Wednesday, November 24, 2010

What You Should Know About "The Cloud"

Written by Marty Kaufman, as seen in The Business Press

Technology is amazing. It is hard to deal with just how fast things are changing. It was just a year or two ago and the word "Cloud Computing" was uttered. Since the first time one of my clients said the words to me, I have been standing at a white board or scratching sketches on napkins to illustrate cloud computing scenarios. So what is "The Cloud" and how could you take advantage of it?

Definition

The term "cloud" is just a metaphor for the Internet. You generally access your "cloud" via a browser like Internet Explorer, Safari, or Chrome but there are other ways as well. The basics are super simple. You go to a browser, select the site or shortcut you need, and just like that, you are working. Better yet, you can access your data from anywhere in world; a desktop, laptop, or Smartphone. You have the browser; the application provider has the data. Awesome!

There are thousands of great applications available on the Internet from your Browser. Some very popular examples are Facebook, Google Apps, Salesforce.com and Quicken.

The Cloud at Home

At home, you use cloud applications all the time and may not even know it. You just click and go. Over 500 Million of us click on Facebook and Fantasy football is one of the most used sports applications in the world. This is great for us home users because we get amazing new fun applications to use for little or no cost. What a deal!

The Cloud for Business

For small businesses, cloud applications can sometimes be used exclusively and very inexpensively. If your company just needs email, accounting and document storage, there are great options. You can get your email, office applications, and document storage from Microsoft or Google and your accounting online at Quicken. How simple is that! Better yet, the price for these applications can be as little as $5 per month.

Larger or more complicated businesses may have a bit of a challenge. Companies need to find applications that can perform the business functions that they need at a price they can afford. Some businesses have the need for very specific software and integration that may not be available in the cloud. These types of businesses may need to implement a hybrid approach. Email may be provided by the cloud but maybe there will be an on-site server for the custom applications and storage.

Caution – Security and Support

Moving your business to the cloud will require a faster and much more reliable Internet connection. This usually means a significant increase in your monthly communications bill. Remember, if the Internet goes down, you will not have access to your applications or your data; so you must make sure the Internet Service Provider is financially and technically solid.

Make sure you implement rock solid Internet Security measures like an updated firewall, intrusion prevention software (IPS), workstation antivirus and patches, and a good web filter. At least you will be locking the door on the growing number of Internet thieves.

IT Support may be a challenge as well. When you have all of your applications and data are in the cloud and something obscure like a printer doesn't print . . . who do you call? You must have a good team of IT professionals looking out for you in case all of the complicated communications somehow gets interrupted.

The cloud is here to stay and will just continue to expand and mature. I can't wait to see what is next!


At TeamLogicIT, we've helped many customers migrate parts of their strategic infrastructure to the cloud to gain addtional performance and availability.  For a free consultation on how Cloud Compting can benefit your business, call us at 650-204-3150 or send email to MountainViewCA@TeamLogicIT.com.

Tuesday, October 12, 2010

Simple Steps Can Unlock Business Insights

by Steve Strauss
Used with permission from the Microsoft Small Business Center

About a year ago, my cousin gave her father a smartphone for his birthday. My uncle smiled indulgently at his tech-savvy daughter and uttered the expected words of gratitude. Weeks later, he quietly confided in me that all he'd really needed was something to make phone calls "instead of doing everything short of diapering a baby." I showed my uncle some of the great things he could do with that phone: surf the Web, do his email, check his calendar, shop online…all tasks that I knew he did regularly on his PC. Oh, he said, I didn't know it could do that stuff. Now he wouldn't part with that smartphone for anything.

It's surprising how many small and midsize businesses are like my uncle, not taking full advantage of the technology they already own. They know they have powerful reporting and analytical tools in Microsoft SQL Server 2008 and the 2007 Microsoft Office system (especially Excel) – but they aren't sure how to maximize their value. More's the pity, because the tools built into SQL and Excel can provide insights that can help make the difference between profitability and penury.

So, how should a small or midsize business go about unlocking the business intelligence (BI) value inherent in SQL Server and Excel? It all starts with thinking logically about your business and defining your goals. Don't just think about the data you currently collect—think long and hard about what you want to know from your data. What information do you need to drive your business? Are you collecting that data currently? If not, how can you get?
Once you know what you want from your data, it's time to establish your KPIs (Key Performance Indicators). These are the metrics that define success; they let you know how your business is performing. Where do these data reside, and how can they be analyzed to reveal trends, spot opportunities, and reduce inefficiencies?

Let's break the process down into its sequential steps:
  1. Think strategically about your business, determining what you need to know from your data to drive your business. Pull your business leaders into this process early on—you need their input in order to create an effective BI strategy.
  2. Make a list of all the data you're producing and collecting today, including customer contact information, invoices, account statements and ledgers, website activity, sales numbers, and payroll.
  3. Brainstorm with your staff to see if there are other data they would like to track in order to monitor the health of the business. Think about the gaps – what data do you need but don't currently gather? And what current data could be more useful if compiled and reported differently? Add all these data needs to your list.
  4. Categorize the data according to type; for instance, customer information, marketing data, inventory counts, financial information, online sales figures, offline sales figures, and so on. Make sure the categories reflect how you think about your business, and that they will be readily meaningful to other people in your company.
  5. Make sure you've captured everything. Review the data requirements with all stakeholders to ensure its completeness.
  6. Now that you know the data you need to track, work with your business leaders to map it to success metrics. In other words, create your KPIs.
  7. Develop a tentative scorecard, which shows all of your KPIs, and review it with your business owners. Modify the scorecard as necessary with their input, to ensure that each business leader can drive his or her part of the operation from the scorecard metrics.
  8. Once you've developed a working scorecard – one that gives your business leaders the data they need to monitor their operation and make necessary adjustments – you have a template for creating automated reporting that will deliver value across your company.
  9. Set up systems to acquire and automate the data you need but do not currently compile.
  10. Build the scorecards and automate the reporting of your KPI data. Now you have the Business Intelligence you need to run your company efficiently and to maximize growth opportunities.
It's imperative that you work with the right technology partner to accomplish the last three steps. Look for partners who are:
  1. Certified by major software providers, such as Microsoft Certified Partners, and who have ample experience working with businesses like yours.
  2. A well-executed BI solution can save you time and money, help you spot trends, and show you how to grow your customer base. But don't take our word for it. Instead, let's take a look at BI in action, observing how a BI solution turns information into insights that lead to better business decisions.
Raymond James is a financial services company that provides investment and financial planning, investment banking, and asset management, with clients and advisors spread across the United States and Canada. Despite its size, the BI issues confronting Raymond James aren't much different from those that any small or midsize business might encounter. Like so many businesses, Raymond James found itself overwhelmed by data. Its advisors needed real-time insights into which of the company's investment programs were performing well, along with information on the performance of individual client portfolios. It was taking too much time and effort to extract these insights from the mountain of data, largely because the company's software applications were poorly integrated.

"The company has been growing at a rate of up to 20 percent a year, and our applications have been expanding, but not all were integrated," explains Bill Gross, Senior Manager in the Business Intelligence Group at Raymond James. "Our financial advisors spent valuable time jumping between various financial and customer applications to get the kind of insights they need to make informed decisions."

In 2007, Gross created a BI team to fix the problems. This team went through the key steps outlined earlier in this article, and determined that they could build upon their existing Microsoft technology base to improve the availability and usability of their existing BI tools. Consequently, the team opted to migrate to SQL Server 2008 and related technologies, and to use Excel Services in Microsoft Office SharePoint Server 2007 to provide access to real-time, interactive spreadsheets from a web browser. By January, 2009, Raymond James was using SQL Server Integration Services to load transactional data from more than a dozen databases into a single relational data warehouse. Drawing on the power in SQL Server Business Intelligence Development Studio, the team created dozens of new reports, enabling Raymond James financial advisors to perform rapid BI analysis on more transactions than ever before. This enabled advisors to make better, faster, more cost-effective decisions, which benefit clients and their own bottom line.

Senior managers at Raymond James are able to use the new reporting capabilities to analyze the performance of the business from multiple perspectives. "With today's economy, we have to look closely at which programs are working and which have not performed," Gross says. "Senior management is able to slice and dice metrics however they want them, to better drive their business. They can output the data to Office Excel 2007 and manipulate it without needing to have any technical background."

These experiences aren't unique, and they certainly aren't limited to large, enterprise-class organizations. When small and midsize businesses take the time to delineate their data needs and rationalize their reporting structures, the results can be dramatic improvements in efficiency, growth, and customer satisfaction. And the best part is this: they probably already have the Microsoft tools – the 2007 Microsoft Office system and Microsoft SQL Server 2008 – that provide the foundation of a robust BI solution. So, work through the BI checklist and then contact a Microsoft Certified Partner, and you'll be on your way to running a smarter, more efficient, more competitive business.


At TeamLogicIT we not only take care of your systems and networks but we take care of your data as well.  Talk to us about a free consultation in Business Intelligence and Analytics.  Our trained experts can help you make sense of your data and get your business pointed in the right direction.  We help your business run smoothly and efficiently with the right metrics.

Taking the mystery out of Business Intelligence

Thursday, September 30, 2010

Six Steps To Create A Website That Fills Your Pipeline

by Stuart Crawford, Ulistic

Your website must convert visitors to prospects today.

What does your website say to your ideal prospect?  Is your marketing website attracting and converting visitors to prospects?

Your business website is one of the first pieces of your marketing a potential client will use to judge your business. Does it create a WOW factor? Next to your business card, your website is a critical part in your overall marketing message. What is it saying?

Does your website convey professionalism or could a potential client jump to a conclusion that your business can not handle their needs simply because of your website? We all strive for professional however for many our websites don’t share this message with those who visit.

After poor design, confusion is another challenge facing business websites today. Websites that struggle to share your exact message about your business will fail to convert visitors to your site into a sales prospect. If your message is unclear you will have confused visitors about what your business offers and especially how you can help them.

You only have 3 seconds to make that critical first impression, make the most of it.

Your marketing website is one of the most important parts of your overall marketing strategy online and your traditional marketing strategies. All roads lead home and your business website must welcome visitors and it must convert visitors to prospects.

Here are SIX basic tips to enable business to get the most from your marketing website:

1. Make your team the stars! Dump the stock photography and get real pictures from your team put on your site. This tells your visitors that you are a real company with real people. A professional photographer can capture the culture of your business allowing your business to share your culture through your website. It is great when we show up at a new client meeting and someone says "Hey, it is the guys from their website".

2. Keep your content fresh. Having fresh content on your website demonstrates to your prospect how much you care about your business and that you are up on the times. Nothing says "I don't care" or "I am too busy" like a stale blog or website that still has updates listed for Windows 95.

3. Content, Content, Content. Content is king in having a website that attracts visitors through search and has the potential to convert visitors to potential clients. Balancing exceptional content with good design will attract and potentially convert those who are just snooping to those who may invest in your services. David West, Senior Advisor at Ulistic says "it is the information highway, not the good-looking website highway". People go online to get information, become a source of information for them.

4. Template Web Designs. There are some great web designs out there and some wonderful services that offer business a fixed-cost monthly for their websites, newsletters and other services. Consult with a web marketing professional before signing a long-term contract with any website designer or service provider.

5. No Secret Sauce. Marketing takes work and online marketing takes even more work. I haven't found one silver bullet other than commitment, hard work and execution. You will never get this from a marketing application claiming to grow your business with no work from you. It takes knowledge and systems to make all levels of your marketing work.

6. Video. Use video and use video wisely. Video can grab each visitor's attention immediately. Using client testimonials, walk-on video or talking head video will create connections with all your website visitors. Video will also become part of your search engine optimization strategy.

There are many things your business must consider when executing a web marketing strategy. Your main marketing website is the most important part to your overall marketing strategy, long before figuring out blogs, social media and other strategies. Focus efforts on creating a website that educates, informs and the most important factor – converts.

Your website must convert visitors to prospects, do the right things today in order to make the most of your marketing investment.


At TeamLogicIT, we make technology work for your business.  Whether it is creating your website, marketing your website or maintaining all of your computer and networking equipment at the highest level of performance and availability, we can help you with the complex solutions to take your business to the next level.  Call us today at 650-204-3150, no obligation system inventory and asessment at no cost to you!

Taking the worry out of your technology...

Monday, September 20, 2010

What is Voice over IP? The Basics

used with permission from the Cisco Small Business Center.

What is voice over IP? How is it different from unified communications? And how can it help your small business?

What is Voice over IP?
Voice over Internet Protocol (VoIP) technology lets you use the Internet to make and receive telephone calls.

What is Voice over IP?: The Range of Services
VoIP is available in a wide range of services. Some basic, free VoIP services require all parties to be at their computers to make or receive calls. Others let you call from a traditional telephone handset or even a cell phone to any other phone.

What is Voice over IP?: Equipment
For VoIP, you need a broadband Internet connection, plus a traditional phone and an adapter; a VoIP-enabled phone; or VoIP software on your computer.

What is Voice over IP?: Security and Service Quality
Most consumer VoIP services use the Internet for phone calls. But many small businesses are using VoIP and unified communications on their private networks. That's because private networks provide stronger security and service quality than the public Internet.

What is Voice over IP?: Versus Unified Communications
Unified communications systems offer more features and benefits than VoIP, yet many are still priced for small businesses. Unified communications brings together all forms of communication regardless of location, time or device. Faxes, e-mail, and voicemail are all delivered to a single inbox. You can integrate your phone and customer relationship management (CRM) systems to improve your customer service, and much more.

What is Voice over IP?: The Benefits
VoIP and unified communications enable you to:

•Reduce travel and training costs, thanks to web and video conferencing

•Easily grow your phone system as needed

•Have one phone number ring simultaneously on multiple devices, helping employees stay connected to each other and to customers

•Reduce your phone charges

•Have a single network for voice and data, simplifying management and reducing costs

•Access your phone system's features at home or at client offices, in airports and hotels -- anywhere you've got a broadband connection


Whether you are upgrading your phone system to VOIP for addtional features or moving to a Unified Communications model, TeamLogicIT of Mountain View can help you decide what system is right for you and get you up and running quickly, without inturruption and at a price point that is right for your busiessess.

TakingTthe Worry Out Of Your Next Office Phone System.

Sunday, August 29, 2010

Security: It's the Small Things That Matter

When (If) we think about data security for our businesses we tend to believe if we have a firewall and antivirus in place we are protected . . . if this were only the case. There are so many other aspects of data security that we have to consider on a day-to-day basis. Here are a few of the most commonly overlooked areas of business data security.

Mobile Devices

Do you have a formal policy for cell phones? Is there a lock feature or
PIN they must enter in order to access the phone? What is your action plan if they lose the phone or if it gets stolen? Can you remotely "wipe" the phone through your Exchange server? These are things that need to be considered if your employees are receiving company email or if they keep company and client contacts on their phone. There are many features in exchange 2007 and 2010 to assist with securing or protecting the mobile device. Also, if you have iPhones in your organization we would recommend using the password lock feature. The key is to have a formal procedure and to ensure your staff knows that management needs to be notified immediately if a device is lost or stolen.

Password Change Policy

How often are end users required to change their password? 30, 60, or 90 days? Ever?  We recommends at least 90 days, but 30 or 60 is much better. One of the main reasons we encourage frequent password change is employee turnover. In the event an employee is terminated and they know someone else's password within their organization there is a chance they can still access the network remotely using another end users credentials. It is simply a lot more practical to change passwords at regular intervals as opposed to each time an employee is terminated. One last note, always encourage your team to never share their credentials with other end users.

Remote Access

Do you allow remote access? Is it secure? Is it open for everyone? If you are like most businesses and remote access is allowed and encouraged from a productivity perspective it is best to keep access simple and manage what users can use the service. Another factor to consider is knowing what information they can access and pull off the network remotely. Remote access is necessary but you need to be sure you have a strong policy for managing it and ensuring the service can be turned off for users who are no longer with your company. We also recommend that you test your external IP addresses for any vulnerabilities.

We cannot express enough how each of these topics are not IT decisions, rather they are BUSINESS decisions. We do not need to tell you how important your data is to your business, but if you are not looking at security best practices on keeping sensitive data secure then you need to be. Take a look around your business and consider how many mobile devices are leaving the door each day with either data stored locally or with the ability to access the data remotely. Ask your team members if the data is secure and how it is secured. Make sure you are comfortable with the answer, if not then reach out and let us help

Wednesday, June 30, 2010

Information Technology - Making a Solid Investment

Contains exerpts from Franchising World's November 2011 article by Chuck Lennon, President of TeamLogic IT .

Information technology or IT is the lifeblood of every business. The recent natural disasters on the East Coast, Hurricane Irene in Aug of this year, in particular, are the perfect example  of  why your business needs to embrace the concept of  using advanced technology to organize, manage, and protect vital information.


For years, large companies have embraced the need for IT to sustain and grow  the business, with departments dedicated to supporting IT. This  allows large companies to maintain the  key tools in IT - computers, servers, and networks, among others - to ensure efficient  business operations.

Where are small to mid-sized businesses or SMBs in their technological frame of mind? Using a highly capable  IT provider can offer these businesses with a great array of benefits including reducing operating costs and improving business performance and functionality.Do business owners understand the concept of IT solutions?

 Why Use an Outsourced IT Firm

According to CIT Group, a provider of vendor financing solutions, the benefits of using an IT firm to outsource a business needs - such as lower cost, increased resources and reduced IT headcount - are not fully understood by today's business owner.

There are several type of IT solutions available to SMBs, such as the break-fix model and proactive managed services, but how does a business owner decide which package fits its needs?  The job of a trusted IT partner is to bridge the gap between the business owner and the ever-changing technology landscape.  It is important for SMB owners to be educated about making a solid investment in IT, including the true cost of downtime, the tools that large companies have and why hope is not a sound business strategy.

The True Cost of Downtime

The meat of this topic was covered in an earlier blog.  Let me just add that even when a company's IT systems are revived and running, you can also experience post-downtime, an additional delay while data is being recovered and operations are still severely hampered.   Even more alarming, a recent article in the Huffington Post mentioned that 80%of SMBs that are not up and  running within 10 days of a natural disaster will go out  of business withing the year.   A trusted IT partner can have a plan in place prior to an  unforeseen circumstance to  help ensure that the business is prepared and does not become a statistic.
Without a trusted IT partner, many business owners neglect their computer systems and spend the least amount of money to money to have their systems back up and running.  The problem is that these quick, cheap schemes often cost the business more money in the long-term, since the fundamental problem has not changed.

Hope is Not a Sound Business Strategy

The concept of relying on "hope" to achieve optimal success is one of the classic tales our franchisees' hear when talking to SMBs, but it is a poor business tactic that can ruin a business.  A computer network is the backbone  of a  business operation.  When it's working, the owner doesn't think  about it.  But it's not, it can turn a business upside down.  To the benefit of the millions of U.S. SMBs computing for the consumers'dollar, many can gain a substantial advantage by investing  in  IT support.  A solid investment in IT provides SMB owners with the confidence and peace of mind that their business systems are secured, reliable, and protected.  More importantly, employees are maximizing their time - ultimately allowing  the business to thrive and become event more successful.



We meet with many clients who aren't receiving the service and attention they need to keep their technology running efficiently. Everyone has someone they call on to help them when things aren't functioning, but can you rely on your provider to be proactive? A smart investment in IT can pay for itself over a short period of time, if implemented correctly.

TeamLogic IT of Mountain View, CA, is part of a nationwide network of computer consultation and managed services businesses providing outsourced IT services. Small- to medium-sized businesses rely on TeamLogic IT to handle a broad range of services from urgent computer repair and proactive maintenance to the installation of entire networks and more. For more information, contact Jon Simms at JSimms@TeamLogicIT.com or visit www.TeamLogicIT.com.

Tuesday, June 15, 2010

10 Quick Disaster Recovery Tips for IT

By Bill Hammond director of product marketing, Vision Solutions
used with permission from www.melissadata.com

In the minds of many, a disaster means a hurricane; earthquake; flood; fire; or other natural calamity or, possibly, a terrorist attack. These types of disasters are uncommon, but they do happen. However, for the purpose of this article, "disaster" has a broader meaning and thus is much more common. In this context, a disaster is any event that causes either of the following:
The destruction of all online operational copies of an organization's data and/or applications. "Online operational copies" include both the production copies and any ready-to-run backup copies that can be placed in the production role immediately and, preferably, seamlessly.

The loss of access to all online operational copies of the organization's data and/or applications for a sufficiently long period, such that a recovery operation will be faster and more cost-effective than waiting for the online operational copies to come back online.

In the event of a natural disaster or terrorist attack, the organization's first objective should be, clearly, to protect and maintain the safety and security of its employees, and other people on its premises. Once this objective has been achieved, or if people have not been placed at risk by the situation, the highest-priority task of the IT department is to get the business-critical systems running again as quickly as possible.
Failure to resume operations swiftly can compound the effects of the disaster and threaten the survival of the organization. According to one often-cited statistic from the U.S. Bureau of Labor Statistics, 40 percent of all companies that experience a disaster never reopen, and more than 25 percent of the companies that are able to reopen close within two years. Thus, disaster recovery is especially vital.

Avoiding Murphy's Law

In the midst of the excessive stress that is inevitable in any disaster recovery process, if something can go wrong, it most likely will. Particularly, in any complex IT environment, many unimaginable things can go wrong. Fortunately, there are a number of ways to lessen the effects of Murphy's law and to reduce the effects of a disaster.
Here are 10 tips that can help minimize a disaster's impact on IT assets:

1. Inventory all IT assets.  The first prerequisite to disaster recovery is to know what needs to be recovered. If no detailed inventory of IT assets – both tangible and intangible – is available, make one now. What hardware, software, and data will have to be recovered? Which skills will be required to perform the recovery operations, and then run the systems at a backup location if necessary? The IT asset inventory list should be included in the company's disaster recovery plan.

2. Maintain offsite data backups.  A comprehensive tape or disks archive strategy is crucial. To minimize recovery times in situations where the physical assets of the primary data center are still operational, backup data has to be available on locally stored tapes.

In addition, it's critical to protect business operations from the risk of the destruction of the data center. That means backup tapes have to be available at a secondary location. Maintaining an up-to-date copy of backup data at an offsite location is worth almost any price. A local fireproof vault is not an adequate alternative because, depending on the circumstances, the vault may not offer sufficient protection, or may not be accessible quickly after a disaster.

3. Prioritize the data and applications and assess their varying criticality.  All are not created equal. Some will be indispensable in reestablishing the business and need to be restored first. Recovery of secondary applications and data can be deferred until the critical applications and data are restored. The data recovery plan should explicitly state the recovery order of data and applications to reflect these priorities.

4. Don't omit standalone data from the recovery plan. Increasingly, business-critical data and documents are stored on laptop and desktop computer disk drives. The data recovery plan should include details on how this data will be backed up and recovered if lost.

And remember, a laptop or desktop computer may be destroyed in the same disaster that strikes a data center. Therefore, it is not enough to back up PC-based data onto a network drive in the primary data center. Critical PC-based data must also be included in the offsite backup data sets.

5. Formally document the plan. A disaster recovery plan that exists only in someone's head is no plan at all. While we'd rather not consider the prospect of serious injury or death, it's possible that some key employees will not be available after the disaster. They may be on vacation and otherwise unreachable during a recovery operation. If the recovery plan exists only in those people's heads, the remaining staff won't be able to execute it. Although it may be possible to automate the initiation of some recovery processes and use the system to enforce the completion of checklists, it's important to keep hard-copy printed copies of the recovery plan in multiple secure locations, including at the recovery site. A plan for restarting the organization's systems that is locked inside an application that is unavailable will be useless when the time comes to initiate the recovery operations.

6. Test the solution. In any complex system or process, what works in theory often fails in practice. Regular testing not only ensures that the recovery plan is viable, but also acts as a training tool. People who have already performed the recovery procedures a number of times during regular testing will be familiar with the plan and confident in their abilities to perform the required actions.

Test the recovery processes at least three or four times per year. Tests will often reveal flaws in the plan. When this happens, be sure to update the plan to fix the flaws. Avoid using an off-the-cuff approach to Disaster Recovery (DR) testing. Maintain a test script that follows the DR recovery plan as closely as possible, and tests as much of it as possible. For operational reasons, it may not be possible to test all aspects of a recovery operation during every test, but every effort should be made to leave as little as possible out of the DR tests.

7. Maintain multiple communication channels. When staff has to be notified of a DR event, normal communication channels, such as email and phone, may be disrupted. Consider text messaging, personal email addresses, and alternate phone numbers as alternative communication vehicles. In addition, there are third-party companies that can handle disaster communications.

8. Automate as much as possible. Human error is possible under any circumstances, but during particularly stressful situations, it is almost inevitable. The more automated the recovery process, the better – thereby removing the human element. However, keep in mind that the systems responsible for automating the recovery operations may be unavailable after a disaster. Thus, just as business applications and data need backups, manual backups for all of the automated recovery processes are crucial.

9. Don't neglect security. When recovering from a disaster, it can be tempting to bypass normal security protocols and policies in order to simplify and speed the recovery. In general, this is a bad idea. Security policies were established for a reason, and bypassing them may create risks that are as disruptive as, or more disruptive than, the disaster itself. Also, remember to store passwords in multiple locations. They will be useless if they are available only at a site that is inaccessible.

10. Ask for help. Creating an effective DR plan can be challenging. DR experts and consultants with extensive knowledge and experience in the field can help leverage the best practices of many companies. They can more effectively craft a plan that meets all business requirements at a cost that fits the budget and is justified by the benefits.

A Fresh Set of Eyes

It is human nature to often not see consciously what should be the most obvious. Even a comprehensive, well-tested plan may omit a data store, application, process or piece of hardware, because its use has become second nature to employees. Thus, it may be a worthwhile investment to bring in an objective DR consultant who can spot such oversights. Remember the old adage, it's better to be safe than sorry.

---Source: Information Management newsletter Feb. 4, 2010 (www.information-management.com). Bill Hammond directs Vision Solutions' product marketing efforts for information availability software solutions.

Friday, June 11, 2010

It Could Happen To Your Business If You Let It

Not long ago, we were helping a small business set up a new email system when the owner's assistant ask us to set her password to the company's phone number - the same number on their website. She explained that this was the standard password she was using for lots of different applications and online services. After all, who was going to pick on her?

Too many small businesses today have that same casual attitude toward information security, thinking they're too small to be targets. Wrong. For one thing, criminal hackers routinely run automated scans on everything connected to the Internet, looking for vulnerabilities. It's like walking down the street jiggling door handles on every car to see who left the door unlocked, whether it's a shiny Mercedes or rust y old Chevy.

Breaking into your small business email accounts might not be as big a win as hacking into a bank, but what if there are messages in your inbox that contain account signup up notices for various online services? Pretty soon, an attacker can be resetting your passwords and extracting confidential data.

In a report published in May 2009 by the National Institute of Standards and Technology entitled Small Business Information Security: The Fundamentals, they outline a list of absolutely necessary actions that a small business should take to protect its information systems and networks. These are:

• Patch your operating systems and applications

• Protect information/systems/networks from damage by viruses, spyware and other malicious code

• Train your employees in basic security principles

• Require individual user accounts for each employee on business computers and for business applications

• Make backup copies of important business data/information

• Install and activate software firewalls on all your business systems

• Provide security for your Internet connection

• Secure your wireless access points and networks

• Limit employee access to data and information, and limit authority to install software

• Control physical access to your computers and network components.

At TeamLogic IT, we do this and more, every day for our clients. We can assist you with any and all of these actions and also talk to you about additional recommended practices that you might want to deploy in your business to ensure the security of your systems and information. Call us today at (650) 204-3150.


Thursday, June 3, 2010

The Truth About Building A Business

Used with permission from Cisco Systems, Inc.

Five Reasons to Strengthen Your Core Network

Is your business connected to the rest of the world?  If it is, your network can help your business pick up its pace. And blow past competitors.  If it isn't, no worries. Connecting a small business is easy and affordable. All that's required is a network foundation (core):

• A managed switch

• A router

• Wireless access points

The stronger the foundation—the more secure, high performing, and reliable it is—the sooner you'll be able to use video applications, Internet-connected phones, Wireless-N, and other new business technologies.

The truth is, you may need a strong network foundation right now. Here are the top five reasons why:

  1. Instantly Get the Information You Need, Wherever You Are:  Get more work done in less time. Your network can connect employees to the data, voice, or video services they need, at any time, from anywhere.  Employees can be in the field, at home, or traveling. They can see or update a customer record, share a schematic or spreadsheets, and view surveillance video—just as if they were in the office.  Dozens of different companies use a single network system run by a 5-employee business to access their own company's information, from anywhere. The wired and wireless Cisco system's built-in security features isolate each company's data.
  2. Save Money, Make Money:  Put bandwidth to work for your profit margin: A strong network can raise revenues and reduce expenses.  A 75-employee business significantly increased annual sales simply by installing a reliable network to replace a system that periodically failed and had prevented customers from placing orders.  A 32-employee business upgraded its network with faster and more reliable switches and wireless access points that allow the company to use bandwidth-intensive applications. Its salespeople now use Cisco WebEx™ online collaboration to demonstrate products to clients, cutting travel expenses.  The network enables employees to meet over the web with anyone, anywhere—and to work as though they're in the room together.
  3. Improve Customer Service:  Transform your brand identity. The network can make a business high-energy, high-velocity, and highly responsive to customers' needs.  A 17-employee business "reinvented" itself with new network technologies that customers liked so much that profits rose nearly 20 percent. The technologies: virtual private network (VPN) security that lets customers access what they need, no matter where they are, and WebEx training that makes customer learning sessions more frequent, efficient, and interactive.
  4. Enjoy Peace of Mind:  Vanquish worries. A strong network makes business operations smoother and safer.  Security features are essential. With only one Internet connection for its popular indoor and outdoor site, a 50-employee business nonetheless provides employees, customers, and visitors with highly secure access. The wireless access points protect by using VPN, authorizing guests, and allocating users a specific amount of bandwidth.  A reliable network lets you spend less time managing technology and more time doing business. When the 50-employee business replaced its old technology with a more dependable network, employees saved two hours daily that they had spent on network troubleshooting.  Network support from a partner can make your technology as easy as "set it and forget it." Instead of having to hire or train technical staff or putting your business on hold while you await tech support, you can partner with a responsive reseller whose expertise is certified by the network vendor.
  5. Protect Cash Flow:  Make an investment, not a mistake. Choose a network system that is designed for small businesses, offers you vendor financing or leasing, and will be easy to upgrade.  Investing in network products from one strong vendor that has a broad product line makes it easy to add compatible products as your needs grow.  You can also cut costs by partnering with a reseller who takes the time to understand your business and provide a strategic solution. The owner of the 5-person business says, "I suppose you could put this system together on your own, but it would have been difficult, costly, and time-consuming. It was great having the partner help us orchestrate it."
At TeamLogic IT, we are the networking experts.  Whether you are installing your first network, overhauling your legacy network that has evolved over a 15 year period of time, moving to Gigabit speeds or securing your network to meet PCI compliance requirements, TeamLogic IT will partner with you to understand your needs and provide you the peace of mind that your networking infrastructure is in the hands of the best, most competent IT service professionals around.  We take the worry out of your technology so you can focus on your business.  Let us help you with your next networking project.  Call TeamLogic IT at 650-204-3150.


Wednesday, May 26, 2010

If Your Business Takes Credit Cards, You Must Be PCI Compliant!


I've been getting a lot of requests to help companies become PCI compliant these days. PCI (Payment Card Industry) is the infrastructure, tools and processes that allow merchants to accept credit card payments for goods and service they provide. If your company takes credit cards and especially if your company stores credit card information for reoccuring transations, there are certain information protection guidelines and practices that you must meet to insure that internet harckers or scammers do not steal this information. These guidelines are described in the PCI DSS standards documents.

Here is a clip that was aired on ABC News 7 a few weeks back. I think it paints a very clear picture of the risks, the threats and the consequences of a security breach in your computer networks and systems that makes your customer's credit card information vunerable to theft.

Berkeley Restaurant Falls Victim To Credit Card Scam

You can not be too careful. The World Wide Web is a rough and tumble place and there are many orgnized crime rings that prey on people and companies who do not take the necessary precations to protect their systems, their networks and their valuable information. Even Wells Fargo has had security breaches of their network and banking systems that have exposed their clients personal financial information. The problems that presents for their brand is enormous. Do you want to take similar risks with your business and your brand?

What are the deadlines for Complying with PCI DSS?
Compliance is mandated by the payment card brands and not by the PCI Security Standards Council. However, for most merchants, the deadlines for validating compliance with the PCI DSS have already passed. All entities that transmit, process or store payment card data must be compliant with PCI DSS.

What are the consequences of non-compliance with PCI DSS?The PCI Security Standards Council encourages all businesses that store payment account data to comply with the PCI DSS. Failure to do so subjects your business to brand risks and financial liabilities associated with account payment data compromises. Merchant service providers can impose their own financial and operational sanctions for non-compliance.

For more information about PCI Compliance you can visit the PCI Secuity Standards Council website at http://www.pcisecuritystandards.org/

If your company is faced with a PCI Compliance audit or wants to take the necessary steps to become PCI compliant, give us a call at 650-204-3151. TeamLogicIT can help you achieve the peace of mind that your computer and networking systems are secure. We are your Bay Area experts in data security.


Monday, May 10, 2010

I'm Dyslexic and the Web Was My Idea

by Matt Swanston
used with permission from CompTIA

I just watched a speech author David Weinberger gave at the Library of Congress. His presentation was based on his book "Everything is Miscellaneous" which explains how information technology has changed the way people think, learn and interact. The speech left me with as many questions as answers – which in some sense is the definition of interesting. But his assertions struck a powerful and familiar chord with me – one that might resonate with some of you as well.

I am dyslexic and dyslexics see the world differently. Strings of letters and numbers for example, never look familiar to me. In my mind, family birthdays, phone numbers and simple math equations rarely stick well enough for me to say that I have memorized them. To me, even common words look just as familiar spelled correctly as incorrectly and despite spending every day with my kids, I struggle to remember their grades and ages.

In a society held together by math and language, dyslexia is a real handicap. This is especially evident in mainstream academia, which lumps dyslexics in with other "special needs" students including blind, deaf, autistic and violent kids. When I was in school, there was a move to start referring to dyslexia as a "learning difference" rather than a "learning disability." At the time, this seemed like semantic hyper-correctness – but as an adult, I have come to understand and even support the notion if not the (still absurd sounding) language.

In this context, disability is a subjective and relative term that suggests someone can’t do something, can’t do it well or can’t do it easily. This of course depends entirely on the context. Being confined to a wheelchair could be a significant handicap on a narrow, rocky woodland trail, but it might well be an advantage in the Mall of America. Deafness would make it tough to be a music teacher but could be a benefit for a firearms instructor. Someone without a sense of smell would have a hard time working at a department store perfume counter but might make an excellent coroner. A short basketball player and a tall jockey are equally disadvantaged in their respective sports. You get the idea – a difference becomes a handicap only when the environment or the task at hand calls for a missing attribute.

Letters, numbers and other symbols are as prevalent and important now as ever, but dyslexia isn’t the handicap that it once was (for me at least). Academia hasn’t changed much – kids who fall outside of the mainstream are still largely lumped together to be underserved as a group. What has changed is the way the rest of the world finds, stores and uses information. The cryptic command line interface that stymied early PC users is now hidden behind a graphical interface that doesn’t’ discriminate against the syntax challenged. The arcane (and static) numerical system we once used to find information in libraries has been largely replaced by the wide net cast by a Google search. Even wildly misspelled words are automatically corrected as we type, and our pocket-sized devices remind us of birthdays and anniversaries even when we can’t remember the exact dates.

For me, the mouse-driven graphical user interface is the wheelchair I use to get around modern society. The web allows me to navigate the sum of human knowledge in the way my "different" mind works. Podcasts and streaming video provide a text free window into information that once seemed trapped on a page of swimming letters.

It seems that information technology has caught up with dyslexics. The non-standard, fluid, relational, multisensory way dyslexics have always preferred to consume information has become mainstream. The net effect has been to turn my learning disability into something of an advantage – at least some of the time.

To the IT professionals who democratized information and simplified the user interface I say simply, "thanks." To those who once made fun of my still horrid math and spelling skills, I say, "welcome to my world!" And to my LD peers, I say triumphantly "Dyslexics Untie!" (Sorry, I couldn’t resist).

Thursday, April 1, 2010

Five Essential Elements of Business Recovery

The article re-printed courtesy of IBM ForwardView eMagazine
www.ibm.com/expressadvantage/forwardview

In the current business environment, the old adage "time is money" applies now more than ever. So what happens when everyday operations are disrupted? According to the U.S. Labor Department, more than 40 percent of all companies that experience a disaster never reopen - and more than 25 percent of those that do reopen after a disaster occurs will close down for good within two years. But even if your company doesn't go through a major disaster, chances are high that it will experience the negative consequences of unplanned outages that make business as usual impossible.

The problem is amplified in challenging economic times, says Warren Sirota, a segment executive with IBM Business Continuity and Resiliency Services. "If the business is already suffering from lower revenue because of the economy and a significant outage occurs, the impact can be much more dramatic than during good times," he says.

Downtime quickly becomes revenue loss
Even though a crippling outage is almost certain to hit most companies someday, many executives running midsized organizations adopt an "it won't happen here" attitude. They would be wise to think again. A business may not be located on the coast where hurricanes strike, but power outages can still occur. According to Infonetics Research, most companies suffer between 300 to 1,000 hours of downtime a year.

"Resilience is the ability to take a blow and keep on going." Wildfires may not be prevalent where a business operates, but no company is exempt from the risk of a building fire. And while Mother Nature is responsible for many outages, downtime can also be caused by air conditioning failures, coffee machine malfunctions, bursting pipes, human error, insects, roof cave-ins and vandalism.

No matter the cause of a disaster, the accompanying costs quickly add up. In some industries, says Infonetics Research, downtime costs can equal up to 16 percent of revenue. And according to the analysis firm Meta Group, every hour of downtime carries an hourly cost of more than $200 for every employee on staff.

Unfortunately, many routine security and business continuity precautions are of little help once disaster strikes. For example, a high-availability server system is a great investment for protection against many types of outages. Yet if all of its components are located in the same area as the cause of an outage, it too will go down.

Understanding business recovery essentials
"Avoiding lost sales is the most significant benefit of having a good recovery plan," says Sirota, who suggests that understanding the importance of the five essential elements of business recovery can help midsized businesses stay afloat amid outages large and small. These five areas, he says, make up the most important parts of operating a business: people, facilities, information, networks and technologies. Planning for inevitable disruptions requires an understanding of the essentials of each of these five elements:

1. Keep people busy with business as usual
Planning for employees, business partners and customers makes up the most critical aspect of business recovery planning, Sirota says. Depending on the nature of the outage, you may need to figure out how and where people can continue working. For a brief period of time, everyone may need to work remotely, but you'll need to have these contingency plans ready, along with automatic notification to tell employees to work at home.

2. Make accommodations for facilities
Facilities make up an important part of business recovery planning. According to the U.S. National Fire Protection Agency, 35 percent of businesses that experience a major fire are out of business within three years. So, if having everyone work at home is not the best option for your business, recovery vendors can provide interim workplaces such as prefabricated mobile offices or buildings designed specifically for use in times of crisis.

3. Secure information before the storm hits
Data can make or break a business. According to the U.S. National Archives and Records Administration, 80 percent of companies without well-conceived data protection and recovery strategies go out of business within two years of a major disaster.

Backup tape and storage testing services can help ensure that critical data will be available after a major outage. Ideally, says IBM's Sirota, backups should be performed offsite, preferably at a facility far away from everyday operations. "The best way to protect the information for a small business is to use a remote data backup facility, which actually transmits the data either overnight or at scheduled times to a remote site where it is stored."

4. Prepare alternate networking routes
Can you keep networks open - or restore them quickly? What happens if you don't have local area network (LAN) or wide area network (WAN) connectivity for an extended period of time? Or phone connections and e-mail? In the worst-case scenario, your business may not have access to any of these vital services.

LAN and WAN contingency plans can include services such as remote data access so critical information can be managed and administered from any location. A failover system for e-mail is also highly recommended by Sirota, who notes that keeping in touch with partners and customers can make all the difference in remaining in business. These solutions can be activated in seconds, but keep in mind that these systems need to be in place prior to an outage.

5. Keep technology up-to-date and aligned with recovery plans
Keep tabs on how technology is applied within your organization. This can be as simple as making sure a security patch has been correctly applied. Otherwise, recovery plans can be easily derailed when new software and hardware is added or upgraded without testing the potential consequences of changes to business technology. That's why experts like Sirota recommend routine system checkups, as well as longer-term business continuity and resilience planning services. "Resilience is the ability to take a blow and keep on going," he says.

Regular checkups provide the best results
Sirota suggests that business recovery plans be tested annually. "Plans go out of date very quickly," he says. "Exercise your plan once a year. People find that's when they realize what they really need to do to improve their plans."

Many of these activities are best done with the assistance of an outside specialist company, Sirota explains, "A small business doesn't have the staff and the in-depth expertise available to do a full-blown plan." He adds. "Obviously they have some people responsible for their IT infrastructure, but typically those people are focused on the day-to-day operations and not all the ins and outs of what could happen in a disaster scenario."

But when the ins and outs of continuity planning are taken seriously, midsized businesses can bank on being competitive - which beats flirting with disaster when it comes to the inevitable periods of unexpected downtime.

Saturday, February 20, 2010

6 Tips For a 'Paperless' Office...

by Joseph Anthony
reprinted with permission from the Microsoft Small Business Center

Many people who use computers — whether it's for their home or business — are moving toward a "paperless" office. Simply, they are tired and overwhelmed by scraps of paper, clunky old file folders, envelopes — and they want to reduce the clutter.

Don't believe me? Take a look at how many messages are stored in your e-mail's in-basket. Now imagine how much paper would have been generated if they hadn't come to you from cyberspace.

Many folks have made at least a partial move to a paperless office. They're doing so this way: by using scanners instead of copying machines, sending electronic faxes instead of paper faxes, storing information electronically instead of in filing cabinets, giving friends, clients or vendors information on CDs or through Internet attachments instead of in bound folders. In short, they're getting greater return on their hardware, software and technology investments.

Want to join the anti-paper campaign? Save a few trees along the way? Here are six things to keep in mind as you move toward a paperless home or business office.

Without paper, make sure you're backing up files. In the traditional backup system, you would make a photocopy of a document and put it in a properly-labeled folder that can later be retrieved from a filing cabinet. Many people and businesses develop electronic filing systems that mimic the old paper systems, using Microsoft Word or customized programs for storing documents by type of document, client, project or other prioritization. But those files can't just be created — they have to be backed up as well. Backup solutions can include backing up to second hard drives, to removable drives or to Internet and off-site locations to minimize the risk of loss of data from a computer failure. (See this article about backing up your data.) So, the message here is to have a system in place for regular and consistent backing up of your information.

Realize that a paperless office doesn't happen overnight. Your home office or business won't go from all-paper one day to paperless the next. It's a progression. You might start out by scanning all incoming bills into your system, and then expand to include all general business correspondence. Initially, you might even find you're creating more work instead of less — especially if you run a business. Dr. Boris Klopukh, a urologist with Urologists Specialists, LLC, in Miami, has embraced the paperless transition wherever possible but finds that he often stores medical records electronically and still prints out a copy for himself. "I'm not even sure why I do it; it's just another way of backing up information that I'm still comfortable with," he says.

You'll need to rearrange your office — a good thing. There usually aren't tremendous savings of office space when you first start focusing on using less paper. After all, you still have all those paper documents housed in your big, clunky file cabinets. At some point during your transition to a paperless office, however, the difference in your physical storage space will become apparent. "My eyes were opened when I had to move from one location to another and I realized I had many filing cabinets that I was holding on to for no reason," says Ed Branson, a real estate broker and owner of Branson's California Property in Carson, Calif. Branson estimates that he has fewer than half as many filing cabinets as he used before he started scanning documents into his computer.

"Paperless" often really means "less paper." Yes, it's possible to scan all received documents into your computer, and to store all in-house documents in your system as well. You can virtually eliminate paper faxes by generating faxes on your computer and having in-bound faxes delivered to your computer system. You can even electronically sign or signature-stamp outgoing documents. But you're still likely to have some paper floating through your office. Not all of your clients or customers will want to be billed electronically. Some vendors will still want to communicate by snail mail. And tax and regulatory requirements could force you to either do some current business on paper or to keep hard copies of your past home or business records.

Everyone has to buy in. Merely saying as head of household, owner or manager of a business that you want those around you to embrace your paperless office doesn't make it so. Your partner, spouse, family members or staff has to buy into the transition as a permanently-new way of doing business. Change can be difficult. People who have been making photocopies, sending paper faxes, putting documents into legal sized folders — or saving mounds of mail and catalogues that they just can't part with — are going to have to change their perceptions. They will have to learn new routines that they already feel skilled at. "I think you really have to take them through the process a little at a time," says Klopukh. There's a learning curve which can be a significant learning curve — people have to understand how to use new software, some of which they haven't seen before, and learn to deal with a new environment, he says.

Realize that less paper is just the beginning of the payoff. The most visible impact of a move to a paperless office is the reduction in the cost of printing, mailing, shipping and storing paper. Over time, lots of other benefits should become apparent: Less time spent looking for paper lost in the shuffle. Fewer hours looking for bills, documents and, if you're in business, copies of client documents. The ability to access all sorts of information from computer files — in a matter of seconds without having to search your office. If you've got a home office that serves as a satellite office of a business, you can have access to all of your business files, using a product like Terminal Services or other software, even if you're not at your business location. In short, change can be hard — but it can be profitable.