A little trust can go a long way

Countless employers still don’t trust their people to do their best work unless they’re physically in the office. But while managers may be struggling to adjust to our new hybrid world, this perception is a long way from the truth.

Research from around the world reveals that greater flexibility from remote and hybrid working often results in a major boost to productivity. Yet still some firms are bringing back an office-only policy.

Employers may be grappling with the fallout of the last few years and hoping that a return to the office will result in a post-pandemic productivity boost.

But seeing as hybrid workers show improved morale, greater creativity and better collaboration (compared with pre-pandemic levels), this could be a big step in the wrong direction.

Big Brother will never be popular

Some businesses have increased their employee monitoring to try and track performance. But this is often perceived as a Big Brother tactic that ends up having the opposite effect – a drop in productivity, a lack of trust, demoralized teams, and a greater feeling of ‘us and them’.

All businesses need to understand how they are performing and decide which metrics give the best insight into productivity. But this has to be done in a way that doesn’t leave employees feeling like cogs in a machine.

So what’s the answer?

There is some clear advice for building a productive and successful hybrid environment:

  • Encourage people to work in the way that’s best for them
  • Find the right ways to measure performance – without people feeling like they’re constantly being watched
  • Automate repetitive tasks to free up your team’s creativity
  • And provide everyone with the tools and tech they need to do their job properly. That could include choosing the right devices, using communication tools that aid collaboration, and making the right connectivity choices.

We can help with all of this.

So if you’re having trouble adjusting to a hybrid world, get in touch – we’re here to help.


Windows is the prime target for cyber criminals

With its huge dominance in the workplace, Microsoft’s Windows has become the prime target for cyber criminals. They’re looking to access your information, disrupt your business, or hold your data to ransom.

Tens of millions of attempted malware attacks were discovered throughout this year, and a massive 95% of those threats were targeted at Windows.

The vast majority of attacks are unsuccessful, but those that do succeed can create havoc for the affected businesses. So you need to be sure that you’re taking all possible precautions to protect your business and your data.

  • Hardware and software companies release regular updates to address threats to Windows users, as well as security patches designed specifically to deal with new risks. These should all be installed as soon as they become available.
  • Your people should be regularly trained in how to spot cyber security threats and what to do if they suspect one.
  • And because it’s not possible to protect every business from 100% of all threats, it’s also important that you have a strong resilience plan in place.

This should detail exactly how your business should react if it falls victim to a cyber attack and who should be notified to take action. Everyone in the company should have access to this document and know to report any potential attack as quickly as possible – that’s the best way to lessen its impact.

If you have an IT service provider, they’ll be able to make the best recommendations to keep your business safe and secure, train your people, and even provide monitoring to spot any potential danger before it becomes a problem.

This is something we do every day. So if we can help your business become more resilient, just get in touch.

Published with permission from Your Tech Updates.


When can you finally forget your password?

Passkeys are set to take over from traditional passwords to give us a safer, more secure way of logging into our online accounts.

That will be a major step forward for online security, and it’s gathering pace quickly with more and more big names adopting the technology. So how long will it be before we finally wave goodbye to the password?

This new tech has long been supported by the FIDO alliance – an organization of big tech companies including Apple, Google, and Microsoft – in the hope that it could eventually kill off passwords completely.

These megabrands are already rolling out passkeys on some of their applications. But now some of the big names in password management software are getting in on the act, too, which is likely to speed things up even further.

Passkeys work by creating and storing credentials on your phone, which only you can access. These are called private keys and they’re authenticated by the biometrics you use to log in to that device – your fingerprint, or your phone’s facial recognition system.

When you log into an account, the site will create a public key which then requests your private key. Your matching passkey gives you access to your account, just like a password.

Password managers let you create and store complex passwords, meaning you always have a strong, unique and unguessable password for every site.

But the adoption of passkeys by a growing number of traditional password managers is likely to accelerate the move.

We’ve spent years implementing strong passwords. Will we miss them when they’re gone? Probably not…

Any move towards stronger security is always welcome and we don’t think it will be too long before most online accounts are using passkeys.

If you’d like any help to keep your business secure in 2023, get in touch.

Published with permission from Your Tech Updates.


Are your people Christmas shopping from work?

Almost half of people with social media accounts have admitted to falling for shopping scams. So if members of your team are doing a little last minute Christmas shopping from work, how can you be sure your business is protected?

New research shows that a massive 47% of people have clicked on links hoping to get a great deal, and instead ended up giving financial and personal details to cyber criminals.

That could mean they’re not only putting their own data and money at risk, but your device – and even your network – could be exposed, too.

It’s not just shopping scams that are fooling people online. Phishing links have tricked 36% of people into revealing personal data. Phishing is where you get an email that seems to be from a person or brand you trust, but it’s not.

The same number have fallen for gift card scams – that’s where criminals gain victims’ trust and persuade them to buy gift cards or online vouchers.

If an employee clicks a malicious link or downloads an infected file using their work device, the results for a business can be devastating. The risks go beyond the loss of data and reputation. The cost of downtime while you get going again is enough to put many people out of business for good.

So how can you protect your business against this kind of scam – right now, and throughout the year?

As well as having the right cyber security tools in place – such as firewalls, antivirus software, and strong password management – you should stay focused on training your people. Because your best line of defense is a team that recognizes a threat when they see one.

Make sure they’re aware of the latest scams, and that they know the warning signs to look out for. Advise everyone to check that links are genuine, websites are the real deal, and be suspicious of offers that look too good to be true.

And have a strong plan in place that kicks in the moment a security breach is spotted. Employees should all know to report any incidents immediately, and who they should inform. Acting quickly often lessens the impact of a data breach and makes it faster and less expensive to fix.

As always, if you’d like further help or advice, get in touch. Published with permission from Your Tech Updates.


Zoom wants to be the new Teams

In an increasingly competitive field, Zoom is looking to take on Teams and Slack with their recent launch of enterprise-wide features and services. With email, calendar apps, and a virtual co-working space
called "Zoom Spots" as well as upgrades for collaboration and project management it's clear that they're aiming directly at Microsoft Teams, who recently integrated seamlessly into Office 365 suite.

While it feels like a logical step in the right direction for Zoom many businesses are already committed to Microsoft Teams which releases its own improvements almost every week. This is still very much
worth watching as we’ll want our clients' needs met too - especially when there's no telling how widely adopted these offerings might be or if they'll offer enough flexibility without sacrificing any features that
currently come standard with other platforms.

If you want to know more about the best tools to keep your team working smoothly together, just get in touch – info@trutechnical.com


Why you will not be fine on this Cloud9

Security threats come in all shapes and sizes, and it can be difficult to stay ahead of the curve. That's why we go to great lengths to protect our clients from online security threats.

Whether it's key loggers that record your login information or DDoS (Distributed Denial of Service) attacks that overwhelm a service with fake traffic, we're always on the lookout for new ways to keep our clients safe. And as part of our service, we always advise our clients to install software updates as soon as they become available.

But there's one type of update you should never install: Adobe Flash updates. Flash itself was discontinued in 2020 and is no longer supported, so you should assume that any Flash update messages will be a security threat. Keep yourself safe online by following our simple advice: when in doubt, don't install it.

Currently, there is a new botnet campaign circulating that uses fake Flash messages as a cover. This campaign is called Cloud9, and if you use Google Chrome or Microsoft Edge, you could be a target.

A botnet is a group of infected devices that are controlled as one, without the owners’ knowledge. They are often used to steal sensitive data, send spam, or perform DDoS attacks. Cloud9 is particularly dangerous because it will attempt to install additional malware to your device or network if it’s not stopped in time. This type of attack is hard to spot because it looks like a genuine request. Just about anyone can become a target, which is why it’s important to be aware of the risks. Taking steps to protect your devices and networks from these kinds of security threats is essential for keeping your data safe.

While no system is ever 100% secure, there are things you can do to protect your business from cybercrime. Making sure everyone in your company is aware of the threat and knows what to look out for is a good first step. You should also ensure that everyone is running the latest version of their browser and has up-to-date security software. Finally, enabling Enhanced Protection in your browser’s Privacy and Security settings will give you a warning if you come across a risky website or download. At Tru Technical Partners, we can help you keep your business protected from cyber criminals. Just get in touch to learn more about how we can help you.


If you’re under pressure to take urgent action – stop and think


 
Phishing scams are one of the biggest security threats to your business right now.

A massive 83% of organizations said they suffered successful attacks last year. And with just under a third of phishing emails being opened, the chances that someone in your business will be fooled are high.

But to make matters more difficult, cyber criminals have borrowed a technique from ransomware groups that is designed to panic people into acting and giving away their login details.

This new kind of phishing attack begins like most others.

You get an email alerting you to potentially suspicious activity on your account. It might say someone is trying to login from a different location or device and the attempt has been blocked.

You’re then asked to click a link to verify your email address and password. The email looks genuine, and the sense of urgency is high. If you don’t act now, your account could be compromised.

So, what can you do to protect yourself?

  • The first thing to do is slow down and take a breath. This isn’t an emergency, and you don’t need to act immediately. If you hover over the link in the email, you should see where it’s really taking you. In this case, it’s not to Microsoft’s login page but to a fake site designed to steal your credentials.
  • If you’re suspicious about an email, don’t click any links or open any attachments – go directly to the website in question and log in as normal. You can also forward suspicious emails to your IT team so they can investigate further.

At Tru Technical Partners, we understand that not all businesses don’t have the same resources as larger enterprises when it comes to cybersecurity. That’s why we offer tailored solutions that give you the protection you need at a price that won’t break the bank. Contact us today to find out more about how we can help you.


Losing hours through Video Conferencing


Are you losing hours each week setting up video calls?

Are you considering using video conferencing for your small or medium business? If so, it's important to be aware of the time commitment required from team members. In a recent study, we found that on average, employees could lose a full-time working week setting up and using video conferencing tools. That's why it's crucial to have a plan in place before rolling out video conferencing in your business.

Almost a third of people said they didn’t have the right tools for the job, and 23% even said they felt excluded from remote meetings thanks to inadequate tech. That means poor microphones that don’t play ball, jittery webcams that interfere with communication, or the wrong choice of video calling software. All that makes meetings harder to set up and causes them to take longer than they should.

Despite this, businesses that offer remote and hybrid working are reaping the rewards in many other areas, including staff engagement and performance. The key is to provide employees with the right video software and equipment so they can participate fully in remote meetings. With the right tools, employees can feel included and engaged, leading to better performance overall.

To help you get started, we've put together some tips on how to make the most of this communication tool.

Use a High-Quality Webcam - If you want to ensure that you look your best on a video call, it's important to use a high-quality webcam. There are a number of webcams on the market that can provide you with clear, HD video, so do some research to find one that will work well for you. Additionally, make sure that your webcam is positioned correctly so that your face is well-lit and in focus.

Invest in Good Headphones - Another way to improve your video call experience is to invest in a good pair of headphones. Headphones with a built-in microphone can help to reduce background noise and ensure that your voice is clear on the call. Additionally, using headphones can help to minimize distractions from your surroundings.

Choose the Right Video Calling Platform - There are a number of different video calling platforms available, so it's important to choose one that will meet your needs. If you're looking for a simple platform that just allows for basic video and audio calls, Skype or FaceTime might be a good option. However, if you need more features, such as screen sharing or group chat, you might want to consider something like Microsoft Teams or Zoom.

Test Your Equipment Before the Call - Before you jump on a video call, it's important to test your equipment to make sure everything is working properly. This includes testing your webcam, microphone, and speakers. You should also make sure that your internet connection is strong enough to support a video call. Doing a test run before the actual call will help to ensure that there are no technical issues when you're trying to connect with others.

Video calls can save you time and improve communication, but only if they're set up correctly. Our team of experts can help you get the most out of your video calls, so you can focus on what's important - running your business. Get in touch to see how we can help you.


Don’t Walk the Plank with Pirated Software

 

Although it may seem like a cost-effective solution, using pirated software can actually be more expensive in the long run. Not only could you face legal penalties if you’re caught, but using unlicensed software also puts your business at risk for data breaches and other security vulnerabilities. So before you take the plunge and break the law to save some money, here are four reasons why using pirated software is not worth the risk.

Pirated or Unsupported Software - One of the biggest cybersecurity risks is using pirated or unsupported software. When software is pirated, it means that it has been illegally copied and distributed. Unsupported software is software that is no longer being updated or supported by the manufacturer. Both pirated and unsupported software can be full of security vulnerabilities that can be exploited by cybercriminals.

Employee Downloads - Another big risk is employees downloading unauthorized software or files from the internet. While many of these downloads may be harmless, some can contain malware that can infect your system. Additionally, employees may inadvertently download files that contain sensitive company information, which can put your business at risk of a data breach.

Cybercrime - Of course, one of the biggest risks to any business is cybercrime. Cybercriminals are constantly coming up with new ways to exploit vulnerabilities in systems in order to steal data or money. Businesses of all sizes are at risk of being targeted by cybercriminals, and the damages caused by a successful attack can be significant.

Poor Cybersecurity Practices - Finally, another big risk to businesses is poor cybersecurity practices. This includes things like not patching systems regularly, not using strong passwords, and not backing up data properly. Poor cybersecurity practices can make it easy for cybercriminals to gain access to your system and cause serious damage.

Unauthorized software downloads are just one of the many dangers facing your business data today. By managing admin rights and providing regular cyber security awareness training, you can help protect your business from these risks. If you need help finding genuine software for your business or creating a cyber security plan, our team of experts is here to help. Contact us today to get started.


Backup Strategies to Prevent Data Loss

We live in a digital age where data has become one of the most valuable commodities in the world. Businesses collect huge volumes of data every day from their customers, and this data plays a critical role in their day-to-day operations. If business organizations happen to lose their data under any circumstance, the consequences can be quite catastrophic.

This is the harsh reality of today’s digital business landscape. Businesses can experience data loss in many ways, ranging from natural disasters to cyberattacks. Should you suffer an unexpected data loss, your competitive advantage lies in how quickly you can get your operations up and running without experiencing major downtime.

In this blog, we’ll take a brief look at the various dangers to business data and how you can prevent them with the right backup. We’ll also look at the different ways of backing up data and the advantages of using a robust business continuity and disaster recovery (BCDR) solution. 

Why Do You Need Data Backup?

Before we look at the different ways of backing up data, you need to know why your business requires data backup. Businesses commonly encounter the following data security threats to data in their everyday operations.

  • Cyberattacks: As technology evolves, cyberattacks continue to evolve as well. The growing threat of ransomware is a testament to that. According to the latest Verizon report, 27 percent of malware incidents can be attributed to ransomware attacks. While antimalware and antivirus programs can certainly offer protection, businesses need to think about what might happen in case of an unavoidable security breach and eventual data loss when formulating a data security strategy.
  • Natural disasters: Natural disasters such as floods, fire, earthquakes and the like pose a big threat to the traditional form of data storage and security. Do you have what it takes to bounce back if these disasters catch you off guard and wipe out your company’s data?
  • Hardware issues: Mishaps originating from hardware issues play a major role in business data loss. With traditional data storage methods, data is stored in a physical location on hard drives and backup appliances. Any hardware issues arising in these devices can pose a serious threat to your valuable data.
  • Human errors: Human errors still play a major role in data loss. According to Verizon, as much as 30 percent of data loss incidents are caused by internal actors. This could be attributed to anything from poor password practices to falling for phishing scams.

All these factors indicate that data loss can happen to any organization irrespective of their size or the security precautions they take. What you need is a solid data backup solution to make sure that your lost data is not completely unrecoverable.

How to Back Up Your data

As you understand the importance of data backup, it’s inevitable that certain questions may spring to mind – What is the best way to store data? How many copies should you take?

With regards to the best way of storing data, both cloud backup and on-site backup appliances need to be considered. This is because both have their own advantages and limitations. On-storage devices are faster, giving organizations full control over their data. However, they are prone to physical mishaps and hardware issues. Cloud-based backup, on the other hand, is not vulnerable to natural disasters but requires a lot of bandwidth to backup large files.

The ideal backup strategy is one that combines both these approaches, with multiple copies stored in different locations. When it comes to backing up your data, you need to consider the 3-2-1 rule, which simultaneously answers your questions on what the right approach to data backup is and the number of copies that need to be made.

As per this rule, it is prudent to have at least three copies of data – one production copy and two backup copies on two different media (internal hard drive and removable storage media) along with one off-site copy (cloud) for disaster recovery. Newer variations of this rule suggest having at least two copies (3-2-2 rule) on the cloud depending on the importance of your data. Ultimately, the more copies you make, the higher your chances of recovery after a loss.

Advantages of BCDR Over File-Only Backups

In crude terms, data backup is simply the process of making copies of your files and storing them. However, the main purpose of a backup is to get your business up and running in no time following an unexpected disaster. Hence, an effective backup strategy is symbiotic with business continuity as well. Business continuity refers to the ability of your organization to get back in working order as quickly as possible following an unexpected data loss.

When you think about business continuity, you must think in terms of Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO refers to the maximum time an application can be down without affecting the business. RPO refers to the maximum amount of data that can be lost without harming the business.

A good BCDR solution will provide you with the following benefits:

  • Significant reduction in RTO and RPO
  • Ability to predict business restoration following an unexpected disaster
  • Reduction in downtime and associated revenue losses
  • Lower interruption to critical business processes
  • Avoid compromise to business reputation
  • Ability to customize disaster recovery as per your needs

Best Practices for Data Backup

While incorporating an effective backup strategy, you need to implement the following best practices to limit data loss:

  • Increase frequency: Digitally-run businesses are required to back up their data multiple times a day. Doing it once a day, at the end of business hours, is no longer sufficient, especially with the number of threats gunning for your data.
  • Use cloud backup: The Cloud has become an indispensable component of data backup in this digital age. Cloud backup comes with a multitude of benefits such as easy recovery, easy scalability, better cost efficiency and more.
  • Use the power of automation: Automation has become a game changer with regards to various IT tasks and backup is no exception. When you automate your disaster recovery process, you can bounce back from serious disasters and continue business operations without suffering too much downtime.
  • Determine your retention span: Retaining all data backup versions forever is not a feasible solution for most small businesses. Due to this, you need to determine the duration for which you will retain your data. This requirement will vary based on your industry, needs and compliance regulations. You need to come up with a solution that ticks all parameters.

To Sum Up…

Backup should be a part of every organization’s business strategy, irrespective of its size, location or industry. Threats to business data are very real and are happening at an alarming rate. In this scenario, a solid data backup plan could be the preventative measure that saves your business when disaster strikes.

Talk to us today so we can help you zero in on an effective backup strategy that’s tailor-made for you.

 


Ensuring Proper and Secure Backups While Working With Remote Workforces

Ever since the COVID-19 pandemic plunged the world into disarray, remote working has become a major tool for businesses to keep their operations up and running. While some organizations already had the technical infrastructure to accommodate remote work, most were forced to adapt to this sudden change within a matter of weeks. This also marks the first time in history that organizations lacked control over their IT and data security best practices.

The State of the Phish report revealed that 90 percent of employees use their office devices for personal work and about 50 percent of working adults do not password-protect their home networks. Since this makes data security complicated in remote working environments, it is vital for organizations to have a solid data backup policy in place.

Cloud Backup Solutions Available for Remote Work

Most organizations across the world use at least one form of local backup wherein critical data gets stored in on-premise drives. However, this may not always come in handy as far as remote work is concerned. You need a cloud-based backup solution that allows you to store and restore your data from anywhere.
When it comes to backup solutions for remote work, there are a few options available to organizations. Let’s check them out one by one:

  • Managed Cloud: Managed cloud services are both cost-effective and agile. By choosing a dedicated private cloud, organizations can exhibit a great level of control and privacy over their data and IT infrastructure.
  • Most importantly, the expenses here are predictable and the solution is scalable.
  • Hybrid Cloud: Hybrid cloud services offer a combination of both public and private cloud services in a single plane of management. Unlike multi-cloud environments, organizations don’t have to manage the public and private cloud environments separately. Organizations can use the private cloud to store sensitive and critical data while the managed public cloud can be used for other data that needs to be accessed regularly.
  • SaaS Applications: There are different types of SaaS applications, such as G Suite or Microsoft 365, that employees can use to keep their business data in the cloud. Although these SaaS providers back up their servers regularly, the recovery points for data restoration are limited and they do not take complete responsibility when it comes to the full restoration of an organization’s data after a major breach or disaster.
  • Recovery as a Service (DRaaS): This is the best choice out there for organizations right now when it comes to protecting their valuable data. While file backups are available with many other services, the disaster recovery offered by DRaaS solutions makes them a dependable option for organizations. Since DRaaS service providers specialize in helping businesses recover from major disasters, they can help IT Teams take the right approach when recovering from data loss.

Developing a Backup Strategy

When developing a backup strategy, organizations should focus primarily on business continuity rather than just file-only backups. By integrating a backup strategy with a disaster recovery solution, you can get a complete blueprint of how to bounce back when disaster strikes.

The following factors must be addressed when developing a backup strategy for remote work:

  1. What data should be backed up
    While all data is important for organizations, not everything is pertinent to the survival of a business. Data should be categorized based on its level of importance and the backup policy should be formulated accordingly. Critical data that is essential for the survival of the business must be given top priority and should be protected in the most effective manner.
  2. Frequency of backup
    This depends on the importance of the data you gather and the compliance regulations guiding your industry. While most organizations back up their data at least once a day, there are companies that back up their data more often than that. You need to consider your Recovery Point Objective (RPO), which is the acceptable level of IT downtime following a disaster, before determining the frequency of your backup.
  3. Type of backup
    This is the stage where you figure out the type of backup solution you are likely to need. Based on your business requirements, you can choose to have full, differential or incremental backups of your data. Most companies now follow the 3-2-1 or 3-2-2 rule when it comes to backup. This involves saving two extra copies of data on the local drive (including the original makes it three), two copies on other media and two (or one) copies at different off-site locations.
  4. Restoration and access to data
    In case of an unexpected disaster, you need to access certain critical data immediately. Also, if you lose internet connectivity, you need to have an alternate method to regain your critical data. Your backup strategy should also focus on the proper ways to restore data from different sources.
  5. Testing your backup
    Once you have put everything together, you need to test it to make sure it all runs smoothly. In addition to testing your backup, try recovering a few backed up files as well before you take everything live.

Futuristic Approach

The sudden transition to remote work comes with plenty of challenges, especially with regards to security, efficiency and productivity. However, it has also presented an opportunity to incorporate a futuristic approach to securing data. To ensure the successful implementation of a backup strategy, you need access to the right solutions that automate the backup process and take care of your business continuity.

Reach out to us today so we can help you find an effective backup strategy customized for your needs.


Is working from home really good for your business?

Truman Roe

Working from home. Or remote working, as it’s now called. It’s the big thing in business, isn’t it? And some people love it. But have you stopped to consider the downside to remote working? The negative elements for your business and your people?

If you’re thinking of making the switch to remote working, or if you already have remote workers, here are some things to consider:

  • How will you manage employee productivity?
  • How will you ensure cyber security protection while employees are away from the office?
  • What impact will this have on company culture?