Friday, April 18, 2014

CARBONITE: Access your files anywhere, anytime


carbonite-stock

Carbonite, Inc.,  is a leading provider of cloud solutions.  It keeps businesses and home offices running smoothly with backup and recovery solutions.

Carbonite’s implementation of administrative, physical, and technical safeguards help ensure confidentiality, integrity, and availability.

So what exactly is Carbonite you ask?

Cloud computing is a data center that keeps your files safe while allowing them to be accessible from anywhere in real time.

Instead of backing up your photos and files on external hard drives, cloud backup sends your data to a secure, offsite storage facility.

Accessing your files

Carbonite
  • Anytime Anywhere Access allows you to download any file to any Internet-connected compute
  • Download files from your backup using Anywhere Access without removing them from your Carbonite backup
  • View your backed up data and restoring files/folders through the web interface
  • With private encryption key, Anytime Anywhere Access is disabled from the computer

Anytime Anywhere Access is intended to be used to perform small restores.  Restore all data by installing Carbonite on your computer through the Restore Manager.

carbonite-steps

Why Carbonite?

Computer files, invoices, records, and contacts are important to a business.  Loosing them could be detrimental to a businesses performance.

We often are mislead to believe that since your file is saved to your computer, it is safe.  Those files can still be lost or damaged at any time.

With Carbonite, you no longer have to worry about protecting your files, Carbonite does that for you.
You will get:  comprehensive suites, affordable services, and secure data protection, with recovery and anytime accessibility.

Carbonite’s support is at the top of list of competitors with database backup technology.  These Server Plans are sure to meet all your backup needs.

carbonite-features


For more information on Carbonite and how it can help your small business call 619-325-0990.  Hyphenet knows it is mandatory for our IT group to not only make sure you have the right technology to suit your computer needs, but possess the knowledge required to support it.

 Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

References:

CARBONITE 
http://www.carbonite.com/

Healthcare Organizations Turn to Carbonite’s Secure Cloud Backup Solutions for HIPAA Compliance
http://www.nasdaq.com/press-release/healthcare-organizations-turn-to-carbonites-secure-cloud-backup-solutions-for-hipaa…

Carbonite, Inc. to Report 2014 First Quarter Financial Results on April 29, 2014http://www.marketwatch.com/story/carbonite-inc-to-report-2014-first-quarter-financial-results-on…

Tuesday, April 15, 2014

IBM extends disaster recovery for SoftLayer users

IBM Corp. announced on Monday that SoftLayer clients will have a set of cloud-capabilities and services that would secure company assets and maintain continuous business operations.

IBM has helped more than 20,000 clients worldwide to transform their business.



ibm-softlayer


Now they are taking those skills and support to the fast growing SoftLayer customer-base, providing all services needed to ‘guarantee’ ongoing operations.

They will also prevent outages, offer quick recovery from disaster, and provide analytics and threat protection of IBM security services.

Market opportunity for business continuity/disaster recovery is anticipated to grow to $32 billion by 2015.  As a leader for more than 50 years, IBM has met their commitments to clients during hurricane disasters and other catastrophes.

SoftLayer customers will have access to IBM’s Cloud Virtualized Server Recovery (VSR) managed service.  This offers low-cost automation that helps enterprises recover critical applications, servers, and cloud-based data.

IBM’s Resiliency Consulting Services will be extended to their SoftLayer clients.  The services integrate IT environments with a private cloud-based data in the event of a disaster.  This helps with resiliency assessment, planning and design, and implementation and testing.

The VSR, SoftLayer business will be able to duplicate entire system files, databases and applications.


ibm_softlayer_diagram_rack


Included are; cloud managed backup, cloud data virtualization, cloud application resiliency and cloud virtualized server recovery.

According to IBM’s 2013 Chief Information Security Officer (CISO) study, 70 percent of CISOs are concerned with cloud and mobile security.

With refined targeted attacks on the rise, less than 2 percent of breaches are detected in the first 24 hours and less than 46 percent within 30 days.

These services offer threat management for firewall and intrusion detection, and also prevention management and monitoring services for SoftLayer customers.

Customers can benefit from IBM’s security operations and intelligence operations with intelligence analysts who help identify threats.

Tracking incidents and data collection pinpoint potential vulnerabilities that end safeguard business operations.

Cloud service capabilities that integrate with on premise security equipment, which in the end enable customers to quickly obtain an integrated view of their overall Enterprise IT security.

At the end of the year, IBM will offer increased security services for SoftLayer customers including heightened distributed denial of service (DDoS) protection, Web and email protection and managed endpoint protection.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

References:

IBM extends disaster recovery, security services to SoftLayer users – CTR Computer Technology Review
http://www.wwpi.com/

Friday, April 11, 2014

What is Heartbleed and what you can do about it.


mac-security-openssl-heartbleed

The Heartbleed Bug is a vulnerability in the OpenSSL cryptographic software library.

This allows stealing from protected information by the SSL/TLS encryption used to secure the Internet.
SSL/TLS provides communication security and privacy for email, instant messaging (IM), web, and virtual private networks (VPNs).

The Heartbleed bug gives access to anyone that intends to read the memory over the Internet of systems protected by the vulnerable versions of the OpenSSL software.

Secret keys are compromised that are used to verify encrypted traffic, including names, passwords, and private information of the users content.

 

What to do about the leak

Affected sites include: Google, Gmail, YouTube, Facebook, Tumblr, Yahoo and Dropbox.  If you use any of these sites, it if strongly recommended for you to change your passwords immediately.

If you are running a vulnerable version of OpenSSL, you are at risk.  Fixed OpenSSL has been released and is deploy-able.

If you use password protection sites that hold all your passwords in a single place like LastPass, please update your passwords there as well.

Attackers are able to eavesdrop on communications and easily steal data.  User-ids, passwords, credit-card numbers, and everything you place online is open for hackers to access.

Google told MailOnline: “The security of our users’ information is a top priority.  We fixed this bug early and Google users do not need to change their passwords.’

While some experts are advising users to change all their passwords across every site they have an account for.



heartbleed-checklist

CNet has an updated list, Heartbleed bug: Check which sites have been patched, for the 100 most popular Web sites.

When creating passwords, always use the two-factor authentication.  The extra step is tremendously safe and worth it.

You can also follow these steps to clear your browsers’ cache, cookies, and history:
Chrome:
  • In the browser bar, enter: chrome://settings/clearBrowserData
  • Select the items you want to clear. For example, Clear browsing history, Clear download history, Empty the cache, Delete cookies and other site and plug-in data.
Firefox:
  • From the Tools or History menu, select Clear Recent History.
  • From the Time range to clear: On the drop-down menu, select the desired range; to clear your entire cache, select Everything.
  • Click the down arrow next to “Details” to choose which elements of the history to clear. Click Clear Now.
Internet Explorer 9 and higher:
  • Go to Tools (via the Gear Icon) > Safety > Delete browsing history….
  • Once there, choose to delete Preserve Favorites website data, temporary Internet files, and cookies.
There is no quick fix for Heartbleed, take time and change your passwords.  That is the best preventative measure you can take.

You can check a website here to see if they’ve patched the hole.

If you are still unsure on what to do, give us a call today! Don’t go through the weekend not knowing if your are secure or not, call 619-325-0990.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

References:
How to protect yourself in Heartbleed’s aftershocks – ZDNet
http://www.zdnet.com/how-to-protect-yourself-in-heartbleeds-aftershocks…
How to recover from Heartbleed – ZDNet
http://www.zdnet.com/how-to-recover-from-heartbleed…
The Heartbleed Bug – Heartbleed
http://heartbleed.com/
Heartbleed was an accident: Developer confesses to causing coding error and admits its effect is ‘clearly severe’ – Mail Online
http://www.dailymail.co.uk/sciencetech/article-2602277/Heartbleed-accident-Developer-confesses-coding-error…

Thursday, April 10, 2014

Close the divide between your IT department and end user.


Technology is always changing, which leaves uncertainty in the workplace in the forever advancing industry.

It is important to keep the office as connected as possible.  Keep employees informed to whats going on with the business and they will see how they are the lifeline to the businesses success.

enduser-itdepartment 

End users and IT departments often see systems in different ways, which causes tension.  End users want a simple online app where users can chat or use voice-mail.

IT sees back-end integration work, backup, security, device compatibility, and many other “invisible” functions that must be thought of when building an app.

Timelines and expectations will differ, depending on who you are and which side on the end user/IT divide you sit on.

Here are a few steps to take to gap the bridge between end users and your IT department:bridge-employees-itdepartment

1. Know the business

If you understand the business from a business perspective, you will have first-hand knowledge of how the business works.  Departments tend to focus on their role and forget how they are really working as a whole.

2. Form alliances with key end users

By forming relationships, successful application development and deployment are nurtured.  With open communication, it is easier to ask questions and give honest feedback in development.

3. Talk less and listen more

Listen and be responsive, application developers aspire to be great, but often have tunnel vision when on to something good.  By listening to input from co-workers, they can get a better understanding of their progress.

4. Arrogance is ignorance

End users love technology but may not understand it very well.  IT professionals need to leave out jargon when in meetings, sticking to the business and purpose of the app.  When acronyms are used by IT that end users don’t understand, a barrier of communication takes over.  Less collaboration for the app are likely the result.

5. Understand the process

The IT department sometimes start building an app without understanding the business workflow.  Application developers should spend time with the end user, observing business operations and goals.

6. Understand the business

It may be surprising that IT developers have never taken a business course.  It is important for them to know how the business runs and how technology affects performance of the company.

7. Read the corporate financials

If employees at a business know how the business is doing, it will give employees appreciation for what the company is and how they are involved.  Employees that know the businesses financials and the status of the company, apply themselves with more dedication.

8. Be service oriented

Analysts and application developers who succeed are the ones who understand the value of the business and the people they work for.  When people know they are relied on, they feel more important and put more effort into their performance.

9. Check back

Check with end users to see if they are having issues or problems with application deployment.  Ensure that end-user training on the new app is part of your application deployment.

10. Look for ways to fix whats wrong

When finding out there is an issue, work immediately on fixing the problem.  Pilot testing and other test techniques are ways to eliminate end-user pain.

With a company working as a team instead of a single unit will ensure successful development.  Have company meetings and involve the staff with whats going on, on a regular basis.

Comradery within a company between departments is something businesses often fail to be mindful of.  Talk to your employees, make sure they understand the ins-and-outs of the business and how they can work together, as a team.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

10 things to help you bridge the IT/end user divide – Tech Republic
http://www.techrepublic.com/blog/10-things/10-things-to-help-you-bridge-the-it-end-user-divide/

Wednesday, April 9, 2014

Microsoft drops Windows XP, protect yourself now!

Microsoft has ended support for Windows XP, if you are still running XP on your system, know that you are exposed and outdated.
The 12 year old operating system will no longer provide security updates that patch holes in the software.
Hackers attempt to find the bugs in XP and exploit them freely.

You have been warned!

Running Windows XP isn’t solely dangerous to your own computer but it threatens all devices that still running and attached to it.

It’s estimated that 95% of bank ATM’s run on XP.  GE (GE,Fortune 500) Intelligent Platforms discovered 75% of its utility customers are still using it.

Cybersecurity provider Cylance said one of its major hospital clients run XP and has more than 100,000 devices.  This includes computers that hold patient records.

Upgrade Now

You always want to make sure the software running on your computer has support and is receiving updates.
Running Windows 7 and Windows 8 are six times safer for your computer than Windows XP.

windows-7

If you have Windows XP installed on your computer, it won’t stop working.  XP will potentially leave the door open to your computer being infected and your personal information stolen, but it will still work.

Don’t be naive and think it won’t happen to you.

If you have an issue with your computer and XP is running on it, best of luck finding someone to help fix your issue.  Companies will not touch your system until your software is upgraded.

By remotely accessing your computer that is running on XP, you are hazardous to anyone or anything that touches it.

The core OS will be vulnerable without Microsoft’s backing, hackers and malware writers are having a field day exploiting your compromised PC.

Look at the video below from C|Net and take action today!  Call us at 619-325-0990 or visit www.hyphenet.com.

Click here to view a video from C|Net about the ending of Windows XP.

Most large and midsized companies throughout the world are aware that Windows XP is ending support but still have not upgraded.

Hyphenet can help you upgrade your software, chances are if you are still running the old software, you may need to upgrade your PC as well.

Newer PC’s already come with Windows 7.  Knock out two birds with one stone and secure your personal accounts now!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

References:
Microsoft drops Windows XP support – CNN Money
http://money.cnn.com/2014/04/08/technology/security/windows-xp/
Microsoft to Windows XP users: The jig is up – C|Net
http://www.cnet.com/news/microsoft-to-windows-xp-users-the-jig-is-up/

Friday, April 4, 2014

What is Cloud Computing and why does your small business need it?



Cloud computing is a way to increase capabilities on the fly without investing in a new infrastructure, training new personnel, or licensing new software.

Small businesses benefit from Cloud computing by not having to deploy physical infrastructure like file and e-mail servers, storage systems or shrink-wrapped software.

Cloud computing is a broad umbrella that includes Software-as-a-Service where a specific application or service is offered to a customer as a subscription.  Dropbox, Salesforce.com, and QuickBooks are all examples of SaaS.

SaaS provides a way of delivering a host of software and technical services that would usually be cost-prohibitive and difficult to manage as on-premise, local solutions.

Cloud computing has come a long way and is now mainstream technology for businesses.

The cloud does for IT as UPS and Federal Express did for the shipping industry.

Cloud computing capabilities deliver a plethora of network technology.

Small businesses are most likely to not have an IT staff or technical in-house expert.  Some companies don’t even know how to ask about their company’s tech infrastructure.

Joining the cloud can help reduce these stress of all the IT stuff.

Cloud-Computing-company

 

In The Cloud

The different types of models of cloud are: Public, private, community and hybrid.
  • Public cloud is available to the general public over the Internet.  It’s a “game changer” for small businesses and gives them access to enterprise-level applications.
  • Private cloud is within a corporate firewall.  It is reserved for larger companies that have their own IT staff and data centers.
  • Community cloud is shared between different organizations.  It’s a multi-tenant infrastructure with a pay-as-you-go billing structure.
  • Hybrid cloud is a combination of the three.  This cloud addresses configuration management, change control, security and budgeting.
SaaS (Software as a Service) is predominantly used for office productivity like email, work processing, number crunching, and online file sharing.

IaaS (Infrastructure as a Service) functions like storage and computing.  It is used to store intellectual property like documents, drawings, applications and code proprietary to a business.

PaaS (Platform as a Service) is used to develop and run a website in the cloud or build applications.
There is a huge opportunity for growth of a small business when using cloud services.


layers-of-cloud-computing

Cloud computing encompasses subscription-based or pay-per-use service, that in real time or over the Internet, extends IT’s existing capabilities.

Cloud computing is still at an early stage, with a crew of providers large and small.  It delivers not only cloud-based services from storage to spam filtering but presents a utility-style infrastructure for your business.

Contact Hyphenet today to learn more about how to take your small business to the cloud.  619-325-0990

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.


References:
What Is The Cloud? (And Why Small Businesses Need To Care) – HuffingtonPost
http://www.huffingtonpost.com/2013/11/06/amex-what-is-the-cloud-and-why_n_3964066.html
What cloud computing really means – Infoworld
http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031?page=0,1
20 Top Cloud Services for Small Businesses – PC Magazine
http://www.pcmag.com/article2/0,2817,2361500,00.asp

Monday, March 31, 2014

The End of Windows XP is Near!

 
It's time to upgrade your system. Consider purchasing a new workstation today!
End of Windows XP - Hyphenet News Letter Header
End of Windows XP

Last day for support is April 8, 2014.

Windowsxp and Office 2003 support will no longer be available.

Start your migration or purchase a new workstation today!

It's time to move on from Windows XP. Technology has evolved and computers have changed, your platform is out-of-date. Unsupported and unpatched environments are vulnerable to security risks. Safeguard your system and boost productivity by update your system today.We will be happy to help you through the transformation process. Call 619-325-0990.
Windows 7 Software Box - End of Windows XP

Windows 7

Security • New Technology • Productivity

Is your business PC is still running Windows XP? Contact us today, its not too late to upgrade.
SHOP NOW
Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+