Mannassi IT Solutions

Blog

What's happening.

Monkeys Banging on Keyboards: AI for Small Businesses
monkey gif.gif

Artificial Intelligence (AI) has been burning up our Twitter feed of late. Every day brings a new AI development for business, and this doesn’t appear to be slowing down in 2018. Even though this tech has the reputation of being only for large enterprise businesses, there are more than a few AI developments that you can utilize for your small business as well.

With 2018 comes the perfect time to start turning your eye toward AI. This is one phenomena that isn’t going to go away. But if you’re not building Westworld-esque robots what do you need AI for anyhow?

From customer relationship management to human resources, to marketing to analysis, there’s something AI can do for you, no matter your company’s size.

A great example is Monkey Learn. This awesome machine learning platform can turn text from emails, surveys, or even tweets into actionable data! With applications in marketing, sales, and customer service, you can get the power of knowledge without having to crunch all the numbers yourself.

Of course, most people in the tech world have heard of Watson from IBM. Besides beating world champions at chess, IBM has now released a Watson Ecosystem for small businesses enabling you to do everything from translate voice to text, to build your own analytic environment.

In short, AI is not only for the big guys! Spend some time thinking about how artificial intelligence can serve your business in the new year.

Follow us on Twitter or Facebook for the latest AI and tech updates.

The Good, The Bad, and The Ugly: 2017 in Review

As 2017 now fades into the history books, we’re reflecting on the best and worst advances (or rollbacks) in technology.

THE GOOD - Software Defined Wide Area Networking (SD-WAN)
2017 brought the explosion of SD-WAN, an amazing technology that provides high availability, failover, optimized traffic and in some cases a replacement for expensive MPLS.  SD-WAN is an affordable tech option for small and medium sized companies providing benefits once only available on an enterprise class budget.

THE BAD - Ransomware and Cyber Hacking
The worldwide pervasiveness of hacking has continued to dominate the headlines. No one is safe, whether you are a person checking your email and getting ‘spear phished’ or the Pentagon or UK National Health Service disabled by state sponsored cyber terrorism. In 2017 there didn’t seem to be anywhere safe from cyber criminals. An ounce of prevention is worth a pound of care, so in 2018 we’re doubling down on our vigorous backup and security regimens. While you can never be 100% safe, you can put a plan in place to mitigate disaster.

THE GOOD – Cloud Disaster Recovery & Business Continuity
2017 was the year the cloud really took off! Many companies have invested in comprehensive backup programs, but have not addressed what to do when disaster strikes. The ability to spin up servers and production networks in minutes as opposed to days or weeks, is now a reality with cloud solutions, making disaster recovery a minor headache instead of a full blow migraine.

THE BAD – Disrespecting The Technology
Computer networks are an integral component of every business, and you need to make sure you’ve got the tech that can do the job properly. In 2017 we still found companies buying technology that is just not suitable for business needs. From trying to get by with residential routers, or computers bought off the shelf at Best Buy. You’ve got to have the right tech to keep your company running. In 2018 don’t risk your business because you thought you were saving money. Remember the old adage: you get what you pay for.

THE GOOD – Internet of Things (IoT)
If you loved sci-fi as a kid you’ve probably been stoked by the advances in the IoT over the last several years. From vehicles with connected technology that allows manufactures and drivers to know when they need to be serviced or provide directions to the nearby gas station when the tank is running low to paying your mortgage by voice on your digital home assistant. This year was the tip of the iceberg when it comes to what the IoT can bring to businesses. In 2018 watch these connected goodies for even more exciting innovations. 

THE UGLY – Dismantling Net Neutrality
The big fight for the web in 2017 was certainly a low point. The current administration’s FCC has begun the process of removing the laws protecting Net Neutrality, paving the way for ISP’s to preference their own content and throttle competitors. With Net Neutrality rules in place you the consumer can load every website, app, video, .gif, etc., equally, regardless of where the content is hosted, or what its message is. Accessing Netflix is the same as sending a tweet. Without Net Neutrality there’s nothing to stop ISP’s from demanding premium prices for “premium” services like video streaming, or social media, or blocking content they disagree with entirely. The open internet is vital to small businesses, and freedom of speech so this threat is very unsettling. Here’s to hoping in 2018 congress can get behind a bipartisan effort to save the open internet.

What were the trends you were most fascinated by in 2017? Tweet us with your top hits and misses, and what you’re most anticipating in 2018.

No Smoke Without Fire

As of January 1st, California became the latest state to legalize recreational marijuana. With legalization spreading across the country, there have been a slew of new companies applying for licenses and permits to sell and grow marijuana. If you’ve got a plan to launch a new business in the fast-growing marijuana sector don’t forget to fortify your security. For too many new businesses security becomes a second thought until it’s too late.

Pot is, after all, a very valuable commodity. That combined with the fact that marijuana is still federally illegal, meaning financial institutions are not allowed to do business with these new dispensaries, and stores frequently have large stores of cash on hand. A comprehensive security strategy for both your data, and your physical location is a must to keep your investment safe.

It’s more than just your cash deposit and product that needs protection too. The client and patient data of your customers also needs to be protected. You’ll need a security plan that encompasses your digital environment as well as your actual physical business.

We’re experts at building affordable security systems that meet any business’s needs. Give us a call or shoot us an email if you’ve got any questions about how you can better protect your budding business.

As always, find us on Twitter and Facebook for the latest tech updates.

 

Don't Get Bit by HIPAA

Fun fact: HIPAA, the 1996 healthcare legislation that covers the security and privacy provisions for your medical information, is a lot more intensive than you may have believed. Do you know if your business is a covered entity or a business associate? Not knowing these answers could mean big fines.

HIPAA governs security for the obvious: hospitals, private practices, and medical providers. But it also covers the more unexpected: health insurance brokers, your HR department, and even your IT team. Since we began working on HIPAA compliance with clients in early 2017, we’ve found many gaps where business owners didn’t know they were required to be compliant.

If you’re sharing personal client information with a HIPAA compliant entity, even if your business has nothing to do with healthcare, you’re a business associate and you must also be HIPAA compliant! Compliance is also easy to breach; from one unlocked laptop left unattended while its user is at lunch, to not regularly changing your passwords, HIPAA can get really complicated really fast.

Here's the actual rule, straight from the HHS department: “The Privacy Rule requires that a covered entity obtain satisfactory assurances from its business associates that the business associate will appropriately safeguard the protected health information it receives or creates on behalf of the covered entity.” Do you know if your business associates are HIPAA complaint?

Don’t get too far into 2018 without double checking your security requirements. Remember, protected health information (AKA PHI & ePHI for its electronic cousin) covers any potentially identifiable information from phone numbers to official diagnoses and everything in between.

We’re happy to talk HIPAA with you any time. Follow us on Twitter & Facebook & reach out with any questions you might have!

2017 Wrap Up: 5 Tips to End the Year Right!

With the year winding down it’s a good time to double check to make sure you’ve got all your ducks in a row for 2018. Here are five tips for loose ends to tie up before the ball drops.

  1. Brush up on the numbers! Contact your CPA and have them run the numbers. This helps you to see if you need to do some last-minute purchases in order to reduce your taxes.
  2. Upgrade under the wire! If you’ve considered upgrading your computer or network equipment, check with your accounting department to see whether purchasing (Capex, aka capital expense) or leasing (Opex, aka operational expense) will save you the most money.
  3. Shop til you drop! The end of the year is a perfect time to purchase, as most vendors are trying to wrap up their end of year sales. Be on the lookout for special end of year deals and grab that tech you’ve been eyeing.
  4. Clean house! Have you been holding on to old equipment “just in-case”? Now is the time to donate! Make your charitable donations before the new year so you can use the deduction on this year’s taxes.
  5. Budget now, play later! Start making a list for your 2018 budget, it may seem like not a lot of fun, but the new year is only a couple of weeks away.

What big plans have you got for the end of 2017? Follow us on Twitter or Facebook to share!

To Partner or Not to Partner, That is the Question

When Amazon announced its purchase of Whole Foods Market many people were scratching their heads—how would this seemingly bizarre new partnership affect their grocery budget? Now that the purchase has taken its training wheels off and you can order your organic groceries from your laptop while sitting at home in your PJs, we’re wondering what other surprising partnerships could shake things up and make us wonder how we never thought of it before! Other recent team-ups include Taco Bell and Lyft joining forces to bring you straight to your late-night cravings, as well as the seemingly contradictory recent link up between USPS, UPS, & FedEx.  

You may find yourself wondering how partnerships between competitors work. In the case of the FedEx x USPS x UPS dream team these three competing companies have united to bring service to remote and underserved areas. If you live in an area FedEx or UPS do not service, your ordered items will be delivered first to your local post office, then your regular mail carrier will bring them to your door. It’s this type of teamwork that expands services and builds sales relationships—with new delivery options come increased sales—making the benefit outweigh the risks of working with a direct competitor.

Are there surprising partnerships lurking out there for your company? After seeing the success of these strange bedfellows, it may be time to consider companies that may have flown under your radar before.

Like us on Facebook or follow us on Twitter to keep up with all the recent tech buzz.

Tech Trends for 2018

As 2017 draws to a close, most of us start looking forward to what 2018 holds in store for us tech obsessed. So, what’s on its way to the top in 2018?

In the future, we’ll need to make smarter decisions more quickly, and that means bringing Artificial Intelligence (AI) into mainstream business practices. Customized machine-learning systems that can target a specific job using algorithms that are optimized the task are the next tech wave. A perfect example is the new driverless vehicles we’re seeing just beginning to pop up.

With the rise of AI apps will need to be more intelligent, so we should all be asking software and app vendors about the artificial intelligence strategy for their products.  AI will bring business analytics to a new level and ultimately enhance user experience. Look for AI to become pervasive in everyday life as well, we are already seeing vacuum robots that maneuver around your home and lawn mowers that cut just the grass and not your prize roses.

Also look for Virtual Reality (VR) to become more common in business. With VR you’re no longer limited to one or two monitors on your desk, but instead can have an almost limitless display that you can manipulate with the swipe of your hand in the air. All signs point to 2018 being an exciting year for technology and business, but it’s going to be a wild and bumpy ride, with new developments coming so quickly. Make sure you hang on tight!

Follow us on Facebook or Twitter to stay in the loop with the latest tech trends.

 

The IT Elves are at Work!

We all look forward to the holidays and with them the chance to take some days off and relax. This time of year, however, can be a busy time for IT departments. While your staff is at home with their families & their favorite Netflix shows it’s the perfect time for your IT crew to perform upgrades and maintenance with the least inconvenience to you and your workforce!

Another bonus of the holiday quiet time is that often IT budgets are closed on December 31st so it can be a good time to use those remaining dollars on needed upgrades. Plus, with fewer staff in the office the more mundane tech tasks—from inventory to asset management to the exceptionally dull task of documentation—can be addressed with minimal interruptions

Have a thought for you IT crew this holiday season, maybe gift them an extra energy drink or two, because while you’re at home watching Die Hard (the best Christmas movie ever), they’re hard at work building you a better IT network!

As always, follow us on Twitter or Facebook for regular tech updates.

It's Hard to Say Goodbye

Digital PBX phone systems: they sit in some dark, dusty closet ignored by everyone, because, like the Energizer bunny, they just keep going and going.  Nortel, Avaya, Mitel, Panasonic, all these are household names in the telephone world, and we really do take them for granted No matter how tried and true these brands may be, they’re also, like, so 20th century. 

Most of these systems are now at their end of life and end of manufacturer support, so you’re forced to rely on ‘the phone guy’ to keep them running. If repairs are needed, get ready to google, because you’re going to have to dig up some old parts on Ebay or Craigslist. Yes, PBX systems have been steadfast companions for years, but sometimes, you really can’t teach an old dog new tricks.

Interestingly, when we talk to company executives they consider their phones a higher priority than email, or even internet. Yet so many companies are happy to cross their fingers and only hope that these old PBX systems will keep on running.  When we perform telecoms evaluations for businesses, we find that in most cases the cost of owning an old PBX is higher than investing in a new IP phone system! Not to mention, with PBX you’re stuck with a single point of failure: hoping your phone guy can find a spare part each time a repair is needed, & praying you don’t miss important calls during the downtime.

The technology of IP telephone systems has significantly advanced in the last several years, especially when it comes to cloud hosted PBX, which now brings high availability in addition to its other features (no upfront expenses, low operating costs, and easily scalable provisioning among a vast array of other bonuses). With all the bonuses of an IP system it’s time to put your old PBX out to pasture and bring your business into the 21st century.

Bigger and Better!

Mannassi IT Solutions is in the process of investigating opening a UK division. Only a few years ago even just the thought of this would have been daunting! How to link offices, share data, and still make everything easy to operate was once almost inconceivable. Now, however, technology is readily available that can make your company’s IT infrastructure extendable and securely accessible to remote users and offices all over the world! US based telecom companies have expanded their footprint to link the USA to Europe, Asia and the wide world beyond. Cloud providers can now replicate data and applications to datacenters around the globe keeping data close to users no matter where they are and reduce the latency of opening multiple files and applications.  IP telephone systems can make 3 or 4-digit extension calls between offices across a continent as easy and seamless as those across the office. With all these technologies at our fingertips expanding is easier than ever!

If you’re ready to expand but all this still sounds a little daunting, we at Mannassi IT solutions have existing relationships with many of these international capable vendors, so we can help you navigate the big bad world of global expansion.

Follow us on Twitter or Facebook to keep up with our UK expansion! Plus all the tech news that's fit to tweet!

Celebrity Death Match: Mac vs. PC

You’ve probably heard all the gossip about Macs vs. PCs. It seems like everyone has a chosen side in the battle between platforms. So how do you know which one is right for you?

Macs & PCs each have their strengths and weaknesses. Spending a few minutes thinking about what you’ll need your computer to actually do will save you a lot of potential headaches in the future. Of course, in recent years the capability gaps between Mac and PC have inched ever closer, meaning you can increasingly use either platform to meet your specific needs. Still, it’s good to know where to start when you’re looking for the most effective technology solutions.

If your focus is on multimedia editing and you need something easy to use fresh out of the box with limited setup and solid default security options, then a Mac may be right for you.

But if you’re looking to rely on network resources, regularly upgrade, and customize or if you have a limited budget, a PC might be the better way to go.

Whichever one you choose, Mannassi IT Solutions can be your tech support. We’re your one stop shop for all your computer needs, whether Mac or PC!

As always, follow us on Twitter or Facebook for the latest tech news.

 

Tech Mergers and Acquisitions

In one week, two of our key vendors announced major acquisitions!

Telarus, our master agent for voice data and cloud solutions, acquired another Utah based master agent CarrierSales. From a customer standpoint, this means several things:

  • Increased support with industry veterans.
  • Contact center expertise and providers (InContact, Five9, and more).
  • Mobility expertise and providers (AT&T, Verizon Wireless, T-Mobile, Sprint).
  • Direct access to every major ILEC at top-tier commission (AT&T, Verizon).
  • Diamond-level support with CenturyLink.
  • Access to cloud compute and cyber security engineers.

We will also have access to new providers such as: Cox, AT&T (direct), Verizon (direct), Bullseye, Fuze, Netfortris, CallTower, Intelispper, PGi, Sprint, and more. So, your options are about to expand exponentially!

Also last week Autotask, the platform we use to manage our ticket system, announced that it has acquired Datto; a world-renowned company providing solutions in business continuity, backup, disaster recovery, networking, etc. We are excited about being able to access this new range of products, and that it will now be part of the Mannassi IT Solutions managed products portfolio!

Sometimes acquisitions can sound a little scary, but they can end in much higher quality of service, and a wider range of options for you and your business.

As always, stay in the loop with Mannassi IT Solutions by following us on Twitter and Facebook.

 

Do You Have A Krack in Your Wifi?

The latest dent in network security is the recent announcement that hackers have figured out a way to breach Wi-Fi connections on almost every single Wi-Fi enabled device. The Krack attack is a major blow to mobile security, but the good news is that iOS and Windows are not vulnerable because of the way Apple and Microsoft implement the security handshake. If you’re an unlucky Android or Linux user however, you are vulnerable.  What it all boils down to is that millions of devices are affected, including embedded devices (otherwise known as the Internet of Things). To protect yourself you need to research all of your wi-fi devices and confirm if they are on the attack list. If they are make sure to download the most recent patch, or immediately take them out of service.

Of course, you can probably tell this can be a labor-intensive process. If it’s too much to handle you can always drop us a line for assistance or advice.

As always, follow us on Twitter or Facebook for the latest tech updates from around the globe.

We Hear You Knocking, But You Can't Come In!

A vital element of network security for any company is to have a business or enterprise class firewall protecting their network. The primary firewall role, of course, is to protect computer assets and data from attack by hackers. What many people don’t realize is that hacking is going on twenty-four-seven! , Many breaches could be prevented, if only you were aware that a person or persons unknown has spend the last two weeks  attempting to break in. Just like in a heist movie, any lock can be picked given enough time, so your firewall needs to be constantly monitoring for intruders.

You need a firewall that is either setup with an intrusion prevention system (IPS) that sends out notifications when it detects significant activity on the the firewall, or the firewall is managed and monitored 24x7x365 by a security operations center, which is known as a managed firewall or security as a service (SaaS). Building a wall alone isn’t enough, hackers can be working to disassemble it brick by brick while you’re asleep!

Mannassi IT Solutions can deploy a range of firewalls from Cisco, Fortinet and SonicWall with IPS, plus we offer security as a service as part of our managed services portfolio.  Contact us to learn more about what options might be right for you.

Follow us on Twitter or Facebook to keep in the loop on the latest security updates.

This is what a phishing message looks like.
Phishing 1.jpg
Phishing 2.jpg

Think you can spot a phony message a mile away? Test yourself! Which one of these messages is real and which one is a fake?

Feeling confident in your choice? Here’s the secret: both of the above images are scam messages designed to phish your email account. That’s right. Both of these very legitimate looking emails are actually the work of a hacker.

And if that didn’t scare you, this might: both of these emails made it through the built-in email security in Office 365. Even Microsoft couldn’t spot these bad-boys! The best defense is a strong offense, so we always recommend a cloud based email security service like the award winning Proofpoint to make sure these types of messages don’t even grace your inbox with their presence.

In the meantime though, how can you spot these type of sophisticated attack emails? Here’s three tips for not getting hooked by phishing scams.

1: Triple check that email address.

More often than not a phishing email address will look very close to the real thing, but still have something slightly off. For example, instead of a name@school.edu address a scam email will come from name@schooledu.com. Many scammers will also use a domain off by only a letter or two. Instead of getting an email from name@mannassi.com you’d get one from name@manassi.com. Noticing that tiny shift can save you a major security headache!

2: Urgent action (not) required.

Emails requiring urgent action on threat of your account being shut down are also suspect. Watch out for phrasing requiring you to click an embedded link to prevent your account from being closed (or the IRS from beginning an audit).

3: Brush up on your grammar skills!

Emails containing grammatical errors or otherwise broken English are also almost certainly scams. Ever-changing tense, or addressing you in a non-traditional way, in the email is a good sign that something phishy is afoot.

Of course, the best way to prevent errant clicks in scam emails is to bar them from your inbox in the first place. That’s why for the month of October we’re offering FREE Office 365 migration with the added security bonus of a month of free Proofpoint email cloud security. Because do you really have time to triple check every email that comes your way?

Follow us on Twitter and Facebook for more cybersecurity updates!

 

Swimming with the fishes!
Cybersecurity Month Times Square COMPLETE.jpg

Phishing attacks have been ubiquitous cybersecurity threats almost since the invention of email, but in 2017 hackers have really stepped up their game.

We’ve had several clients very nearly fall victim to these suped up schemes. With spoof messages that are designed to look identical to the real thing, it can be harder and harder to spot the troublemakers lurking in your mass of unread emails.

The latest attacks seem to follow the same formula: after your email is compromised it is used to send your accounting department requests for wire transfers. These scam emails look exactly like the real deal, leaving companies playing guess and check with their security and money!

The advanced nature of phishing attacks in 2017 is why we always recommend more than just your email host’s basic security options. These advanced level attacks aren’t being caught by default email security, even in Office 365, so you need an extra layer of advanced security. We’d rather be safe than sorry by using advanced cloud email security applications like the award winning Proofpoint. These can spot those tricky spoof emails and prevent them from ever daring to enter your inbox!

October is cybersecurity awareness month, so we’re offering a special email security package! Customers who sign a new 12-month contract with Mannassi IT Solutions before October 31st will get free Office 365 migration and one month of free cloud email security with Proofpoint. The best defense is a strong offense, so reach out to us today.

Want more of the latest in cybersecurity? Follow our Facebook or Twitter @MannassiIT.

3 Little Known Security Secrets that Can Make A BIG Difference

If you’ve been following us long you know that we’re always harping on about security here at Mannassi IT Solutions. We firmly believe that a solid offense is the best defense, especially when it comes to protecting your data and by extension your business. The big threats most everyone is aware of; malware, ransomware, phishing scams etc. But what are the most overlooked security threats? Here’s three security vulnerabilities that are oft forgotten.

1: Where’s that WiFi coming from?
Ever sent a personal email over the coffee shop WiFi? It’s not secure! One of the top ways hackers can break into your laptop or cell phone is by using a public wifi connection. Not to mention, if you’re required to be HIPAA compliant, sending an email that contains ePHI over an unsecured WiFi connection is a big no no.

2: Calling all charging ports!
You’ve probably been stranded in an airport at some point in your life, with your cell battery running low and so many work emails to answer. Many airports have provided a simple solution, USB charging ports. But these ports are often home to those with nefarious purposes! A USB is a simple way to break into your device, so plugging in to a public USB connection is kind of like wearing a sign that says “KICK ME”.

3: Ma, don’t write down your password!
One of the top ways someone can get into your computer is when you’ve written down your password & stuck it to your monitor. We’ve even seen laptops with passwords stuck to the outside! Why don’t you give the neighborhood thief the keys to your car while you’re at it? Your password is your first line of defense, and should be strong as well as secret. If you really can’t manage to remember all you passwords consider using something like Keypass, which allows you to securely store the keys to everywhere your tech takes you.

There you have it! Are you guilty of any of these security faux pas? Tweet us @MannassiIT & tell us your security stories.

What’s a Hybrid Cloud & What Does it Want?

I’m sure by now you’ve caught wind of the cloud storage trend. Organizations big and small have been moving to the cloud or thinking about it for some time now, and it’s been touted as the wave of the future for data management. Certain more security concerned businesses, however, have been reluctant to move into this brave new world of storage. With their reluctance, new solutions have had to be found. Flash forward to now, and the hybrid cloud infrastructure is the talk of the town. But what the heck is it?

Contrary to the name, it is not some half chicken half monkey monstrosity. Hybrid cloud really just refers to the process of using multiple clouds all connected to your data center. Instead of having only one option for cloud storage you have several, and their use depends on the type of data they’re meant to keep.

Using a hybrid cloud setup you’d be able to store your privileged data (your EPHI if you’re required to be HIPAA compliant for example) on a private cloud, while still being able to utilize the public cloud (like Amazon Web Services) and all its extended resources. Because these multiple houses store varying levels of protected data your exposure threat is minimal; the most sensitive information is stored privately away from potentially prying eyes.  The tricky bit then becomes how to get them all to work together!

If you’ve been thinking about moving your storage into the cloud, or upgraded the cloud services you’re already using, reach out to us. We can help make the process much smoother.

As always, follow us on Twitter @MannassiIT or Facebook for daily updates.

It’s 11am, Do you know where your data is?

With the advent of Bring Your Own Device (BYOD) and Internet of Things (IoT) keeping track of corporate data is getting more and more difficult every day.  Employees want to get company email on their personal cell phone and tablets issued for field work often have access to and/or store company data.  Even Internet enabled devices such as hand scanners have potential to store data and credentials!  In this brave new world of connected devices, mobile device management (MDM) becomes a must. 

Having the ability to wipe data remotely from a personal device is essential to stop data leakage in its tracks.  There is a growing market for IT tools that can manage devices on the IoT.  Cisco Meraki Mobile Device Manager and VMware Airwatch are just a couple of products distinguishing themselves in this arena.

Unless you’re an expert, planning, designing, and implementing these new tools can be a major headache: taking up your valuable time trying to figure out how to fit together the puzzle pieces. Mannassi IT Solutions to the rescue! Give us a call and let us help you protect the crown jewels of your computer network.

True Horror Stories: When the Backup Goes Boom
'It' 2017

'It' 2017

Recently a client of ours had a nightmare situation. Their hard drive crashed and when we sent it off for emergency data recovery the prognosis was bleak: too much damage to recovery anything.

There are two things that strike fear in the hearts of IT professionals across the globe: a creepy clown with a red balloon, and the look on a client’s face when you have to tell them their data is gone for good. Weeks, sometimes months or years of important information gone in a split second. Just thinking of it is enough to send anyone down into the sewers in search of answers.

Once a hard drive is seriously corrupted there is nothing your tech team can do, no matter how good they are. The only defense in this case is a strong offense: make sure you are regularly backing up your data so that if the worst should happen you don’t have to start again from data that is months (or years) old. Daily backups are ideal to make sure you’re not sent back to square one should the worst happen.

Remember, even if emergency data recovery can get your information back, it is costly and can result in days of unexpected downtime. The best way to save yourself is to not get stuck in the first place. Remember: backup backup backup!

As always, follow us on Facebook and Twitter for regular updates about keeping your business moving smoothly.