Data Backup Alone Is No Longer Enough

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

Small businesses are increasingly relying on digital data to manage their operations. From financial records to customer information, digital data is the lifeblood of small businesses in today’s digital age. However, with the growing amount of data comes the need for increased data protection measures.

Backups are essential for protecting data in the event of a system failure or other unexpected event. But it’s important to understand that backups alone are not enough to ensure the safety and security of your business’s data. In addition to backups, businesses need to implement data protection measures to prevent data breaches, cyber attacks, and other forms of data loss.

Here are a few reasons why data protection is essential for small businesses: [Read more…]

8 Tech Checks To Make Before You Travel

Our technology inevitably comes with us when we travel. Most of us won’t even travel to the end of the block without our smartphones. When you go on a trip, not having your technology there when you need it can ruin your day.

Travel smarter and more securely by doing several checks before you go. Use our handy tech travel checklist. It can save you from suffering from lost devices, missing chargers, or a data breach.

Check your apps
Have you ever sat at an airport gate wondering why it looked so empty? You then found out that your gate had changed, and you had no idea. You go rushing to the other end of the concourse, hoping you’re not too late.

How did everyone else know about the gate change? They most likely had the app for the airline and received a notification.

Before you leave for a trip, make sure to download any apps you may need. It’s better to download them when you’re at home on your own Wi-Fi. If you wait until you’re at the airport, reception may be an issue.

Some of the apps you may want to grab or update before your trip are:
• Airline app
• Train app
• Hotel app
• Theme park app
• Camping ground app
• Weather app
• City tourism app

Check your cords & adapters
People leave behind countless chargers and adapters every day. They litter airports, restaurants, and train stations around the world.

Make sure to bring a backup charger for your laptop, tablet, or phone. Otherwise, you may find yourself paying a premium for a new charger in a gift shop. Your device could also go black if you lose its charger and can’t quickly get a new one.

Check your power
A great way to ensure you have the power you need is to buy a small charging battery. You can find these in most major retailers or online. They are small “blocks” that hold a charge and can power up a cell phone in a pinch.

Having this extra backup also helps you avoid potential juice-jacking ports. These are fake or compromised public USB charging ports. Hackers use them to steal your data when you plug in.

Check your mobile plan
If you’re traveling out of the country, you’ll want to check your mobile plan. If you don’t have the ability to call internationally, then you may not be able to text or call home.

Carriers can add an international capability to your plan, but ask about pricing. It can get expensive if you’re on long calls or using mobile data.

An alternative is to set up a VoIP app you can use with your office, friends, or family while you’re traveling. These enable both calls and SMS, but you do need an internet connection.

Check or add a VPN
Free Wi-Fi may be a welcome site when you’re on the road, but it can also be dangerous. You don’t know who else is using that Wi-Fi. A hacker hanging out on the connection can easily steal your data if you’re not protected.

It’s better to use either your mobile carrier connection or a virtual private network (VPN) app. VPN plans are inexpensive and will keep your data encrypted, even if you’re on public Wi-Fi.

Check your backup
Unfortunately, mishaps occur when traveling. You may leave your phone behind on a boat, have your luggage lost, or get your device stolen while in a crowded area. Ten percent of all laptop thefts happen in airports.

Don’t lose all your data with the device! Back up your devices to the cloud or local storage before you travel. This ensures that you won’t lose the valuable information on your device. You also won’t need to think twice about enacting a remote “wipe my device” command if necessary.

Check your device security
Make your devices as secure as possible before you hit the road. When we’re traveling, our minds are occupied by other things. So, you may not think to check your antivirus or avoid suspicious phishing links.

Protect your devices before you go using:
• Antivirus/anti-malware
• DNS filtering
• Screen lock with passcode
• Sharing features turned off
• VPN application
• Find-My-Device feature turned on

Check your double checks
What do we mean by checking your double-checks? Use the buddy system as a backup. When the family is getting off a plane, each should check with the other that they have all their devices.

If you’re traveling alone, have a friend or family member check up by text. Did you grab your charger? Is your VPN turned on? Those little reminders can go a long way toward avoiding digital travel nightmares.

Improve the security of your devices now
Don’t leave your devices unprotected. This could mean a breach of your banking app or personal data. Contact us for device security solutions to reduce your risk.

Article used with permission from The Technology Press.

What Is The Difference Between Backups And Redundancy?

Chris Myers is a field service technician for Tech Experts.

Modern businesses can generate massive amounts of data in a short period of time. As such, a vital topic of research are ways to project that data.

There are two main categories of data protection: redundancy and backups. These two types of data protection are both very important, but they are not interchangeable.

Both must be understood so that you are not caught unprepared when catastrophe strikes.

What Is Redundancy?
On a single hard drive, data is saved just one time. If that hard drive fails, then that data is lost. In order to prevent this from happening, multiple hard drives are used to store multiple copies of each piece of data.

This setup is called a “RAID,” which stands for Redundant Array of Independent Disks.

When a single hard drive fails in a properly set up RAID, the other drives change how they operate and continue saving files with very little interruption and no loss of data. In a business such as a doctor’s office where appointments are booked out three months in advance, redundancy can be the difference between a service call with less than thirty minutes of downtime and a multiple day outage affecting hundreds of patients and staff.

What Are Backups?
There are many other ways in which data can be lost, including file corruption, accidental deletion, fire, theft, malware, and more.

Redundancy can protect against hard drive failure, but in cases such as these, it is of no help. For example, if the user accidentally deletes a file, all redundant copies of that file will be deleted.

This is where backups come in. Backups copy your data onto a completely separate storage device.

The most secure backup systems are called offsite backups, because the data is copied to another geographic location entirely. If a user accidentally deletes a file that is backed up, that file can be restored using the backup copy.

However, restoring files from an offsite backup can take quite a long time depending on the amount of data and available network bandwidth. Due to this, many businesses keep another backup on a different device in the same building.

This is referred to as a local backup. Since restoring from a local backups only involve sending the data over the internal network, or even directly copying onto another drive, they can greatly reduce downtime.

So, Which Solution Should You Have?
None of these data protection methods are mutually exclusive and each of these methods has strengths and weaknesses.

With that in mind, most businesses will get the most benefit by having all of them in place because each one fills a gap in coverage left by another.

Redundancy will save data if a single drive is lost to mechanical failure, with very little downtime. However, it can’t protect against almost all other types of data loss.

A local backup will protect against all types of data loss except when both the default and backup locations are lost at the same time. Restoring takes longer than a redundant drive, but is still quite fast.

An offsite backup takes the longest to restore from, but protects against almost all scenarios.

So, the next time you want to impress your coworkers and possibly save the company, ask whether your server or network-attached storage has both backups and redundancy in place.

Data Redundancy And Why You Should Have It

Ron Cochran is a senior help desk technician for Tech Experts.

Data redundancy is the making of an exact copy of the data that you are currently working with, in the event of a hardware failure, theft, or those pesky mistakes where you delete something that you really wanted.

What happens is you will have 1 or more hard-drives used for backups, housing those files that are kept nearly current. You will go through the steps to rebuild or restore the files or programs that were removed, then you will be back at the point you were at before the files were lost.

The above is extremely important when you are working with money or medical records. Let’s say you were working with a customer on their tax returns and your office experienced a power outage, which turns your computer off in the middle of saving data. A short while later, the power is restored and you turn your computer on and open the data to resume where you left off — and you find out that there is no record on your computer of your client and you start to panic.

If you had a redundant data solution, then you could restore the data, but if you didn’t, then you will need to call that customer and explain that they will need to bring all of that data back in so you can enter it into your system again. Now, consider how this customer could begin to think of you and your business.

If you have a safety net, you would follow the steps from your program and, in a short while, all of that data that you lost will be restored and you’ll be back at the point when the power went out, with all of your data intact. There are several different ways you can set up a system backup. One of the ways is to have more than one storage solutions to send data to.

With this solution, you will have more than one drive that is saving that information, which will do a couple of things. It will speed up the read/write times and you take less of a chance of losing more data. It’s always wise to have more than one solution for data recovery. You don’t want to wait until it’s too late and find out that in order to recover the data on your drive it’s going to be thousands of dollars.

You can have an image copy of your hard-drive made one time a day (or once a week or maybe twice a month) with a scheduled back up. You could have an application running in the background of your computer that would take up very few resources as it copies your data to a drive or an offsite storage facility.

We offer quite a few different data redundancy solutions to our clients. Those options range from on-site RAID drives to a cloud-based solution that is off-site. With either option, you can have a data backup or an image of your operating system — or even a direct mirror copy of your hard-drive in real time.

If you are worried that you might lose valuable information, then some sort of data redundancy is probably something you should be actively seeking. If you’re overwhelmed by the options and aren’t exactly sure which method would suit your business best, contact us and we can help you narrow it down, as well as provide a solution.

Backups: Don’t Wait Until It Breaks

Accidents happen. Eventually, something will go wrong and when it does, you are going to want to be protected. Having a backup means more than just having an extra file on hand. It means being able to rest easy knowing that, if the worst should happen, it would not be the end of your business. It means that in the event of a total collapse of your systems, you have a fallback plan. It means knowing that you have already taken care of the largest problem in the event of a crash: recovering files and getting back up to date.

The most common way data is lost is due to a workstation failing due to user error or the occasional spilled drink. If the workstation is not backed up, the files may all be lost. A growing way to lose data is due to viruses and infections that spread throughout the computer and delete, steal, or corrupt the data.

The question people begin to become puzzled with is, “What can/should I backup?” The easy answer is everything. With technology being what it is today, space is cheap. You can sometimes back up an entire business for a few hundred dollars. On the other hand, you can wait for everything to go wrong, replace a dozen devices then try to start recovering all the data lost in the tragedy.

If space does become tight, start to look at things your business cannot function without, such as client information (phone numbers, email addresses, notes about the client), sales and product receipts, Internet bookmarks, anything that cannot be replaced, and anything that takes time to replace.

Backing up the data can be as simple as storing a copy of your important files on an external hard drive that you bring up to date every week. If the worst should happen after a backup is kept, you need only to plug in the backup drive to the repaired or replacement computer, copy the contents over, and continue on with your work. Instead of losing years of data, you only lose a few days.

What should you use to back up your data? In the example above, using a small flash drive or external hard drive, they can usually be damaged or lost quite easily. If the memory device is lost, it poses a problem in that it is unsecured data and can be accessed by anyone that plugs it into their computer. While these devices can be a cheap solution to backing up data, they are far from perfect.

One of the most popular solutions for any business – smaller businesses especially – is online backup. The perk of online backup is there is no hardware or software on site that can be damaged, lost, or stolen. A monthly fee based on how much storage you require is all it takes. Choose the data you want to backup and it will be securely sent to a data center where it is stored. Generally, this can be done automatically which can remove accidental user error from the equation.

In a perfect world, we would all have a backup for our data and a backup for our backup, but even having one backup can sometimes be enough to keep a problematic crash or error from becoming a monumental crisis. If you do not already have a backup in place, you have to ask yourself one thing: if all your systems crashed tomorrow, would you recover?

Is It Ever A Good Idea To Share Your Password?

Luke Gruden is a help desk technician for Tech Experts.

There are times when it can be tempting to share account information or give a coworker access to files and programs to streamline processes. Other times, you might be away from the office and someone may need something on your Windows.

There are many reasons why workers would want to share accounts and passwords that would be in good faith and, on the surface, best for business. Should this be allowed and acceptable in a work setting? The short answer is no, and for several good reasons.

As much as it would seem that sharing passwords and credential information could help workers, this can lead to poor habits and huge security vulnerabilities. All it takes is for one person to write a password down for another person to read it.

It is common for someone using social engineering to go into company buildings and look for sticky notes, note pads, or files on desktops with passwords and account information on them. This way, they have the means to steal company information.
Even worse, it will look like the user account that was used to steal information was the one stealing information instead of the thief.

Another common event at some work places is that some workers will use their coworkers account to do something risky, so if anything happens, the account holder is the one in trouble and not the person borrowing their account.

backupWhen it comes down to the pressures of keeping a job or to work towards promotions, it can be surprising what some people might resort to in achieving their goals.

Sometimes, a person sharing an account might make a mistake and mean no harm, like deleting some important files on accident or click something they didn’t know about in an area of the computer they normally do not have access to.
This would also look like the account holder made the mistakes and not the actual person. There is a reason why certain people have access to certain drives, websites, and programs. Permissions and restrictions should be respected.

Your Windows account and email are your unique fingerprints and they should be protected. Everything you do on a computer is recorded in event logs and possibly on other monitoring systems on the network. Your account information should serve you as well as prove the work you have done.

It may be tempting to share account information, but there are alternatives. If a coworker needs access to a program or website, let IT know.

If the coworker really needs access for their job, then your manager and IT will change permissions to allow them access and they’ll no longer have to ask for your password.

What about if they need to work on files that you are working on? Your IT can setup a network drive and enable access for both you and your coworker so that files can be edited and changed freely without ever logging into each other’s accounts.

There may be many other reasons as to why people may want to share their account information, but chances are, there are alternatives that your IT can implement so that no one’s personal credentials are given out. Keep your account your own and there will be no unnecessary risk or possible security threat out in the open. If you have security or user concerns or would like to develop a permissions plan, we would be happy to help. Give us a call at (734) 457-5000.

(Image Source: iCLIPART)

Is Your System’s Backup Plan Working?

Luke Gruden is a help desk technician for Tech Experts.

At any moment, anything can happen that can cause your computer to fail and lose months – if not, years – of company data. This is why it’s important to have some sort of system backup in place so that files can be retrieved in case anything ever does happen to your computer or network.

Without a backup, recovery often isn’t possible and when it is, it’s often more expensive than having a long-term backup solution in place.

Some believe that just because they have a backup solution, they’ve covered their bases. If a computer goes down, they’re still safe.

Well, what about a fire in the company building? What if both your backup device and your computer are gone? What if the cloud server goes down and your computer goes out around the same time? Seems unlikely, but it can happen.

Natural disasters like flooding or lightning storms, accidents such as fires or the destruction of physical property, human influence like a tampering ex-employee or a ransomware infection… these things typically don’t give you enough warning to move your files somewhere safe. No matter what single backup solution you might use, there is a situation where it can fail.

This is why redundancy of backups is important, such as the cloud or another device. With different backup plans utilizing different locations, you can make sure that no one natural disaster or ransomware infection can stop your business for long. If anything should happen, your data will be untouched somewhere.

It’s recommended that you have at least two different backup plans in different locations. However, the more, the better. Having three different backup plans in different locations like the cloud, an offsite backup, and onsite is optimal in making sure your data is safe.

If your company data is important (which it is), there should not be a second thought in backing it up.
Remember that the more redundancy you have with your backups, the chances of losing your data drop significantly. Also, check to make sure your backup services are working and up to date as often as possible.

That way, you will not have any surprises when you least expect it and when you most need your data. At Tech Experts, we offer backup solutions that include status notifications for every backup.

It seems like we talk about this issue a lot and it’s true. We bring it up so often because disasters do happen and there have been companies that have been crushed by not having a good backup plan. Don’t let your workplace be one of them.

Take a moment and really consider how much effort you would have to put in to bring your business back up to speed after a data disaster. As always, work with your IT department and figure out what plan is best for your company before committing to anything. Interested in learning which backup solutions would best suit your business? Contact Tech Experts at (734) 457-5000.

How Cloud Computing Can Benefit You

Michael Menor is Vice President of Support Services for Tech Experts.

Is your business using the cloud in 2016? If not, you should know that it’s a great tool that’s designed to help your business better manage its data and application deployment.

However, the cloud can be used for so much more and it’s quickly becoming an indispensable tool for SMBs.

Here are four ways that cloud computing is changing the way that small businesses handle their technology:

Data Storage
The cloud is a great way to share data among your entire organization and deploy it on a per user basis.

Businesses can store their information in a secure, off-site location, which the cloud allows them to access it through an Internet connection.

This eliminates the need to host your data internally and allows your employees to access information from any approved device through a secure connection, effectively allowing for enhanced productivity when out of the office.

Microsoft Office365
Access Office from anywhere; all you need is your computer – desktop, laptop, tablet, or phone – and an Internet connection.

Since the software is running in a data center, you just connect to the Internet to access the software.

Another benefit to this is that you have a central location for all your data. If you need to make a change to an Excel spreadsheet from your tablet and you share the file with your colleague, they will be able to view the changes that you just made.
Gone are the days of emailing files between members of your team and losing track of the most up to date file version.

Virtualization
The cloud can be an effective tool for virtualization, which is a great method for cutting costs for your business. By virtualizing physical IT components, you’re abstracting them for use in the cloud. This means that you’re storing them in the cloud.

Businesses can virtualize servers, desktop infrastructures, and even entire networks for use in the cloud. Doing so eliminates the physical costs associated with operating equipment, allowing you to dodge unnecessary costs and limit the risk of hardware failure. For example, you can deploy all of your users’ desktops virtually from the cloud so you don’t need to rely heavily on more expensive workstation technology and can instead use thin clients. Simply log into your company cloud and access all of your applications and data on virtually any Internet connected device.

Backup and Disaster Recovery (BDR)
A BDR device relies on the cloud to ensure quick and speedy recovery deployment. The BDR takes snapshots of your data, which are sent to both a secure, off-site data center and the cloud.

From there, you can access your data or set a recovery into motion. If you experience hardware failure, the BDR can temporarily take the place of your server, allowing you ample time to find a more permanent solution.

The cloud is crucial to the success of a BDR device, simply because the cloud is where the BDR stores an archive of its data.

Storm Season Is Just Around The Corner… Are You Protected?

Thomas Fox is president of Tech Experts, southeast Michigan’s leading small business computer support company.

We’ve just celebrated the first day of Spring, and before you know it, the weather will warm up and tulips will bloom. Of course, we’re also headed into Spring storm season.

If you haven’t already, it is time to prepare for those pop-up storms that occur randomly at this time of year. These unexpected storms often result in everything from ice damage to lightning fires.

During this time of year the threat of fire, flood, severe storms, water damage from office sprinklers, and even theft is very real.

One of the most valuable assets for any company is its data. Hardware and software can easily be replaced, but a company’s data cannot! As a reminder to all of our clients, here are some simple things you should do to make sure your company is ready for any natural disaster. [Read more…]

Does Your Backup Plan Stand Up To A Disaster?

Michael Menor is Vice President of Support Services for Tech Experts.

Technology, while a great asset that can be leveraged for your benefit, can also frighten businesses due to how unpredictable it can be at times. The constant threat of data loss, identity theft, and hardware failure can cripple your business’s ability to retain operations.

Specifically, businesses can learn about risk management by analyzing the processes used by an industry where risk management is absolutely critical: nuclear power plants.

In the wake of two of the most destructive and violent nuclear disasters, nuclear power plants have begun to crack down on how they approach risk management. The Chernobyl incident of 1986, as well as the tsunami-induced disaster at Fukushima in 2011, are the only nuclear disasters to reach the peak of the International Nuclear and Radiological Event Scale (INES) at a rating of 7.

This means that they had an immense impact on the immediate vicinity, as well as the environment on a worldwide scale.

The meltdown at Chernobyl was the result of an uncontrolled nuclear chain reaction, ending in an enormous explosion that resulted in fire raining from the sky and radioactive core material being ejected into the vicinity. A closer inspection of the incident revealed that the explosion could have been prevented, had the plant practiced better safety measures and risk management, like having a containment system put in place for the worst-case scenario.

In comparison, the Fukushima plant was prepared to deal with a failure of operations.

The problem that led to a disaster was one which couldn’t possibly have been prevented: the 2011 Tohoku earthquake and the resulting tsunami. The Fukushima plant had a contingency plan to shut down the plant in the event of a disaster, but tsunami prevented this from happening properly by flooding damaged power lines and backup generators, leading to heat decay, meltdowns, and major reactor damage.

Disasters like these lead to professionals searching for ways to prevent emergency situations in the future. For example, the Fukushima incident kickstarted conversations on how to prevent problems caused by the unexpected issues.

In response to emergency power generators being flooded or destroyed, off-site power generation will be implemented as soon as November 2016.

One other way that nuclear plants have chosen to approach these new risks is by outsourcing this responsibility to third-party investigators, whose sole responsibility is to manage the reliability of backup solutions. In a way, these investigators function similar to a business’s outsourced IT management, limiting risk and ensuring that all operations are functioning as smoothly as possible.

What we want to emphasize to you is that businesses in industries of all kinds expect the worst to happen to them, and your business can’t afford to be any different.

Taking a proactive stance on your technology maintenance is of critical importance. While your server that suffers from hardware failure might not explode and rain impending doom from the sky or expel dangerous particulates into the atmosphere, it will lead to significant downtime and increased costs.

In order to ensure that your business continues to function in the future, Tech Experts suggests that you utilize a comprehensive backup and disaster recovery (BDR) solution that minimizes downtime and data loss risk.

BDR is capable of taking several backups a day of your business’s data, and sending the backups to both the cloud and a secure off-site data center for easy access.

In the event of a hardware failure or other disaster, the BDR device can act as a temporary replacement for your server. This lets your business continue to function while you implement a suitable replacement.