Blog

April 11th, 2014

Security_Apr11_AThe security of systems like servers and computers that connect to the Internet should be one of utmost importance for business owners and managers. However, there are always security flaws being exposed which could expose your systems and data to malicious hackers, who could really endanger your business. Over the past few weeks a massive massive security flaw with cryptographic software has come to light. Codenamed Heartbleed, this bug makes stealing data almost ridiculously easy.

Background info about secure transmission of information on the Web

Most sites on the Internet rely on Secure Sockets Layer (SSL) technology to ensure that information is transmitted securely from a computer to server. SSL and the slightly older Transport Layer Security (TLS) are the main technology used to essentially verify that the site you are trying to access is indeed that site, and not a fake one which could contain malware or any other form of security threat. They essentially ensure that the keys needed to confirm that a site is legitimate and communication can be securely exchanged.

You can tell sites are using SSL/TLS by looking at the URL bar of your browser. If there is a padlock or HTTPS:// before the Web address, the site is likely using SSL or TLS verifications to help ensure that the site is legitimate and communication will be secure. These technologies work well and are an essential part of the modern Internet. The problem is not actually with this technology but with a software library called OpenSSL. This breach is called Heartbleed, and has apparently been open for a number of years now.

About Heartbleed

OpenSSL is an open-source version of SSL and TSL. This means that anyone can use it to gain SSL/TSL encryption for their site, and indeed a rather large percentage of sites on the Internet use this software library. The problem is, there was a small software glitch that can be exploited. This glitch is heartbleed.

Heartbleed is a bug/glitch that allows anyone on the Internet to access and read the memory of systems that are using certain versions of OpenSSL software. People who choose to exploit the bugs in the specific versions of OpenSSL can actually access or 'grab' bits of data that should be secured. This data is often related to the 'handshake' or key that is used to encrypt data which can then be observed and copied, allowing others to see what should be secure information.

The problem with Heartbleed

There are two major problems with this bug. The first being that if an attacker can uncover the SSL handshake used by your computer and the server that hosts the site when you login or transmit data they will be able to see this information. This information usually is made up of your login name, password, text messages, content and even your credit card numbers. In other words, anything that gets transmitted to the site using that version of SSL can be viewed.

Scary right? Well, the second problem is much, much bigger. The hacker won't only be able to see the data you transmit, but how the site receiving it employs the SSL code. If a hacker sees this, they can copy it and use it to create spoof sites that use the same handshake code, tricking your browser into thinking the site is legitimate. These sites could be made to look exactly same as the legitimate site, but may contain malware or even data capture software. It's kind of like a criminal getting the key to your house instead of breaking the window.

But wait, it gets worse. This bug has been present in certain versions of OpenSSL for almost two years which means the sites that have been using the version of OpenSSL may have led to exposure of your data and communication. And any attacks that were carried out can't usually be traced.

Am I affected by this?

What makes this so different from other security glitches is that OpenSSL is used by a large percentage of websites. What this means is that you are likely affected. In fact, a report published by Netcraft cited that 66% of active sites on the Internet used OpenSSL. This software is also used to secure chat systems, Virtual Private Networks, and even some email servers.

We have to make it clear here however: Just because OpenSSL is used by a vast percentage of the Internet, it doesn't mean every site is affected by the glitch.

The latest versions of OpenSSL have already patched this issue and any website using these versions will still be secure. The version with Heartbleed came out in 2011. The issue is while sites may not be using the 2011 version now, they likely did in the past meaning your data could have been at risk. On the other hand, there are still a wide number of sites using this version of OpenSSL.

What should I do?

This is a big issue, regardless of whether a website uses this version of OpenSSL or not. The absolute first thing you should do is go and change your passwords for everything. When we say everything, we mean everything. Make the passwords as different as possible from the old ones and ensure that they are strong.

It can be hard to tell whether your data or communications were or are actually exposed or not, but it is safe to assume that at some time or another it was. Changing your passwords should be the first step to ensuring that you are secure and that the SSL/TSL transmissions are secure. Another thing you should be aware of is what sites are actually using this version of OpenSSL. According to articles on the Web some of the most popular sites have used the version with the bug, or are as of the writing of this article, using it. Here are some of the most popular:

  • Facebook
  • Google
  • Gmail
  • Yahoo
  • Yahoo Mail
  • Instagram
  • Pinterest
  • Amazon Web Services
  • GoDaddy
  • Intuit
It would be a good idea to visit the blogs of each service to see whether they have updated to a new version of OpenSSL. As of the writing of this article, most had actually done so but some were still looking into upgrading. For a full list of sites, check out this Mashable article.

If you have a website that uses SSL/TSL and OpenSSL you should update it to the latest version ASAP. This isn't a large update but it needs to be done properly, so it is best to contact an IT partner like us who can help ensure the upgrade goes smoothly and that all communication is infact secure.

Contact us today to see how we can help ensure that your company is secure.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 9th, 2014

SocialMedia_April07_ASocial media is an important tool for any business, and those that want to really engage with customers and valuable connections really need to have visual forward content. The problem many business owners come across is in finding the right software to create this content. Sure, you can use a program like Adobe Photoshop, but while using an expert can prove too expensive, going it alone can be too difficult to achieve for many. There are other tools available.

In this day and age where compelling visuals are possible online, it is extremely important to learn how to create attractive visuals to aid your social media marketing campaigns. You at least need a working knowledge of how to enhance your photos and make them more attention-grabbing. There are a number of free or highly affordable tools out there that can help you do just that.

PIXLR - This advanced photo editor works like Photoshop, only it is easier to use and therefore ideal for beginners. You can create images from scratch or perform advanced image editing. Using fairly simple tools can maximize the potential of images. For quick editing, there’s PIXLR EXPRESS or PIXLR O-MATIC, which are free to use. Visit the PIXLR website to learn more and start use these programs.

PicMonkey’s Online Photo Editor - This photo editor can transform ordinary images into fantastic photographs in just a few clicks. Select the image that you want to modify and add special effects such as fancy text, or simply crop and re-size. The photos edited using PicMonkey can be uploaded on Facebook and other social media platforms. PicMonkey is free to use so you can just go to the website and start editing away. For added frames and special effects there’s a premium version you can upgrade to for USD $33.33 per year.

LiveLuvCreate - This website can be used without any charge and offers a variety of design layouts and graphics. Using this platform you can edit your own images and there are also a ton of images created by users on its library that can help give you inspiration. Among the tools available are borders, filters, and photo effects, as well as fonts, colours, and styles. Visit the website to set up an account and start editing your images today.

Canva - If you want to create your Facebook cover photos from scratch, or if you want to design some blog images, this is a free application that might prove useful. This tool is very convenient and can be used to create business cards, invitations, posters, and presentations. Visit the website today to start creating your own visuals.

Quozio - If you are into quotes, Quozio lets you upload famous and favorite quotes, visualize them, and then share them on your social network. Simply enter an interesting quote and then select a background image. Instead of simply posting what’s on your mind, you can make a quote more attractive and appealing by transforming it into a visual using this free app. Visit the site today to visualize your next quote.

Whether you are posting on Facebook, Twitter, or any other social network, your content cannot come alive without the use of quality graphics and images. If Photoshop does not work for you, these other tools are ideal substitutes for creating appealing graphics for a variety of social media platforms.

Make sure to share your own list of top photo tools for everyone to see! And, if you would like to learn more about leveraging social media in your business, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
April 4th, 2014

iPad_March02_AMicrosoft Office has long been not only one of the most popular office productivity suites but also one of the most requested business apps for iPad users. Ever since the release of the iPad business users have been clamouring for a tablet version of Office. Well, Microsoft has been listening and has recently released a tablet optimized version of Office for the iPad.

Wait isn't that Microsoft Office Mobile?

Earlier last year Microsoft introduced Office Mobile for Office 365 subscribers. With this app users could access, create, and edit Office documents on a mobile device. The only issue with this app is that it is optimized for smaller screens e.g., the iPhone. While it is possible to use it on your iPad, optimized apps specifically for the iPad have until now been lacking.

In late March this year, Microsoft finally released iPad specific versions of Word, PowerPoint, Excel, and OneNote. Anyone with an iPad Mini, iPad 2,4, and Air can download the apps for free from the App Store and view any related Office documents on their device.

How Office for iPad works

The best way to think of these apps is that they are simply touch versions of the popular Office programs that have been developed specifically for the iPad. Here's four things you should know about the apps:
  • They're free - Currently the Word, Excel PowerPoint, and OneNote apps are available to download for free from iTunes. It is highly likely that more apps will be coming soon.
  • The program links closely with your OneDrive account - OneDrive was SkyDrive until Mid February when Microsoft renamed their cloud storage service, thus allowing you to create documents on the desktop version of Office and then save them to your OneDrive and work on them on your iPad.
  • Document formatting is supported - The iPad versions of the apps have the same formatting features as the desktop versions. Any formatting changes you make to documents on the desktop version can also be made on the iPad.
  • Excel has a unique number pad - Many iPad users don't have a keyboard, and the numbers on the stock iPad keyboard require a number of button hits to reach. To increase usability, Excel on iPad has a special numerical keyboard.

Two caveats

We noted above that the apps are available for free. While this is correct, you will only be able to open and view documents. If you want to edit you will need an Office 365 subscription. The following Office 365 plans will allow you to open, edit, and save documents:
  • Office 365 Home
  • Office 365 Small Business Premium
  • Office 365 Midsize Business
  • Office 365 Enterprise E3 and E4
  • Office Education A3 and A4
  • Office 365 ProPlus
  • Office 365 University
  • Office 365 trial subscriptions
While the vast majority of features found on desktop apps can also be found on the iPad versions, there is one missing - for now: Printing. At this time, printing documents directly from the app is not supported. Microsoft notes that they are working on this and that this function will be introduced in a future update. For now however, your best option is to save files to OneDrive and then open these on your desktop and print from there.

Getting the apps set up on your iPad

If you have an Office 365 subscription getting the apps setup may be a little confusing. Here's how you can do it:
  1. Download the apps from the App Store. (Make sure you have enough free space on your device). You can find the apps by opening iTunes and searching for: Office for iPad. Note: You will need to download each app separately.
  2. Open the app and you should be asked to log in using your Microsoft account. If your business uses Office 365, or if you have an Office 365 account, enter your username and password as you usually do to access the Web and your email.
If you choose to log in using a free account to begin with, you can upgrade to an Office 365 account from the app. This can be achieved by opening the app, and clicking Activate which should be located at the bottom left of the main menu. You can then follow the app's steps to purchase an Office 365 subscription through iTunes. Alternatively, you can go to the Office 365 website and subscribe through here. Once you open the app, after your account has been updated, you should be able to access, edit, save, and share documents.

Should I get this app?

Office 365 is one of the most popular versions of Office for small to medium businesses, and many users are wondering if they should download the app to their iPad. The answer to that is that it depends on whether you want to use your iPad for work or not.

Generally speaking, business owners who have an iPad and Office 365 subscription will benefit from downloading this app. The main reason is because it offers another way to connect with the office and potentially increase productivity, especially when you are away from your desk, through greater flexibility.

If you don't have an Office 365 subscription but use Office in your business, the iPad versions of Word, Excel, and PowerPoint could be useful, especially if you only need to view documents. That being said, you might want to consider updating to Office 365 in order to gain full access.

Contact us today to learn more about the different plans available for your business.

Published with permission from TechAdvisory.org. Source.

Topic iPad
April 4th, 2014

Security_March31_AMalicious software (more commonly known as malware) can be found on almost any system, most often being downloaded and installed on computers. It can cause a myriad of annoyances, like unwanted pop-ups and system freezing, and some forms can even gain unauthorized access to your PC, stealing personal information. It's therefore essential that malware is prevented. Malware on work computers can disrupt a company’s operations and may put the security of data in jeopardy.

Signs of a malware infection

Before proceeding with the steps on how to respond to malware infections, we first need to learn about the signs and symptoms of a malware infection. These include:
  • Several pop-ups appear even when not browsing the Web.
  • Unusual slowness of the computer and Internet connection.
  • System hangs or freezes.
  • Corrupted programs.
  • Antivirus is disabled.
  • E-mails sent to or from your account which you did not send.
  • High network activity, even when not using large programs or accessing huge data.
  • Redirected access to some sites.

How to respond to a malware infection

In case you experience any of these symptoms, the first thing to do is to ensure that your antivirus and antispyware program is updated. This is to make sure that they detect the latest known threats on their database. You should then run scans to see if an infection is detected. If it is, the programs usually have a way to remove the infection. You then need to follow the steps the program recommends.

If this doesn't work, disconnect the infected computer from the network to prevent the spread of the malware. Furthermore, avoid accessing the Web and using vital information such as bank account and credit card information. Let the technical department or your IT partner handle the concern since they are trained in determining and eradicating system malware infections.

Once the problem has been pinpointed, a tech specialist will go through the process of eliminating the infection. This includes backing up data on the computer and restoring the system to its original state. Depending on the extent of the infection, the computer may need to be wiped clean, or reformatted before restoring backed-up files.

After the whole process, the computer must be tested to ensure that the infection has been totally removed. Moreover, further investigation and studies must also be done to determine where the problem started, as well as to create a strategy as to how to prevent this from happening in the future.

How to prevent a malware attack

Prevention is better than a cure and this definitely applies to malware infections. It’s best to arm yourself with knowledge on how to avoid malware attacks and prevent your systems from being infected.
  1. Ensure that security protection is always updated and that you run system scans on a regular basis.
  2. Avoid downloading attachments or clicking links from unknown sites or senders.
  3. Enable firewall protection.
Malware can hugely affect business operations and the security of private information. One of the best ways to prevent this is to work with an IT partner, like us, who can help recommend and install protection systems. You might want to think about getting help in managing these solutions too, to ensure that your systems are secure at all times.

If you have questions or concerns with regards to malware prevention and resolution, feel free to call us. Our support team is always ready to help.

Published with permission from TechAdvisory.org. Source.

Topic Security
April 3rd, 2014

iPhone_March31_AThe Calendar application is one of the built-in features that comes installed on every iOS device, including the iPhone and iPad. It has the important basic functions that you need in a calendar, including adding events and the ability to share events. Syncing with other calendars is also possible. By default, Calendar is set to begin each week on Sunday, but this can actually be modified if needs be.

Why change the day your week starts on your calendar?

If you go into Calendar and note that your regional setting is set to United States, for example, you may notice that the day of the week starts on a Sunday. This is true even with other regional settings. While it is technically correct that Sunday is the beginning of the week, you may still want to change the day so that your week starts based on your native calendar or even when your work week begins.

Often people see Monday as the start of the week because it is usually the start of the working week. You might find it more convenient if this is also reflected in your calendar setup. Moreover, your calendar might appear more organized if your weekends are next to each other. With the default setting, Sunday and Saturday are on the left and right side, with the work week in between.

How to change the beginning of your work week

There are two ways to change the day that your week starts on Calendar. One method is changing the country in the regional setting and the other one is by changing your Calendar's date setting. However, take note that changing the regional setting will also affect other features in your device such as the time format and the number that appears on your screen when someone calls. If you don’t want to take any chances, it’s best to follow the calendar setting method.

Here’s how to change the day your week starts on your calendar setting:

  1. Tap the Settings icon on your device.
  2. Scroll to Mail, Contacts and Calendars then tap on it.
  3. Go to Calendars and select Start Week On.
  4. Tap your preferred option and Calendar will make that the start of your week.
If you would like to be a little different, you can change your regional settings by:
  1. Going to Settings.
  2. Choosing General.
  3. Selecting International.
  4. Tapping Regional Format.
  5. Selecting the country or region of your choice
As mentioned, this may affect other features on your device, including the time and the way phone numbers are displayed. If you work with colleagues or clients from other regions, this might not be an issue for you.

If you have any questions about your devices and how you can use it in your business then get in touch. Our friendly and knowledgeable support team are happy to assist you.

Published with permission from TechAdvisory.org. Source.

Topic iPhone
April 2nd, 2014

gloStream_Apr02_AIn a surprising move, the House of Representatives approved a bill that includes a delay to mandatory ICD-10 implementation until October 2015. After the announcement we are sure that many medical practices breathed a long sigh of relief.

The problem: Without a fix to the Sustainable Growth Rate (SGR) formula, Medicare physicians face a 24% reimbursement cut beginning April 1. This is obviously something that does not sit well with many of the country's medical practitioners - and rightly so. No one wants to see hard-earned profits sink because of a medical bill.

Joseph Pitts introduced a bill, H.R. 4302, that proposed to replace the reimbursement cut with a 0.5% payment update through the end of 2014 and a 0% percent payment update from January 1 through March 311, 2015.

The American Medical Association, which wants payment stability for its constituents, responded by urging House of Representatives members to vote down the proposed legislation. The code sets were caught in the crossfire.

Note: Before the ICD-10 delay takes place (and the SGR fix becomes permanent), the Senate must vote on the proposed legislation and President Obama must sign it into law. It would be a good idea to keep abreast of this issue because it will likely directly affect your practice.

If you are looking for help upgrading to ICD-10, or ensuring your practice meets established standards, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

April 2nd, 2014

HealthcareIT_Apr02_AChief Information Officer (CIO) Denis Tanguay’s workload has quadrupled over the past few years, and he has been struggling to stay on top ensuring that systems are secure and available when his employees need it. How did he overcome these struggles? He found a solution in outsourcing.

As the CIO for Central Maine Healthcare explained in a Health Care IT News article, getting ready for Stage 2 meaningful use attestation and transitioning to ICD-10 put tremendous pressure on him and his 70-person IT staff.

A few years ago, Tanguay began working with an IT provider, which took work off his staff’s plate. Central Maine Healthcare uses IT providers in a number of ways, from service requests for new PCs, keyboards, and software installations to help with user calls. They’re essentially an “insurance policy," says Tanguay. "They have already blazed those trails and made sure that whatever we're going to be using has already been tested, what versions of firmware and software work well."

Tanguay says the result of outsourcing some IT functionality has resulted in easier software upgrades, quicker response time, greater system stability, improved data security, and better disaster recovery procedures.

Moreover, outsourcing has allowed Tanguay to focus more on the things that are important. “My CEO has a line,” he says. “’We're not in the IT business; we're in the healthcare business.’”

When it comes to IT outsourcing, health-care providers have the option of doing a little or a lot,” says another recent article. They can turn over an entire IT function, or farm out small portions. If you are struggling with managing IT systems in your practice, or would like a little help ensuring compliance with the always changing regulations, contact us today to see how our managed services can help.

Published with permission from TechAdvisory.org. Source.

April 1st, 2014

Facebook_March31_AWith Facebook change is the rule not the exception. However, changes can be a challenge for business users to keep track of. One of the most common features that is changed or updated, is the algorithm that determines what content is shown on a user's News Feed. With many of the recent feature changes many business owners are commenting that it feels like they are being shoehorned into buy ads in order to reach their audience. While ads can be beneficial, one way to get your content in front of users is by improving your newsfeed performance.

There are many ways you can improve your News Feed performance and the best is to improve the reach of your content. Before we get into how you can do this, we should first describe what your Facebook reach is. Basically, your reach on Facebook is the number of unique users who see the content you post and your updates. When it comes to reach there are four actions you can take to influence it:

  1. Posting content on your own Page - This is commonly referred to as organic reach by Facebook.
  2. Facebook users interacting with your content - When users interact with the content on your Page e.g., commenting or sharing, this is shown in their News Feed, an act which Facebook calls viral reach.
  3. Sending users to view your content - This could be as simple as putting a link to your content on an email, or even on your website asking people to visit your Page. This is a form of organic reach.
  4. Paying to get content in front of people - This is using Facebook's ad services and paying to target your content to specific audiences, thereby increasing the chance they see and interact with it. This is commonly referred to as paid reach.
By combining these four actions together, you can get a picture of your overall reach. By increasing the reach of each post through the above actions you stand a higher chance of getting your content in front of other people. The more people who see your updates the higher the chance of interaction with your company on Facebook or through other mediums, including avenues of sales.

The question is: How can a company do this? Here are seven of the most effective ways to improve your News Feed and its performance.

1. Develop a strategy

The key to posts being shared is that they need to be useful and interesting to your audience. Take a look at your Page's Insights (Open your Page's Admin panel and click on Insights) to see what content has been popular with your followers. From there develop a content strategy that covers what content to produce, when it should be produced, and when it should be shared.

Take a look at the most popular posts and see when they were interacted with most. This will give you a good idea of when your followers are most active and likely to interact with your content - thus increasing reach and overall effectiveness of your posts.

2. Know your audience

This will take time and research, but you should be able to paint a pretty solid picture as to who your audience is. If you can define a few personalities or even target individuals, you can better come up with content your audience will be more willing to interact with, or be more receptive to should you promote it.

3. Let people interact with your Page

Some companies have allowed users to post content on their News Feed or even tag companies, having the post show up on the company's News Feed, only for the content to be trolling or negative. This can potentially harm your company brand and reputation.

While there is a chance of this happening, the benefits of allowing your fans and followers to mention you in their posts far outweighs the potential negative outcomes of a few. This is because when a user mentions or tags you in a post on their News Feed, their friends are more likely to see it too. In other words, this can be a massive contributor to your overall viral reach.

4. Be active after you post your content

Don't just post content onto your Page and leave it. If people are interacting with it by commenting then you should make an effort to reply to the comments. This shows that you are interested and responsive, and willing to communicate and create a dialogue.

Mentioning the poster using @username when you comment will highlight the name and post your comment on their News Feed, thereby increasing the number of people who view your original content and encouraging the commenter to return to your Page.

5. Don't be afraid to repost

If you have had successful posts in the past, don't be afraid to reintroduce them. You could try updating the content a bit if need be and reposting it. This will increase the chance of other users seeing content they may have missed and interacting with it. Just be sure to comment somewhere that this content is a repost. You could comment that it was popular in the past and you think it is still relevant to today.

Be sure not to recycle too often however, as this can be viewed as lazy and turn users off. Aim for one to two posts every couple of months.

6. Integrate successful posts with other aspects of your online presence

While there is a good chance that your posts will be seen on Facebook, try boosting this by sharing your most popular content on other mediums. For example, paste the link into your email signature asking people to check it out, or add a list of your most popular posts to newsletters. This will encourage more people to visit the content and even interact with it.

In order to tell what is working, use the information on your Page's Insight panel.

7. Don't be afraid to be innovative

If you hit on a strategy that works, that's great! But, you should not be afraid to try new ideas. If, for example, you see that captions on photo posts are becoming popular with your audience give one a try to see how it works. The key here is to be resourceful and always on the lookout for new ideas.

Looking to get more out of Facebook? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

March 28th, 2014

iPad_March24_AOne of the biggest, and arguably most useful, hardware trends is touch. It seems like almost every piece of new tech, from computers to tablets, and even to fridges or car navigation, comes with touch screens. The main way to interact with the majority of these devices is through the gesture, and if you have an iPad there are a number of important gestures you should know about.

Every new iPad, and many of the older ones, run the latest version of iOS - Apple's mobile operating system. For those running iOS 7, gestures are the main way you interact with your device. While it may look weird to people who don't use them, waving your hands around, spreading your fingers, and even pinching are normal to you!

One of the greatest plus points about gestures is that when used properly, they make it simpler to interact with your device; speeding up your overall productivity. So, if you are looking to increase productivity while using your device, you should know and practice different gestures. Here are six of the most important:

1. Swipe one finger from the top

If you place your finger on the top bezel (above the viewable area of the screen) and swipe down onto the screen you will open, or slide down, the notifications center. From here you can action notifications. When you are finished slide up from the bottom of the screen to close the notifications.

2. Swipe one finger from the bottom

If you place your finger on the bezel (below the viewable area of the screen) and swipe up onto the screen you should bring up the Control Center where you can control the important settings on your iPad. To close simply swipe down.

3. Swipe one finger down

Place your finger anywhere on the viewable area of the screen and swipe down. This will open up the Search bar where you can search for almost anything on your iPad, including apps, emails, music, and more. To close this bar, simply tap the home button, or tap anywhere on the screen other than where the keyboard or search bar are.

4. Swipe four fingers up

If you place four fingers anywhere on the screen you will bring up thumbnails that represent the apps that you have open. If you swipe up on a thumbnail, you will close the app.

5. Swipe four fingers left or right

With apps open, you can place four fingers on the screen and swipe to the left or right. This will switch to other open apps. You can swipe the opposite direction with your fingers to go back to another app, if you sweep to the left again, you should bring up a list of recently used apps.

6. Grab with five fingers

If you are in an app and want to quickly get to the homescreen place all five fingers on the screen and pinch them together. This will shrink the app into your home screen. You can open it again by swiping four fingers up and selecting it.

If you are looking to learn more about using your iPad in your business, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

Topic iPad
March 20th, 2014

Security_Mar17_ASecurity of a business's systems and networks should be important to many business owners and managers. In fact, an increasing number of companies are implementing security strategies. While these strategies do keep businesses secure, there is one critical element that could cause plans to fail, leading to an increased chance of a breach of security: The audit.

Auditing and the security security strategy

Auditing your company's security is important, the only problem business owners run across is where and what they should be auditing. The easiest way to do this is to first look at the common elements of developing security strategies.

These elements are: assess, assign, audit. When you develop a plan, or work with an IT partner to develop one, you follow the three steps above, and it may be obvious at the end. In truth however, you should be auditing at each stage of the plan. That means you first need to know what goes on in each stage.

During the assessment phase you or your IT partner will need to look at the existing security you have in place. This includes on every computer and server and also focuses on who has access to what, and what programs are being used. Doing an assessment should give you an overview of how secure your business currently is, along with any weak points that need to be improved.

The assignment phase looks at actually carrying out the changes you identified in the assessment phase. This could include adding improved security measures, deleting unused programs or even updating systems for improved security. The main goal in this phase is to ensure that your systems and networks are secure.

Auditing happens after the changes have been made and aims to ensure that your systems are actually secure and have been implemented properly. Throughout the process you will actually need to continually audit and adjust your strategy.

What exactly should be audited?

When conducting an audit, there are three factors you should focus on:
  1. The state of your security - Changing or introducing a security plan usually begins with an audit of sorts. In order to do this however, you need to know about how your security has changed in between audits. Tracking this state and how it changed in between audits allows you to more efficiently audit how your system is working now and to also implement changes easier. If you don't know how the state of your security has changed in between audits, you could risk implementing ineffective security measures or leaving older solutions open to risk.
  2. The changes made - Auditing the state of your security is important, but you should also be auditing the changes made to your systems. For example, if a new program is installed, or a new firewall is implemented, you will need to audit how well it is working before you can deem your security plan to be fully implemented. Basically, you are looking for any changes made to your system that could influence security while you are implementing a new system. If by auditing at this point, you find that security has been compromised, you will need to go back to the first step and assess why before moving forward.
  3. Who has access to what - There is a good chance that every system you have will not need to be accessed by every employee. It would be a good idea that once a security solution is in place, that you audit who has access to what systems and how often they use them. This stage of the process needs to be proactive and constantly carried out. if you find that access changes or system access needs change, it would be a good idea to adapt your the security strategy; starting with the first stage.
If you are looking for help developing a security strategy for your business, contact us today to see how our managed solutions can help.
Published with permission from TechAdvisory.org. Source.

Topic Security