Cost efficiency and virtualization

Small and medium-sized businesses have been seeing improvements in cost reduction and disaster recovery with the adoption of virtualization. Over the last year, virtualization has enabled Strem Chemicals, a Massachusetts-based manufacturer and marketer of specialty chemicals, to see improvements beyond their bottom line. Here are some of the reasons why thousands of companies are saving […]

It’s Time To Disaster-Proof Your Business

When and if disaster strikes, is your business going to continue to operate and cater to customers despite a possible long-term hardware failure or a network disruption? If you answer no or are not even sure what to do, you are part of a majority of business owners who have not considered disaster preparedness and […]

New Year…New Computer Security Bug…Y2K10!!

Symantec revealed the existence of a bug in their products. The problem is that updated files released and time stamped after 11:59 PM on 12/31/2009 are treated  as out of date by the endpoint security product. Symantec has a workaround, but weren’t we supposed to have learned our lesson ten years ago?  This bug is not putting a large number of customers at risk today.  Symantec is simply dating all new definition files 12/31/2009 and giving them new version numbers so users stay up to date. Symantec says they are working on a permanent solution to the problem. Amazing as it is, others are also suddenly finding year 2010 bugs in their software.  Both SpamAssassin and Windows Mobile cell phones are having issues with messages being suddenly marked as from the future — it is likely they are not the only ones. I guess we did not learn our lessons in Y2K!

Did You Hear Thunder?

As summer arrives, so does the season for stormy weather and more unforseen incidents that threaten data.  Hear how one disaster turned into a good news story!  To hear the 30 second summary, click on the link below. Good News from an Earthquake To download The 12 Insider Secrets to Protect Your Data, click here.

Is Pandemic Part of Your Business Continuity Planning?

  surgical mask The floods, earthquakes and tornadoes of 2008 motivated many companies to revisit or begin Business Continuity Planning. The recent news of a potential Swine Flu Pandemic is just one more reminder of the importance of having a working plan in place.  A vital piece of continuity planning is workforce planning specifically for a pandemic. This should include establishing remote access, web conferencing, and identifying backup sites incase sites go down. In case of a pandemic, companies need to ensure that key personnel can work remotely with secure computer and internet access. Critical systems must be accessible with contingencies in place for access if key personnel get sick and their responsibilities need to be taken over. BeckITSystems includes products to secure workers and centrally manage remote desktops and laptops for all our clients. In recent years businesses have focused on Business Continuity with specific Pandemic initiatives and virtualization server technology aimed at helping firms keep computer systems and network infrastructures up and running in the event of an outbreak or disaster. Web conferencing will help your team stay productive and allow them to conduct business without having to travel during times of potential outbreak. Remote access to files and documents is critical to making web conferencing effective. Locating and equipping a remote operations site during a crisis is next to impossible.  Companies such as Agility, specialize in continuity solutions that provide power, technology, space and connectivity in the event of a disaster. This is a good opportunity for you to emphasize to your employees the normal flu season messages–hand hygiene, stay home if you don’t feel well, etc. Access to a guide for data backup and disaster recovery is located at www.ManageMyTechnology.com .  This blog  recently featured a 12 part series on web-worker tools. Most of the tools are free, all are on the Internet and all provide excellent collaboration features plus management insight into the work. For more information on Business Continuity and Web-Worker Program Planning, you may contact BeckITSystems, Inc. on the web at www.BeckITSystems.com ; by email at KeepITGoing@BeckITSystems.com ; or by phone at (703) 433-0730.    A podcast of a good success story of business continuity is found at www.BusinessTechRadio.com   I recommend this 3 minute mp3 to you! Swine Flu Update The recent cases of swine flu in Mexico and the US are concerning, because they have occurred in individuals who have not had contact with livestock, indicating human-to-human transmission. The current year flu vaccine is not expected to provide protection.  And millions of Tamiflu treatment courses have been strategically positioned throughout the US.   Deaths have occurred in affected individuals in Mexico, and a 23 month old child in the U.S. died from this on 4/28/2009. DHS analysis at this time is that disruptions to U.S. critical infrastructure will be low, with impacts on healthcare most likely as symptomatic individuals and worried well individuals seek medical attention. Should the outbreak intensify, there may be additional effects resulting from increased absenteeism. Beginning Tips for Business Continuity Planning Establish one person as your Continuity Director and let your members know who that person is Prioritize critical functions Identify functions that could be suspended for up to two months Identify positions needed to carry out critical functions Build depth through cross training Plan for alternative work schedules and implement a web-worker program Continuity planning for your computer systems and workforce Maintain a healthy work environment Update sick leave and FMLA policies Encourage/require ill employees stay home   Basic precautions, such as hand washing and avoiding contact with symptomatic individuals are recommended.   Key Points of Business Continuity Planning   •     Establish one person as your Continuity Director and let your members know who that person is •          Prioritize critical functions •          Identify functions that could be suspended for up to two months •          Identify positions needed to carry out critical functions •          Build depth through cross training •          Plan for alternative work schedules and implement a web-worker program •          Continuity planning for your computer systems and workforce •          Maintain a healthy work environment •          Update sick leave and FMLA policies •          Encourage/require ill employees stay home

Web worker tool #10 — Remote Access

The expense and usability of VPNs is not recommended for Web Workers.  Secure remote access is best accomplished using a tool that allows remote control of and in the office computer. This provides access to one of business applications and network speeds with the utmost security. Most Web worker arrangements include worktime in the office as well as worktime an alternate location. With that arrangement the Web worker has a PC already installed in the organization’s office. As a result secure access to the employees dedicated computer is all that is needed to access corporate computing tools remotely. VPN has been the tool of choice, because of its security. Today LogMeIn provides the encrypted VPN tunnel for security with remote access to the employee’s in-office computer. Best of all, operating LogMeIn is simple and highly reliable. LogMeIn is a tool that can easily be set-up, provides VPN encryption, and, depending on the feature set required, is free or inexpensive.  Check out this wonderful application and the different versions available at www.LogMeIn.com.