Pennyrile Technologies

Data Protection & Disaster Recovery From Bad Weather

Springtime Severe Weather is Just Around the Corner – Is Your Data Protected?

Kentucky and Tennessee are not technically in the swath of the nation dubbed “Tornado Alley,” but neither state is immune to springtime severe weather. Things like straight-line winds, devastating lightning strikes, and even flooding along the Ohio River can have a detrimental effect on your business’s network, including its server and the associated data. To ensure your company’s success, you should ensure you’re protected with a backup and disaster recovery solution.   What is a Backup and Why Do You Need One? A backup is simply a copy of your company’s data. It may include files, customer data, software, system states of servers and more. It’s highly recommended your backup is stored in another location which should always be separate from your main server. In the event severe weather affects your place of business and takes out your server, that backup ensures that your company’s data is not lost forever. Since 70% of companies that experience data loss, quickly go out of business afterward, backups are vitally important. They can make the difference between a failed business and one that succeeds, even in the face of a disaster.  How Does Disaster Recovery Work? Disaster recovery is the process by which information that was destroyed during severe weather, a fire, a flood, cyber-crime, user error, or even hardware failure is recovered. The entire goal of disaster recovery should include re-obtaining as much of the lost information as possible as quickly as possible. After all, the more quickly you can get your data back and get your site online, the lesser the impact of the event that caused the data loss, and the more likely your business will come through unscathed.  Disaster recovery works by restoring data from an off-site location not directly affected by the disaster. That’s why backups to a remote location are so important. If you backup data to the same location as your primary network and servers, then they could be damaged by the disaster as well rendering them useless. Tips for Successful Backup & Disaster Recovery Now that you understand the importance of backup and disaster recovery, here are a few tips to help you feel certain that you are protected before this year’s severe weather season:  Evaluate risks and vital systems – Evaluate potential risks and disasters that could affect your business. Make plans for how to deal with them. Also identify vital systems and data that need to be restored after a disaster. Create a new backup every 15 to 60 minutes – The more frequently you create backups of your company data, the more data you will be able to recover in the event of a disaster.  Test your backups – So your backing your data up and that’s great! Now be sure to actually test the backups on a regular basis. Make sure the data can be restored and in a time frame acceptable to your disaster recovery plan. Utilize the cloud – The cloud exists to protect your data by ensuring it is in more than one location. When you choose to upload your backups to the cloud, they will be stored at a server that is at a different location. If your location is impacted by severe weather and you lose your server, your data still exists, and all you have to do is download it.  Hire a professional – One of the best ways to be absolutely certain that your data is always 100% protected in the event of a disaster is to hire a professional team to help you automate your backups and uploads. Better still, in the event that you are impacted by a disaster, you will have a support team to help you get back on your feet.  As you can see, a backup and data recovery solution is critical to the overall success of your business. Without it, should disaster strike, you may lose your company’s data forever. For the best possible results, make sure you choose an expert company that can help your small or medium business weather the storm. Need assistance creating a disaster recovery plan and implementing it? Pennyrile Technologies can help and make sure you’re protected against all forms of disasters from mother nature, to cyber-criminals and malicious employees. Contact us today for a free consultation and see how we can help protect your business.

Springtime Severe Weather is Just Around the Corner – Is Your Data Protected? Read More »

VoIP Phone Service

5 Things VoIP Can Do that a Traditional Copper Telephone Line Can’t

If your small business still relies on a standard copper telephone line, you may be missing out on some very important benefits. In fact, VoIP is far superior to a traditional landline in several interesting ways. Below, you can learn about five of the most important things VoIP can do for you and your business that a traditional copper telephone line cannot.  #1 – Save You Money If there’s one thing that VoIP can do for your business that a standard telephone line just can’t, this is it. From setup to running cost, utilizing VoIP telephone service is far, far more affordable. Installing a single copper-line based telephone jack can cost you well over $100, but with VoIP, you can attach as many phones as you need as long as you have the right modem and router setup. What’s more, with standard phone service, you are charged a great deal for every single line you have. This simply isn’t the case with VoIP. You could save as much as 50% on your running costs by switching to VoIP.  #2 – Transmit Multimedia With VoIP, you can do a lot more than just make telephone calls. You can transfer video or any other type of multimedia just as you would over the internet. This simply is not the case with traditional telephone service. Though you can sign up for DSL internet service, or internet service delivered to you via a copper telephone line, it is a completely separate service – and it isn’t cheap, either.  #3 – Features are Free If you utilize things like call waiting, caller ID, call forwarding, call parking, and others with your traditional landline, then there’s a very good chance you’re paying a great deal extra for them. If you have more than one telephone line, you’re probably paying for these services for each line, too. With VoIP, these features are typically included in your package. Better still, because VoIP is delivered over the internet, you gain access to numerous other features that are incredibly easy to set up, which include automated answering and the ability to give your customers the option to press a button to connect to the right department – all without exorbitant fees.  #4 – Scalability If you work out of an office building with a single telephone line, expanding your operations to include three or four more telephone lines for separate departments as your business grows can be a complex, time-consuming, and expensive ordeal. A technician will need to come and install the jacks and wires, and you will need to pay separately for each individual line in your building. With VoIP, all you have to do is contact your service provider and tell them you need access to more phone numbers, then connect the phones. It really is that easy for your phone network to grow along with your company.  #5 – Improved Productivity Last, but most certainly not least, switching from a standard landline to VoIP can help your employees become more productive. A survey conducted by Cisco Unified Communications found that people who used VoIP at work spent an average of 32 fewer minutes on the phone each day. That’s two and a half hours per work week! What’s more, 74% of employees use a mobile app to take business calls with VoIP service, which not only improves productivity, but also improves customer service.  In today’s high-tech day and age, there is really no good reason to continue paying exorbitant fees for traditional telephone lines – especially if you plan to expand your operations in the future. Instead, switch to VoIP so you can enjoy a great deal of savings, improved productivity, free features only VoIP can provide, and so much more. 

5 Things VoIP Can Do that a Traditional Copper Telephone Line Can’t Read More »

malware

What is Malware and Why Should Your Company be Concerned?

Every single day, your business faces numerous threats that could have a serious negative impact on everything from your reputation to your revenue. Malware may seem like one of the least problematic from the outside, but companies who have been adversely affected by malware know that it’s a serious issue. Below, you can learn more about it and why it should concern you. Understanding Malware Malware is a word derived from the term “malicious software,” which also serves as a great definition. Simply put, malware involves numerous software types that have been specifically created to damage the recipient in one way or another. In some cases, the recipient business may be specifically targeted with the malware; in others, the recipient may simply be unlucky.  Malware can damage your network, hardware, software, and company in several ways. It might duplicate and steal sensitive data, leading to a breach; it might shut down your entire network or system; it might be used to render your server useless; and it might also be used to cause a variety of problems related to system use for you and your employees.  Where Does Malware Come From? The software is usually created by hackers who have extensive knowledge of internet protocols, firewalls, security limitations, and more. It can find its way into your network through various routes, as well. It comes in many different forms, including viruses, ransomware, adware, and botnets among others. Email is a very common point of entry, though it may also be possible for someone to hack into your network directly and “plant” the malware.  Common Types of Malware Rootkits – A set of software tools that enable an unauthorized user to gain control of a computer system without being detected. Scareware – Uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. Adware – Software that displays unwanted advertisements on your computer. Spyware – Software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive. Backdoors – Used to facilitate remote unauthorized access to a computer system or program. Virus – Replicates itself by modifying other computer programs and inserting its own code. Trojan – Invades your computer disguised as a real, operational programs before performing destructive actions. Ransomware – Prevents users from accessing their system or personal files and demands ransom payment in order to regain access. What You Need to Do Today The best way to avoid the problems malware can cause involves avoiding it in the first place. Numerous companies provide preventative solutions, ranging from email security options (since much of the malware introduced into business networks is introduced via email) to enhanced firewalls designed to stop breaches before they start. If you want to be certain that your network is up to date and protected against such intrusions, the best way to do this is with a network security assessment. This is designed to actively find holes in your network that malware and other bad actors  could potentially penetrate, then give you options for plugging those holes and keeping your company’s data safe.  To further improve your network, you should always make sure that you have a strong antivirus and anti-malware program running on every computer at all times. It is also important that you keep your systems and software updated. The best way to do this is to allow automatic updates and schedule them during non-working hours. Finally, train your employees to spot any potentially malicious activity and report it immediately.  Malware can have a horrible effect on your company. In fact, some malware can even completely erase your data or lock you out of your systems, rendering your entire business completely helpless. Schedule a network assessment today, and be sure that you have the best antivirus and firewall protection available installed. If you are the victim of an infection and need assistance with malware removal, contact us today.

What is Malware and Why Should Your Company be Concerned? Read More »

wifi access

The Benefits of Providing Guest Wi-Fi Access in the Workplace

If you manage a business that caters to its clients or customers onsite – including a hotel, a salon, or perhaps even a hardware store – there are numerous reasons to consider providing your guests with Wi-Fi access. Not only is it incredibly convenient, but it may even help you get ahead of your competitors. Here’s what you need to know.  People Always Love to Get Something for Nothing If you’ve ever given away a free gift with a purchase or provided a free continental breakfast with a stay, then you already understand the power of the word “free”. One of the best and simplest reasons to offer your customers or guests free onsite Wi-Fi access is because it’s free. In fact, your customers may choose to do business with you over your competitors if you are the only one offering free Wi-Fi.  It Reduces Congestion on Your Corporate Network Giving your customers access to your corporate network so they can do their work while they are onsite is generous, but it can present several problems for your company. For instance, having 15 people on your network reading their emails may barely be noticeable, but if there are 15 people streaming Netflix, then you may start to feel the effects of the limited bandwidth. Giving people access to free guest Wi-Fi can reduce this congestion and keep your network running far more smoothly.  It Reduces the Chances of Being Hacked Though allowing someone to access the internet via your corporate network may not seem like a big deal, it certainly can be if you give that access to the wrong person. There’s a reason why your network is password-protected; it’s to keep people with bad intentions out. In some cases, all a hacker needs is access to your network to shut down your entire operation, wipe out your company data, or plant a nasty virus that affects not only you, but also others in your network – vendors, customers, and more. Guest Wi-Fi access drastically reduces this risk and lets you breathe easier when you see people connected to the web.  It Builds Customer Relationships Finally, providing free guest Wi-Fi for customers and visitors is one of the best ways to show people that you truly care about them. Today’s world is fast-paced, and people always have something to do online, whether they’re catching up on their homework, writing a report for work, or even creating a speech for a major event. They need access to the internet to continue living their lives and doing the things they need to do, and when you can provide it to them free of charge, it shows that you are on their side – something they are sure to appreciate.  Guest Wi-Fi access is just one of many ways to help make your clients and customers happy, but it is also one of the most important. After all, in today’s day and age, we rely on the internet to live our lives. It’s where we shop. It’s where we work. It’s where we go to school. It’s even where we connect with our families. When you give this to people for free, they will be thankful.

The Benefits of Providing Guest Wi-Fi Access in the Workplace Read More »

Windows 7 End of Life

What Does the Windows 7 and Windows Server 2008 End-of-Life Mean for You?

Microsoft recently completely ended support for Windows 7 and Windows Server 2008, leaving many companies scrambling to find affordable alternatives. However, there are still some companies out there unsure of what end-of-life really means. After all, they are still utilizing Windows 7 or Windows Server 2008 and everything seems to be fine. Unfortunately, continuing to use either of these products puts businesses at risk. Here’s what everyone should know.  What Does it Mean to “End Support” for a Software Product? Many people believe that when a company ends support for one of its products, that product will essentially vanish into the ether, never to be seen again. That isn’t how end-of-life works, though, and it’s actually a little more complicated than that. When Microsoft ends support for software, a couple of things happen (or don’t happen): The product no longer receives updates. When a product reaches the end of its life, Microsoft stops working on it. That’s really all it means. The company will no longer update the product. You can still use it if you choose to, but doing so could be problematic in several ways. First, because the product is no longer being updated, it isn’t receiving any further security patches, which leaves you vulnerable to the latest threats. New products are no longer designed with the product in mind. Technologies improve every minute of every day, and some of the biggest software providers (things like CRM platforms, etc.) are constantly improving their services to work better with current technologies. When Microsoft stops supporting an operating system, the companies providing those platforms no longer work on updates specifically for those platforms. In other words, even though you may still have access to Windows Server 8, the various applications and platforms you use may simply cease to function.  What Can You Do? If your company relies on either Windows 7 or Windows Server 2008, the best possible course of action is to upgrade to the latest technologies. Windows 10 is in constant development and many people agree that it’s the best iteration of Windows yet – and it keeps getting better. Windows Server 2019 offers many benefits that Windows Server 2008 simply did not, including synchronization of files to Azure, access to System Insights, VM protection, and much, much more.  Windows 10 is superior to Windows 7 in many ways, too – it’s far better for multitasking with features like Aero Snap, driver installation, and it supports multiple desktops which makes it incredibly easy to utilize a variety of full-screen windows, even when you’re reduced to a single monitor. The best part is that you can’t forget to update Windows thanks to Windows 10, which automatically downloads and applies the latest updates in the background. It even analyzes your computer usage and chooses a time when your PC is typically asleep to restart.  If you are still running Windows 7 or Windows Server 2008, now is the time to make the switch to the latest versions of these technologies. They’re much improved over previous iterations, and they will allow you to continue reaping the benefits of today’s latest security enhancements along with so much more.  If you or your business need assistance upgrading from Windows 7 or upgrading to Server 2019, please contact us for a free quote!

What Does the Windows 7 and Windows Server 2008 End-of-Life Mean for You? Read More »

Protection From Cyber Threats

Are You Really Protected from Cyber Threats?

Cyber threats. Are you really protected? Numerous reports from companies like Verizon and even Symantec show that small businesses are the targets of nearly half of all cyber attacks, but at the same time, more than half of all small business owners believe that their companies are too small to be victims. With this information in mind, it’s crucial for businesses of all sizes to ensure they are safe, and there are several ways to determine whether your company might be at risk.  What is a Cyber Threat? A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service (DoS) attacks and other attack vectors. Cyber threats also refer to the possibility of a successful cyber attack that aims to gain unauthorized access, damage, disrupt, or steal an information technology asset, computer network, intellectual property or any other form of sensitive data. Cyber threats can come from within an organization by trusted users or from remote locations by unknown parties. What is Cybersecurity? Cybersecurity is the protection of computer networks from attack and damage. It’s basically keeping your data safe online. Hackers are always looking for ways into your network and if they find a way in, then they can steal your information and ruin your business. If you do not take cybersecurity seriously, it could cost you millions of dollars in lost revenue. And what’s worse is that hackers don’t care about your company. They just want to make a quick buck. Therefore, when choosing a cybersecurity solution, ensure you choose one with a proven track record and with excellent customer service. The last thing you need is to spend time troubleshooting an issue, only to find out the next day that someone hacked into your system again. What are the Most Significant Cyber Threats? One of the most important parts of protecting your business from cyber attacks involves understanding the most common kinds of threats and what they could mean for your business. The three most common are: Viruses: Viruses spread from one PC to another – or from one network to another – replicating itself and spreading just like the flu. They can have all kinds of detrimental effects, including stealing data, shutting down networks, or rendering every computer in your business completely unusable. Phishing: Phishing scams occur when cyber criminals send emails purporting to be from reputable companies to entice users to provide their personal (or in this case, confidential business) information, which may include passwords, credit card numbers, and more. Ransomware: Ransomware is exactly what its name implies – software that holds data on your network hostage until you pay a ransom. It is devastating for many businesses, and it has been responsible for the closure of thousands over the last two decades. How to Protect Against Cyber Threats Cybersecurity is a big issue today. Hackers have become more sophisticated with their attacks over the years, and now target businesses of all sizes. If you want to keep yourself safe from cyber threats, then you need to know how to prevent them. Cybersecurity is a multi-pronged strategy that involves layers of defense to help protect your business. Keep Your Employees Informed If you don’t regularly take the time to talk to your employees about network and email security, there’s a good chance your business is not as protected as it should be. Once a week during your employee meetings, make sure that you are reminding everyone with access to your network about the dangers of ransomware, phishing, viruses, malware, and more. In fact, you can even phish test your employees with fake phishing emails that will help you discover how diligent your employees really are.  Use Endpoint Detection and Response Tools Endpoint detection and response (EDR), also referred to as endpoint detection and threat response (EDTR), is an integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities. You can think of it as the next generation of antivirus. It continuously monitors network devices to detect and respond to cyber threats like ransomware and malware. Regularly Assess Your Network for Security Holes Finally, one of the absolute best things you can do to protect your data and network is to have regular security assessments conducted by professionals. These rigorous and in-depth assessments go through your entire network looking for potential issues. Things like your firewall, server, password vault, and more can all provide hackers and cyber criminals with the entry point they need to place viruses or ransomware in the system, and while the best way to prevent this is to reinforce the areas where criminals are most likely to enter, it’s impossible to do this if you don’t know which areas need reinforcement. That’s exactly what network assessments do.  Cyber threats can have a tremendous impact on your business. In fact, with roughly 83% of small businesses lacking the funds to deal with the repercussions of a cyber-attack – which has an average price tag of about $3 million – it becomes clear that the best course of action is prevention, and thanks to today’s advanced technologies, there are plenty of ways to secure your network – and keep it secure.  Cyber Threats Conclusion Cyber threats are not going away anytime soon. These are just a few ways to help secure your business against attacks. If your business needs help securing your network against cyber threats, then contact Pennyrile Technologies for a free cybersecurity consultation.

Are You Really Protected from Cyber Threats? Read More »

Preventing Network Breaches

5 Things Every Company Should Do to Prevent Network Breaches

Installing the right security software is important for keeping your business’s network secure, but even the most up-to-date software can only do so much. It’s up to you – and your employees, for that matter – to prevent many network breaches that could leave your business out of commission and losing money by the second. Here are five things you and your company and employees can do to prevent breaches.  Reduce the Volume of Data They Keep  The more information stored on the network, the more information that could possibly fall into the hands of a cyber criminal. One way to reduce this risk is to simply reduce the data volume as much as possible. Don’t retain any data that isn’t absolutely necessary and try to find ways to simplify the data that you do collect. Finally, along these same lines, try to store data in only two places, with at least one place being in the cloud for disaster recovery purposes.  Delete (and Report) Suspicious Emails Email is the number one point of entry for viruses and malware that devastate small businesses, and over half of all major attacks on small businesses were made possible by an employee opening a phishing email or facilitating ransomware through malware in an email. Train your employees on the dangers of these emails and teach them tips for spotting them. Then, make sure your employees not only delete these emails, but that they also report them to the appropriate company. Usually, the company being “spoofed” in a phishing email, for example, will have a specific email address set aside for reporting such things. Be sure to forward the email along to that particular address (if it exists), then delete it. Implementing phishing tests for employees can also help raise awareness and see where you have potential weaknesses. Use the Paper Shredder  If any of your business’s network information appears on physical sheets of paper, it is critical that these sheets be destroyed as quickly as possible. Don’t just throw them out; run them through a cross-cut shredder beforehand to discourage potential thieves from piecing together your critical information. You should also destroy and discard other types of physical media, including CDs or DVDs, that have important company data on them.  When disposing of hard drives, take special care to securely destroy the drive. Purely formatting a drive can leave most of the data recoverable by specialized software. While physically damaging a drive could theoretically work, it is not recommended or realistic in a corporate and professional environment. You should find a professional destruction company that issues an official certificate of media destruction for proper record-keeping. Restrict Computer Use As tempted as they might be, it is important that your employees do not access unnecessary websites, especially peer-to-peer file sharing websites, on your company network. These are the perfect entry points for cyber criminals. Better still, utilize software and firewalls to restrict access to any websites that are not directly required for your employees to do their jobs. Though it may seem too restrictive to you at first, it is the only real way to ensure that your sensitive information stays on your network.  Enforce Security Policies Finally, there are several other policies you should put into place and enforce to keep your data safe. Make sure your employees understand which data is confidential and that they are aware of the repercussions of sharing confidential information with others, intentionally or otherwise. Do not allow cameras at workstations with company computers (to prevent purposeful or unintentional photography of sensitive information), and require your employees to change their passwords frequently. Go over these policies during your weekly meetings to ensure your employees understand their importance, as well. 

5 Things Every Company Should Do to Prevent Network Breaches Read More »

QuickBooks-Hosting

QuickBooks Cloud Hosting Makes Managing Your Business Easier

If you’re a fan of QuickBooks, you are certainly not alone. It’s one of the best and most popular accounting platforms available today, and it is primarily geared toward small businesses. These days, QuickBooks is available in both on-premise and in-the-cloud formats that make it incredibly easy to manage your business from absolutely anywhere. Here are some of the ways in which QuickBooks Cloud Hosting can make things much simpler for your company, too. The Main Benefits of QuickBooks QuickBooks Cloud Hosting isn’t a favorite for no reason; in fact, small and medium businesses rely on it every single day because of a few very important benefits: On-the-Go Management – Because QuickBooks keeps your data in the cloud, you can access it from anywhere. That means if you’re commuting but you need to track your sales or send an invoice right away, all of this is possible with just a few taps or clicks. You can access it from your laptop, tablet, or even smartphone. The best part? You can know how your business is doing whenever you want as long as you have an active internet connection.  Instant Collaboration – One of the biggest benefits associated with cloud-based anything is the ability to collaborate with others in real time. For example, if you and your accountant log into the account, you can both work with the data simultaneously. This can help you better understand your finances, and it can also greatly improve workflow efficiency. Enhanced Security – Finally, QuickBooks is no stranger to security, and it uses industry-recognized security safeguards including 128-bit SSL encryption to make sure your data is always safe. In fact, the QuickBooks team backs up your data for you automatically, so there’s never any risk of data loss.  More Benefits to Consider Aside from the three main points listed above, QuickBooks offers much more. Business owners can create a hierarchy of access privileges that allow different levels of access for people across the company, which puts them in control of their data without sacrificing collaboration. You can create numerous business forms on the go – not just invoices – and you can choose from numerous plans designed in such a way that you will never find yourself paying for more service than you really need.  It’s also especially good for inventory management since you can view quantities on hand, get real time inventory valuations, and instantly access your own purchase orders from vendors no matter where you are. Finally, because the entire platform is cloud-based, you can rest assured in the knowledge that you will always be accessing the latest iteration of the platform without having to go through lengthy update processes on your various devices.  If you are looking for a software platform that is well-known, has a solid reputation for quality, and provides you with all the money and/or inventory management tools you need no matter where you are, QuickBooks Cloud Hosting can provide it, and it can make it incredibly simple at the same time.  Remote Access to QuickBooks Desktop Some businesses prefer QuickBooks Desktop vs QuickBooks Online. QuickBooks Desktop’s features are often more developed compared to the online version. Unlike the monthly fee you’d incur with QuickBooks Online, you only have to purchase the software for QuickBooks Desktop program once as well. If you need remote access to QuickBooks Desktop Pro or QuickBooks Enterprise, Pennyrile Technologies offers QuickBooks Desktop hosting and remote access solutions. If you have an existing QuickBooks server you need remote access to, we can can assist with installing remote access software guarded by two-factor authentication and logging. If you don’t have an existing QuickBooks server, we can assist with this as well with our QuickBooks Desktop hosting solution.

QuickBooks Cloud Hosting Makes Managing Your Business Easier Read More »

new business server

Does Your Business Really Need a New Server? Ask Yourself These Questions

If you think of your company’s IT infrastructure like you’d think of the human body, the server is the brain. It’s where all the data is stored, and it enables all the various processes and computers in your business to operate effectively. If your server is not working optimally, it can negatively affect your entire business. If you aren’t sure whether your server is still right for your company’s needs, or if you think it may be time to replace it, ask yourself the following questions to find out if you need a new server. Has My Server Gotten Louder Over Time? One of the biggest signs that your server is giving up the goat, so to speak, is the sound it makes when it is operating in the middle of the day. On any given workday, go into your server room and listen. If the fans are noticeably loud – much louder than they were when they were new – consider this a cry for help. As servers age, they become hotter far more easily, and this makes the fans run faster more frequently. Over time, the fans wear out, and noise indicates they are reaching the end of their lifespan. Is My Server Operating at Max Capacity? Ideally, a business server should always operate at less than 80% capacity. Though there may be times when your server surpasses this mark, for the most part it should operate at less than 80% even during the busiest parts of the day. If your server is regularly over that 80% mark, it’s time for an upgrade or replacement. In some cases, you may be able to reduce the strain with cloud computing, too. Is the Server Operating System Still Supported? Microsoft is slowly phasing out many of its older operating systems (OS), and when this happens, there will be no further support for them. For example, in January 2020, Windows Server 2008 and 2008 R2 will reach the end of their life cycles and support will end. This essentially means that Microsoft will stop working to create things like security patches that protect your system in the wake of the newest threats, and if you continue to use a server with an unsupported OS, you will be leaving your entire IT infrastructure – your hardware, applications, databases, and more at risk. If your server cannot support the latest OS and its current OS is nearing the end of its lifecycle, it is time to consider alternatives. Malware and viruses are often created to target operating systems that are no longer supported or not fully patched with the latest security updates. Is the Business Experiencing More IT-Related Issues Lately? Technical hiccups in the workplace happen from time to time despite your best efforts to prevent them. However, if you find yourself suddenly dealing with unexplained server crashes, or if your server starts to crash frequently, this is a sign that it’s time to change something.  A slow network, files taking a long time to copy or open, and slow login times can also be a sign it’s time for a new server. You might opt to buy a new server, which can resolve the issue for a while. You might also choose to move to the cloud or go for the hardware-as-a-service (HaaS) model to help save you some money. Is My Server Still Under Warranty? Server warranties are absolutely critical as they help to ensure that you can get your server replaced in the event of a complete failure. Servers are not inexpensive, and for small business owners, or any size business in the midst of a busy period, replacement can be difficult. Having to wait days for replacement parts to arrive causes downtime for your employees and business and would be costly in lost revenue and productivity. Rather than waiting for that failure to occur and then scrambling for a solution, consider a replacement right now if your server is no longer under warranty. Again, you have numerous options available to you, so choose the one that works best for you. Am I Spending too Much on Software Licenses? The business software you use is tied to a license, and that license is tied to each CPU for each server in your company. The CPU’s performance is dependent on things like memory and processing power, too. This means that if you choose to consolidate multiple older servers into fewer larger servers with better overall performance, you won’t have to pay for as many licenses. In fact, depending on the size of your company and its overall needs, sometimes downsizing your licenses is enough to pay for a new server. Bonus Question: Could You Save Money with Virtualization? If you do need to upgrade your company’s server (or servers), you may want to consider virtualization. Server virtualization is a process by which you can create partitions within a single server to create numerous instanced servers. Essentially, it turns a single server into numerous virtual environments that are capable of running independently of one another. Virtualizing your servers can save you a great deal of money in terms of hardware costs, and it can also significantly reduce your energy consumption, the cost of ongoing maintenance, and more. If you’ve been wondering whether it’s time to replace your company’s server or move your apps to the cloud, ask yourself the five questions above. Then, determine whether you want to purchase new onsite servers outright or contact a managed IT service provider who can help you with hardware as a service or cloud computing that can save you money. Need Assistance Replacing Your Server? If you need assistance replacing or upgrading your current server, contact Pennyrile Technologies for a free analysis and quote.

Does Your Business Really Need a New Server? Ask Yourself These Questions Read More »

firewall

Is Your Firewall Hurting Your Business? Here Are Some Ways to Tell

Many companies make the mistake of believing a firewall is a “set it and forget it” type of network security. In fact, a firewall requires constant maintenance and updating in order to protect your company from cyber threats and data breaches. Below are some signs that your firewall is not properly protecting your company’s best interests or your sensitive data.  You Don’t Have Any Traffic Visibility No matter the size of your company, whether you have only one computer connected to your network or you have dozens, it is critical that you have access to network traffic reports. You must be able to prioritize applications that are important to running your business while limiting those that might have a negative effect on productivity, but if you can’t see who is accessing what, this is impossible. What’s more, without this comprehensive visibility, there’s no way for you to know if you are complying with local and federal regulations.  You’re Spending Too Much Money on Infected Computers  In 2017, a study conducted in the UK pointed out that companies spent an average of seven full workdays each month on identifying and repairing computers that had been infected with some sort of malicious software or virus. The costs associated with paying someone to spend this much time repairing computers on your network can be astronomical, and over time, it can really tap into your bottom line. For this reason, businesses of all sizes should carefully consider the benefits of outsourcing their entire IT department to trusted professionals. It costs less and provides better peace of mind.  Performance and Productivity are Lacking Another good sign that your network firewall is causing more problems than it solves is a noticeable lack of performance from your network. If your network is slow despite a good internet connection, this typically indicates an overloaded firewall. In other words, there is too much traffic attempting to pass through the device or the firewall isn’t rated high enough for the traffic you have. If you have a lot of remote workers, your firewall may not be capcable of handling all of the VPN connections. At this point, you can either completely overhaul your IT infrastructure to allow for more traffic, or you can change the features of your firewall so that more traffic can come and go as needed at the expense of greater risk. Neither of these is a good option for many companies, but there is an alternative: outsourcing your IT department altogether.  The Firewall Isn’t as Effective as it Should Be  Finally, perhaps the most common sign that your firewall is hurting your business is a lack of effectiveness. Simply put, if computers continue to become infected or if employees continue to access websites that you thought you blocked, this is indicative of a serious issue – and one that can frustrate business owners who are not as familiar with network security as they should be. The best way to resolve this issue is to hire IT professionals to configure your firewall properly, but it can be expensive to add another person to the payroll. Outsourcing these tasks is far more cost-effective, and when you choose the right managed IT provider, you can feel confident that your configuration will always be correct.  Most companies don’t spend much time thinking about their firewalls until a serious problem arises. If you have noticed things like repeated malware or virus infections, a lack of network performance and employee productivity, or even problems with the configuration of your firewall, it is important to address them right away to protect the integrity of your company’s network. 

Is Your Firewall Hurting Your Business? Here Are Some Ways to Tell Read More »