drive as backup is smart. Keeping that removable hard drive at your office overnight is not, since flood or fire will damage the original data and the backup copy.

In addition, sync your smartphones regularly, if for no other reason than the contact list. How often have you seen a status update from a friend asking for phone numbers because she lost her phone or it dies?

Amazingly, in the aftermath of both 9/11 and Katrina, many businesses do not perform any business continuity or disaster recovery planning at all. The prevailing thought is that it won’t happen to me. Honestly, in this digital age, your data is the primary asset of your business. Protect it.

Learn more about iM1 at www.iM1.com.