Monday, April 4, 2011

Advice When You Lose Your Device

A laptop is stolen every 12 seconds, according to "The Billion Dollar Lost-Laptop Study," conducted by Intel Corporation and the Ponemon Institute. "Transportation venues, such as airports and train stations are not the riskiest places; seemingly safe locations, such as homes and hotel rooms account for more than 40 percent of laptop disappearances."

So what should you do? Most people do not even do the basics: encryption, back-up and anti-theft technologies. Laptops and smartphones allow you to password protect them. It's simple. Yet for some it is cumbersome; it adds a step or two. However, if important or sensitive customer or company information is kept on these devices, shouldn't at least the fundamental protections be put in place?

For laptops, think about storing passwords and sensitive info in a storage app like KeePass, TrueCrypt, or BitLocker. Some laptops like Lenovo come with one. Record the serial and model numbers now. Asset management software is available to track such items as 3G/4G data cards, laptops, cellphones, projectors, flash drives, external hard drives, iPads, e-readers, and copiers.

Did you know copiers have a hard drive that should be removed or wiped before replacing? Many smartphones like Blackberries and iPhones have a data wipe application available for remote usage. (SmrtGuard SmrtApps is BlackBerry data wipe, for example). The value of the laptop or other device pales in comparison to the data loss. How often has a friend asked for your contact info because he had to replace his phone - and had no backup! It's easy to backup data today. Carbonite, Mozy, SugarSync and so many more online data services are easy to use and fairly inexpensive. Dropbox is another service to store documents safely since it is password protected. Phone contacts can be backed up by syncing to a laptop. These can be further saved by uploading to Gmail or another email service.

It is suggested that all music, video and photos be saved on DVD and an online service like Picasa or Flickr. You won't get these memories back. A security leash is available as well. Examples include MyLaptopGPS, Adeona, Undercover antitheft software and PreyProject (for phone or laptop). GadgetTrak is available for Mac, PC, and smartphones. Just 30 minutes of preparation to load a security leash, a data wipe app, and set up passwords will go a long way in peace of mind if your devices are lost or stolen.

Thursday, March 10, 2011

The Pervasive Web

Without even knowing it – before the buzz word was Cloud – the Internet became a utility. As important as electricity for business.

The Internet is the foundation for the largest information resource ever created. The Internet is the conduit of communications. Email, chat, instant message, VoIP, digital voice, Skype and now this called UC (unified communications).

Businesses rely on the Internet to access banking, order supplies, check order status and shopping. More businesses want to sell products and services over the web, like Borders Bookstores as they close brick-and-mortar stores to focus on online stores and e-books. Many businesses have already switched to credit card processing over IP as well as shifting fax orders to a web platform. Social networks like LinkedIn, Twitter and Facebook are primary lead generation streams and marketing mediums.

So many businesses count on applications, software and systems that are not on premise.

As a business owner, if you stopped to think about it, the Internet has become as necessary for your business as electricity without even noticing.

Given this situation, a business continuity plan is necessary to consider what happens if data or applications become unavailable for any reason – outage, security breach, hardware crash, virus or malware, or financial reasons. Recently, the federal government has been closing down hosting companies that may be associated with copyright infridgement (via ICE). In the process, legitimate businesses have been affected.

This is simply a reminder that as a business owner a plan as to how your business would continue to run if your Internet or electricity was down or if your data or applications provider was unavailable.

No one thinks it will happen to them, until it does.

Tuesday, January 18, 2011

What to Do When you Lose Your Device

A laptop is stolen every 12 seconds, according to “The Billion Dollar Lost-Laptop Study,” conducted by Intel Corporation and the Ponemon Institute.

“Transportation venues, such as airports and train stations are not the riskiest places; seemingly safe locations, such as homes and hotel rooms account for more than 40 percent of laptop disappearances.”

So what should you do? Most people do not even do the basics: encryption, back-up and anti-theft technologies.

Laptops and smartphones allow you to password protect them. It’s simple. Yet for some it is cumbersome; it adds a step or two. However, if important or sensitive customer or company information is kept on these devices, shouldn’t at least the fundamental protections be put in place?

For laptops, think about storing passwords and sensitive info in a storage app like KeePass, TrueCrypt, or BitLocker. Some laptops like Lenovo come with one.

Record the serial and model numbers now. Asset management software is available to track such items as 3G/4G data cards, laptops, cellphones, projectors, flash drives, external hard drives, iPads, e-readers, and copiers. Did you know copiers have a hard drive that should be removed or wiped before replacing?

Many smartphones like Blackberries and iPhones have a data wipe application available for remote usage. (SmrtGuard SmrtApps is BlackBerry data wipe, for example).

The value of the laptop or other device pales in comparison to the data loss. How often has a friend asked for your contact info because he had to replace his phone – and had no backup! It’s easy to backup data today. Carbonite, Mozy, SugarSync and so many more online data services are easy to use and fairly inexpensive. Dropbox is another service to store documents safely since it is password protected.

Phone contacts can be backed up by syncing to a laptop. These can be further saved by uploading to Gmail or another email service. It is suggested that all music, video and photos be saved on DVD and an online service like Picasa or Flickr. You won’t get these memories back.

A security leash is available as well. Examples include MyLaptopGPS, Adeona, Undercover antitheft software and PreyProject (for phone or laptop). GadgetTrak is available for Mac, PC, and smartphones.

Just 30 minutes of preparation to load a security leash, a data wipe app, and set up passwords will go a long way in peace of mind if your devices are lost or stolen.

VoIP Hosted PBX Phone Service for Michigan Business

Being from Michigan, iM1 understands the struggles facing the economy of the area. iM1 is therefore introducing a communications solution that is far superior to other available options and is also financially responsible in these challenging times.

Known as “ iM1 Voice”, this hosted, Voice over Internet Protocol (VoIP) solution helps businesses upgrade their current communications systems quickly, painlessly and economically. Unlike many VoIP providers, iM1 is dedicated to creating a customized communications solution that works for your unique business. iM1 Voice helps create efficiencies in your business that will allow you to to be more productive which keeps your staffing costs lower while you grow.

The hosted communication solution allows for businesses to utilize hundreds of the same features and functions that are available to Fortune 500 companies, without the high cost of installing and maintaining traditional premises based equipment. Small to medium sized companies can now have a large appearance without the large budget.

For more information, to view customer comments, or to schedule a free demonstration, call 88.VOICE.IM1 (888.642.3461) or visit www.im1.com.