Friday, December 9, 2011

Lucky Stores Card Skimming Attack Prompts Awareness

More than 500 Lucky store customers have been victimized in a recent credit and debit card-skimming operation, announced Save Mart Supermarkets on Nov 23, 2011, who operates the Lucky chain.

According to a customer alert on the chain’s website, customers from 24 Bay Area stores have reported fraudulent or attempted fraudulent activities after using card-reading machines in the self-checkout lanes.

Customers who used a credit or debit card in a self-checkout lane at the identified locations during the months of October and November may be compromised.The company said it had learned that card-reading machines in the self-checkout lanes at 20 stores contained data skimming devices. The first tampered card reader was discovered during a regular inspection, the company said.

Law enforcement officials say the devices, which copy credit and debit card information, could be lurking anywhere you scan your card.  Card skimming is the illegal copying of information from the magnetic strips found on credit and debit cards. Card skimming is considered a more direct version of a phishing scam. Store clerks who skim cards may do so by having customers swipe their cards more than once, or by taking the card to another location within the store. Card skimming may also occur when a perpetrator rigs an ATM with a card skimmer. The end result of card skimming is unauthorized access to finances through the technique of illegal copying of debit and credit cards.

 Over the years, card skimming has become more sophisticated and more difficult for cardholders to detect. Card skimmers now employ features such as tiny pinhole cameras to record ATM users' PIN numbers, which can be transmitted along with card data to a remote receiver.


Consumer Education is Key

  1. Inspect the ATM – Avoid using ATMs in poorly lit or low trafficked areas. Experts often recommend choosing a bank ATM over standalone ATMs in public places. Look for new or suspiciously placed cameras and unusual signage. Don’t hesitate to walk away and use another ATM if something appears out of the ordinary.
  2. Protect your PIN – When entering your PIN, cover the keypad with your other hand to protect your private PIN from any cameras in the vicinity. False keypads placed over the real keypad are also a way scammers get PIN numbers so if the keypad looks different, move on.
  3. Be Cautious of All Card Swiping Devices - Criminals can also manipulate credit card swipe machines at gas pumps and retailers. The hand-held card swiping devices which are sometimes left unattended at restaurants, events and other public locations can also be tampered. Take a careful look at any device before swiping your card.
  4. Monitor your Statements – Even the most careful person can still fall victim to ATM skimmers so it is important to keep a close eye on your accounts. Look for suspicious charges and particularly the itemized breakdown of charges and debits. - Report Fraud Immediately – Report any fraudulent activity to your bank as soon as you discover it. Consumer protections for debit and credit cards vary but depend largely on when the fraudulent activity is reported.
While ATM theft isn't going to go away, the Global ATM Security Alliance reports that just .0016% of all ATM transactions worldwide are affected by crime or fraud. Additionally, with a little bit of care and attention, you can avoid these scams and keep your money.


Monday, November 28, 2011

Quick Tips for Replacing Technology


It's the time when businesses are finalizing their operating budgets for next year.  Planning for IT needs and equipment should be a part of this annual process.  In other words, don't wait until your equipment is obsolete and you can no longer order parts or worse; critical technology breaks down and interrupts your business operations for multiple days.

Here are some quick tips:

Assess Current and Future Needs - Build a three to-five-year plan, including employee and business requirements and compliance and productivity improvement needs.

Budget - Determine spending levels to support sufficient company needs and prioritize equipment replacement and devise backup plans in case revenue doesn't keep pace with expectations.

Performance - Can the equipment perform adequately now, with upgrades, or does it need to be replaced?

Installation and upgrades by a professional - Skilled consultants and employees make sure systems are properly set up, adding to improved operations and greater longevity.

Reputation - Ensure faster replacement of computers and systems that are customer- or client-facing. Consider the implications of failures or unprofessional appearance.

Disposal - Follow the rules for your state and consider extra costs and fees for planning purposes.



From upgrading your existing technology to purchasing new equpment and installing it properly, TeamLogicIT can help your company run more efficiently and increase its bottom line. For more information, contact Jon Simms at  MountainViewCA@TeamLogicIT.com or visit  www.teamlogicit.com/MountainViewCA.

Monday, November 14, 2011

Calling All Veterans: TeamLogic IT Waives Franchise Fee for Military Veterans in 2012

CompTIA’s Creating IT Futures Foundation to support new franchisees through its Apprentice Program

MISSION VIEJO, Calif.- November 9, 2011 - With veteran  unemployment rates higher than the national average and tens of thousands of service men and women returning from deployment in the coming months, TeamLogic IT is stepping up to award up to ten franchises to qualified military veterans by waiving  the $40,000 franchise fee to those who  join TeamLogic IT through the International Franchise Association's (IFA) VetFran program.

"This $400,000 investment demonstrates our commitment to supporting veterans through the VetFran program," said Chuck Lennon,president of TeamLogic IT, who is also the vice chairman of CompTIA, a non-profit trade association advancing the global interests of information technology (IT) professionals and companies. "The unemployment rate amongst veterans is already high and with so many more coming home TeamLogic IT is committed to providing opportunities to our nation's veterans to smoothly transition them into civilian life and the working world."

Focused on "veterans hiring veterans," this new program also includes a partnership with CompTIA and its Creating IT Futures Foundation to leverage its IT-Ready Apprentice Program, which will help franchisees in participating locations to find trained technicians who are also former military.  To help franchisees staff up, all of the costs associated with apprentice recruitment, training, certification, and online mentoring are subsidized by the foundation.

"In essence, the fundamental structure of the franchising industry and military is similar," added Lennon. "Franchisees must follow a proven business model to thrive  and military personnel are trained to follow standard systems to successfully complete a mission. The skills learned in  the military are completely transferable to the small business world - from logistics and operations to management and expertise, military veterans have the right framework to excel in the franchising industry."

Veterans have a proven track record of success in franchising.  According to a recent study based on U.S. Census data, there  are more than 66,000 veteran-owned franchise establishments in the United States, providing jobs directly for 815,000 Americans. In addition, more than 2,00 veterans have become  franchise business owners through the VetFran program, originally established in 1991. 

TeamLogic IT is a leading  national provider of comprehensive computer-based services for managing IT at today's small and medium-sized businesses, allowing the support of an IT department at a considerably lower  cost.

For further information regarding  TeamLogic IT or its  franchise opportunity, visit http://www.TeamLogicIT.com. For more  information about VetFran, visit http://www.vetfran.com.

Wednesday, November 9, 2011

10 Tips for Using Network Technology to Improve Efficiency

Published with permission from Cisco Systems

To keep pace in an increasingly competitive world, your business needs to run as efficiently as possible. "Sooner or later, any company not operating efficiently will be out of business," says Laurie McCabe, vice president of small and medium business insights and solutions for research firm AMI-Partners. Efficiency is even more important for small and medium-sized businesses, McCabe adds, because their resources are limited compared to large global companies.

Here are 10 tips for using network technology to help your business work more efficiently, cut costs, improve customer satisfaction, and stay ahead of the competition.

1. Give employees secure, consistent access to information. You have an advantage over larger competitors because you can react quickly to business changes. But you can quickly lose this edge if your company network is frequently down, sluggish, or unsecured. A secure, reliable network based on intelligent routers and switches lets your employees access the information and tools they need to keep ahead of competitors.

2. Deliver anytime, anywhere access to employees on the go. To stay productive on the move, your employees need to be able to reach the people and information they need—anywhere, anytime. With tools like virtual private networks (VPNs), your employees can work outside the office and still enjoy safe access to the business network.

3. Create effective business processes with partners. Some large companies make efficient, secure business processes a prerequisite for doing business with them. To meet the business needs of your partners, you need a secure, reliable network.

4. Make it easy to work together. Smooth collaboration between employees, partners, suppliers, and customers is a sure-fire way to boost efficiency while also reducing costs. An intelligent network lets your business take advantage of interactive calendaring, videoconferencing, unified communications, and other technologies for easy collaboration.

5. Enable employees to take their phone systems wherever they go. Missed calls create project delays, wasted opportunities, and lost revenues. With a networked voice and data solution, your employees can have one phone number that rings simultaneously on multiple devices, so customers reach the right person the first time. Your staff can access all their communications from anywhere, checking for e-mail, voicemail, and faxes from just one inbox.

6. Streamline customer communications. Delivering fast, knowledgeable service is the best way to keep customers satisfied. Linking your network phone system to a customer relationship management (CRM) solution is a great way to enhance customer communications. When a customer calls, a pop-up window with their records appears on an employee's IP phone screen, computer screen, or both.

7. Reduce unproductive travel time. All too often, time spent on the road is time lost. A networked phone solution that offers video calls and Web conferencing can help reduce the time and expense of traveling to offsite meetings and training sessions. Instead of spending time traveling, you can use the time to get work done with technology.

8. Employ a managed service provider. Is managing a network the best use of your employees' time? In some situations, it is advantageous to hire a managed service provider for network administration. Working with a managed service provider can free your IT staff to focus on other IT tasks and use their time more effectively.

9. Improve employee satisfaction. Aging phone systems and slow networks can frustrate your employees and annoy your customers. In some cases, an employee might become burned out and decide to move on. To help ensure that employees are productive and satisfied, your business needs a secure, reliable, and fast network.

10. Develop a long-term technology plan. The process of replacing obsolete hardware can interrupt your employees and bring the office to a standstill. You can minimize such disruptions by carefully determining short- and long-term business objectives and working with your network vendor to deploy technology that matches them.



When it comes to network technology, VoIP phone systems, and managing your technology, TeamLogicIT can help your company run more efficiently and increase its bottom line. For more information, contact Jon Simms at  MountainViewCA@TeamLogicIT.com or visit  www.teamlogicit.com/MountainViewCA.

Thursday, November 3, 2011

Medical Assist Robots Are Coming Soon....

We are all familar with special purpose robots, like robo-vac, that do cute things to make out lives easier. However, up to this point, there has never been anything practical to hit the market that serves a function even close to something that people truly need... until now. Toyota is expected to be releasing a line of robots focused on health care assistance for an aging populations. The robots are expected to be on the market by 2013. By my calculations, that is about 1 and 1/2 years away. Click on the picture below to watch the video and learn more about how technology will be used to assist in health care.



At TeamLogic IT, we don't rely on robots to assist you with the health of your computers and networks.  We used highly trained, Microsoft Certified technicians.  Our managed services package starts with a sophisticated 24 x 7 monitoring and management infrastructure that allows us to protect your systems all day, every day.  We perform routine mainteneance around the clock.  This keeps your systems running at their highest levels of performance and availability and your business running efficiently.

Taking the worry out of your technology.


Call us today or email
650.204.3150


Tuesday, November 1, 2011

Protecting Your Business from Disaster

Article submitted by Jon Simms, President of TeamLogic IT of Mountain View

Every business needs a disaster recovery plan. Regardless of your industry or location, the danger of losing your organization’s critical data is a serious concern. While a degree of risk is involved in decisions made in business every day, the choices managers make typically don’t jeopardize the future of their business. Not many entrepreneurs would knowingly drop fire or liability coverage, yet many companies operate without a viable disaster recovery (DR) plan in place to protect one of their most valued assets—business data and information.

The likelihood of your company burning to the ground or being decimated by a tornado may be remote, but catastrophes do happen and a business has to be prepared for these events. Consider the implications if your critical financial and customer data was lost and could not be recovered, or the information loss required the business to close for several days. Without an effective data backup plan and properly designed systems, the interruption and lost productivity could be disastrous. It’s impossible to put a price on the information stored in your company's information systems but, with the right preparation you won’t have to.

A number of federal and state regulations require businesses to ensure proper information management procedures are implemented and that the steps are followed. Courts have little sympathy for companies that lose vital information pertaining to a legal proceding; it’s no longer a defense and could lead to substantial penalties and fees. These consumers and stockholders protections are intended to prevent improper business practices and your company could also be subject to regulations applying to your state, municipality or industry. For example, the Sarbanes-Oxley Act was enacted to ensure proper business record management processes were being followed by publicly held companies. Similar regulations affect specific industries or markets, such as HIPAA (Healthcare Insurance Portability and Accountability Act), which protects and regulates medical information.

Remote Site Backup - Your Security Blanket

DR plans not only ensure a timely retrieval of information, but the continuity of your company’s operations. In order to maximize its effectiveness, at least one data backup system should be located off-site; in a separate building or with a third-party information specialist. Having all your business’ backup systems in one facility can be devastating should a fire or natural disaster destroy your operation. The Federal Reserve instructs financial institutions to locate their backup systems (and their highly critical data) at least 200-300 miles from main facilities; a good distance to reference for other companies.

While some organizations choose to place their off-site backup systems in their own facilities to maximize control and safety, assumed cost and security benefits may not be realistic. Experienced DR professionals are typically held to higher compliance and security standards than individual businesses. In order to serve a variety of industries and markets, these providers have to meet a number of state and federal requirements—including regularly scheduled audits and system upgrades. Third-party DR services invest in enhanced systems to manage and store business data for a number of clients, and offer security and other protections that could be cost prohibitive for individual companies.

Remember the Role of On-Site Backup

An on-site data backup system complements an off-site plan, but it should not replace it. An on-site storage solution starts with each computer, including the hard disc drive, CDs/DVDs, and USB memory devices. We all store data needed for daily work on these devices and media—though each business file should also be backed-up to the main storage systems. External hard drives are a great complement to individual computers, with affordable systems approaching 2 TB (2,048 gigabytes) that can also be uploaded to a network-based solution.

A more comprehensive option for on-site information backup is a NAS (network attached storage), which connects a hardware device and specialized software to a business network. These systems have dropped in price in recent years, while their storage capacities have escalated. Even with the implementation and support costs for trained IT professionals, a NAS system is a cost-effective solution for most businesses. These backup systems map all network-connected file directories and then schedule backup sessions based on the needs of the individual organization.

Build an Effective Disaster Recovery Plan

A disaster recovery plan should include a complete list of the precautions your company must take to minimize the effects of a disaster on the organization, as well as a detailed process for bringing critical systems back online. Ultimately the responsibility of the management team, it typically involves each employee in the organization. Each individual’s duties should be outlined in the document, including a timeline for completing assigned tasks.

In many respects, the DR plan can be more important than the original business plan. For that reason, companies commonly retain the services of an experienced consultant to develop and implement the program and spend upwards of 25% of their annual technology budgets in this area. While that investment may be seem large, recognizing the importance of disaster recovery in your business and implementing a proper plan are invaluable.

Every business needs a disaster recovery plan. Regardless of your industry or location, the danger of losing your organization’s critical data is a serious concern. While a degree of risk is involved in decisions made in business every day, the choices managers make typically don’t jeopardize the future of their business. Not many entrepreneurs would knowingly drop fire or liability coverage, yet many companies operate without a viable disaster recovery (DR) plan in place to protect one of their most valued assets—business data and information.

The likelihood of your company burning to the ground or being decimated by a tornado may be remote, but catastrophes do happen and a business has to be prepared for these events. Consider the implications if your critical financial and customer data was lost and could not be recovered, or the information loss required the business to close for several days. Without an effective data backup plan and properly designed systems, the interruption and lost productivity could be disastrous. It’s impossible to put a price on the information stored in your company's information systems but, with the right preparation you won’t have to.

A number of federal and state regulations require businesses to ensure proper information management procedures are implemented and that the steps are followed. Courts have little sympathy for companies that lose vital information pertaining to a legal proceding; it’s no longer a defense and could lead to substantial penalties and fees. These consumers and stockholders protections are intended to prevent improper business practices and your company could also be subject to regulations applying to your state, municipality or industry. For example, the Sarbanes-Oxley Act was enacted to ensure proper business record management processes were being followed by publicly held companies. Similar regulations affect specific industries or markets, such as HIPAA (Healthcare Insurance Portability and Accountability Act), which protects and regulates medical information.


Don't wait until bad weather arrives or your office experiences an accidental flood.  The impact to your day-to-day business could be more severe if you don't have a trusted IT partner to assist you with your disasater recovery hardware and software needs.

TeamLogic IT of Mountain View, CA, is part of a nationwide network of computer consultation and managed services businesses providing outsourced IT services. Small- to medium-sized businesses rely on TeamLogic IT to handle a broad range of services from urgent computer repair and proactive maintenance to the installation of entire networks and more. For more information, contact Jon Simms at JSimms@TeamLogicIT.com or visit www.TeamLogicIT.com.

Wednesday, October 26, 2011

5 Tips For Working With A Managed Service Provider

SMBs often rely on outside IT help. Here's how to get the most out of relationships with third-party providers.

By Kevin Casey, Information Week, September 13, 2011

It's no secret that smaller businesses often need a bit of outside help to get things done. That's why many of them outsource at least part of their IT function to managed service providers (MSPs) or similar firms.

But outsourcing doesn't--or at least shouldn't--mean forgetting about IT entirely. As with any other productive business relationship, small and midsize businesses (SMBs) can take some relatively pain-free steps to ensure they get the most out of their MSP. In an interview, Vince Plaza, VP of information technology at TeamLogic IT, served up five tips for doing just that. Plaza's firm is a national IT provider that focuses on SMBs.

1. Develop trust by asking questions. For some SMBs, the appeal of managed IT services is the ability to offload a critical business need and focus finite resources elsewhere in the company. But owners and executives that completely turn off their brain's tech sector are setting themselves up for frustration. Plaza said trust between company stakeholders and the MSP is key--and notes that trust is built, not bought. The most straightforward path to an honest relationship: Ask questions of any prospective MSP early and often.

What kind of infrastructure, applications, and other technologies do they typically support? What kind of tools do they use internally for things like helpdesk and other functions? Are their written agreements easy to read? How do they respond to different types of customer requests? And so forth. Don't just take answers at face value: Do a bit of homework (the Web makes this fairly easy) to ensure you understand and are comfortable with their approach. Don't worry--you need not get stuck in the weeds.

"I would like to find out from the partners I might be engaging with: What are you using to deliver this to me?" Plaza said. "I don't need the gory details."

An example: If you're potentially interested in desktop virtualization, ask prospective MSPs if and how they support virtual desktop infrastructure (VDI). They might only support certain vendors--say VMware, but not Citrix or Hyper-V--or might not have much VDI expertise at all. Better to find that out now. For some SMBs, the appeal of managed IT services is the ability to offload a critical business need and focus finite resources elsewhere in the company. But owners and executives that completely turn off their brain's tech sector are setting themselves up for frustration. Plaza said trust between company stakeholders and the MSP is key--and notes that trust is built, not bought. The most straightforward path to an honest relationship: Ask questions of any prospective MSP early and often.

2. Treat your MSP as a virtual CIO--even if you are the CIO. you are the CIO. For some SMBs, the decision to outsource is fairly simple because there is no internal IT department. For others--especially growing and midsize firms--there's likely at least one (if not more) people charged with managing the company's technology. Don't let that cause territorial fears around job security--this inevitability leads to negative outcomes.

Clearly define roles and responsibilities up front. A good MSP will be will be willing to defer to an in-house IT executive, without stepping on toes. Let them know how they can best do that. Plaza gave as examples work overflows, vacation coverage, and other supporting roles--or the "call on us when you need us" approach. Avoiding an adversarial position from the outset will give the MSP a chance to prove its value--and if it doesn't, you'll be able to make an informed, well-reasoned change.

3. Communicate on a regular basis. Speaking of open communication: Plaza recommends meeting on a regular basis. This doesn't mean daily or even weekly--you can still realize the upside in outsourcing and focus your energies elsewhere. But treat your MSP in a similar manner to an internal department. Keep them in the loop as appropriate about strategic plans, changes, and other information that could impact the company's technology needs. Doing so enables the MSP to anticipate and adapt rather than constantly play catch-up. Plaza suggested monthly or quarterly reviews, though the timetable will depend on your business. Speaking of open communication: Plaza recommends meeting on a regular basis. This doesn't mean daily or even weekly--you can still realize the upside in outsourcing and focus your energies elsewhere. But treat your MSP in a similar manner to an internal department. Keep them in the loop as appropriate about strategic plans, changes, and other information that could impact the company's technology needs. Doing so enables the MSP to anticipate and adapt rather than constantly play catch-up. Plaza suggested monthly or quarterly reviews, though the timetable will depend on your business.

"Make sure that things are running fine, the managed services are delivering what they're supposed to, and that any issues that have come up are addressed," Plaza said. "Also use that as an opportunity to discuss: What's the next phase of your business?"

4. Prioritize security. According to Plaza, one of the biggest technology risks inside SMBs today is security--or lack of it. Among other problems, this can lead to the MSP spending countless hours addressing security issues that result from a lack of awareness or care. They could be using those resources in more strategic ways on your behalf.

"The SMB owner has to have some level of comfort with security and wanting to bring to their business the type of security that typically you'd see in the large enterprise," Plaza said.

He doesn't mean you have to spend money like a larger company, but rather adopt similar policies and procedures. Even if you outsource some or all of your IT needs, smart security starts internally. (Don't know where to start? Consider these four basic steps toward better security.) According to Plaza, one of the biggest technology risks inside SMBs today is security--or lack of it. Among other problems, this can lead to the MSP spending countless hours addressing security issues that result from a lack of awareness or care. They could be using those resources in more strategic ways on your behalf.

"The SMB owner has to have some level of comfort with security and wanting to bring to their business the type of security that typically you'd see in the large enterprise," Plaza said.

He doesn't mean you have to spend money like a larger company, but rather adopt similar policies and procedures. Even if you outsource some or all of your IT needs, smart security starts internally. (Don't know where to start? Consider these four basic steps toward better security.)

5. Act fast if problems surface. Ideally, regular communication will minimize potential problems with your outside IT provider. But things never go perfectly to plan, do they? If issues do arise, address them immediately with the provider. "Bring it up right away so that the MSP has some way of looking at the situation--and the proper amount of time to provide answers and mitigate whatever it was," Plaza said.

Raising issues quickly and escalating--and giving them an appropriate amount of time to be resolved--will often lead to a positive resolution. And if it doesn't, you--and the MSP--will have hard evidence that it might be time to explore other options.

"Hopefully, it doesn't get to that point," Plaza said. "When it does, you've done what you can to ensure it's an amicable split and you can fire your MSP without incurring a lot of pain."

Ideally, regular communication will minimize potential problems with your outside IT provider. But things never go perfectly to plan, do they? If issues do arise, address them immediately with the provider. "Bring it up right away so that the MSP has some way of looking at the situation--and the proper amount of time to provide answers and mitigate whatever it was," Plaza said.

Raising issues quickly and escalating--and giving them an appropriate amount of time to be resolved--will often lead to a positive resolution. And if it doesn't, you--and the MSP--will have hard evidence that it might be time to explore other options.

"Hopefully, it doesn't get to that point," Plaza said. "When it does, you've done what you can to ensure it's an amicable split and you can fire your MSP without incurring a lot of pain."

http://www.informationweek.com/news/smb/services/231601302



We give you expertise at whatever level your business requires, and with our national  network, we give you the benefit of a deep knowledge base and professionals in many locations.  On the local level, we give you great customer care and communication. Piece of mind...isn't that priceless?

For more information, contact Jon Simms at  MountainViewCA@TeamLogicIT.com or visit  www.teamlogicit.com/MountainViewCA.

Wednesday, October 19, 2011

The Real Cost of System Downtime

by Jon Simms, President of TeamLogic IT of Mountain View, CA

If your computer systems stopped working at this very moment, how long would it take before your business operations came to a screeching halt? If your organization doesn’t have a quality technical resource, it wouldn’t take long. From the loss of email and Internet applications to a potential interruption in communications (i.e. phone, instant messaging and teleconferencing), a breakdown in computer systems can be extremely counterproductive and costly to your business.

 Outages are an Operations Cost
The day-to-day responsibility of these systems may lie with your IT team or service provider, but the ultimate accountability rests with a business’ management team. The company’s leadership needs to be committed to a proactive technology plan, with contingencies built in to ensure the organization remains productive at all times. By minimizing downtime, the organization can employ its people and resources more efficiently; which is especially crucial in competitive markets and industries. A proactive technology plan allows the management team to focus on parts of the business that will help grow revenue and profits!

How much does an hour of downtime cost your company? The exercise below starts with a calculation of the combined hourly wage (Don’t forget to include the benefit packages) of all the organization’s employees. This price may vary by hour of the day (shift staffing), so adding that step can be helpful. Then you can determine the hourly rate for other business expenses, by dividing those fixed and variable costs by the hours in your operating day. This information should be easy to obtain from your human resources department and accounting software (or accountant).


What is the Productivity Cost in $$?
When you consolidate these hourly rates into a single operations cost, it illustrates the business expense incurred by shutting down for the day but still paying all your employees. While a complete company shutdown is typically associated with a catastrophe or freak storm, a computer system failure could bring about a similar productivity loss. The calculated hourly operations rate is essential to understanding the value of proactive business system management. If a new service can reduce your downtime significantly, how much is that worth to your organization? That investment may be hard to justify unless you’ve experienced a severe outage in the recent past, but each business still should understand the potential liability of such a disruption. Here is an example of this calculation:

Business Expenses (all numbers monthly)
Employee wages/salary per month $30,000
Rent $7,000
Utilities $2,000
Other business expenses $7,500
Total $46,500
Divide by monthly hours of operation $46,500/200= $232.00 per hour

This example demonstrates the cost to your business if it is unable to operate for an hour. If the outage were an entire ten-hour business day, the expense associated with that downtime would be $1,650.00! This is an important figure to reference when you are evaluating the price of solutions that can reduce downtime of your business. But the opportunity cost (lost revenue) is actually much larger than this number, and needs to be included to give you the REAL cost of downtime. When your business is unable to operate, the ability to generate revenue is greatly diminished, whether you rely on foot traffic or phones and Web sales.

Develop a Plan for Your Business Crittical Systems
 Calculating that cost can be difficult to determine, but one simple method is to estimate the average income you lose for each hour of a shutdown. If the business’ average monthly revenue is $50,000 and the hours of operation are approximately 200 hours each month; the revenue the company generates is $250.00 each hour (the opportunity cost). If our example company is technology-dependent, it loses approximately $415.00 every hour its systems are down! Even if a computer failure doesn’t close the business for a significant amount of time, consider the lost productivity costs if it experiences a 50% reduction in network speed. In the example company— if this issue persisted for an entire workday—it would lose $2,075.00.
Whether a company experiences significant problems with its current systems or is just looking to avoid future issues, understanding downtime costs is essential. When implementing the latest technology or a new service, this figure helps a business understand the savings (or losses) associated with the project. Knowing those costs allows the organization to prioritize emergency response needs and evaluate future plans. It becomes truly critical when discussing response needs and service level agreements with providers who will support your critical systems.

If you would like to get a handle on computer downtime to protect your business and make it more productive, give us a call at 650-204-3150.  Our Business Continuity and Managed Services will give you the piece of mind that your data is safe, your systems are running well and your company is operating at peak performance.  Isn't your business worth that?

For more information, contact Jon Simms at  MountainViewCA@TeamLogicIT.com or visit  www.teamlogicit.com/MountainViewCA.

Wednesday, October 12, 2011

Finding the Right IT Services Provider

by Jon Simms, President of TeamLogic IT of Mountain View, CA

Dependability is Key in IT Service
When it comes to evaluating computer and network support options for your business, dependability is typically one of the top factors. The first measure of IT service quality is determining if your provider shows up when needed—and on time. With advancements in remote support services, providers are now able to proactively monitor your systems, which minimizes the need for expensive onsite visits and alters the dependability equation. Despite those developments, selecting an advisor for your computers, network, and support is still a matter of trust.

Finding a Qualified IT Professional
As technology continues to increase in complexity and your organizational needs escalate (along with a greater number of regulatory requirements), relying on a qualified IT professional is more important than ever. I’m not referring to individuals who can only repair computers when they break down, but skilled consultants who can effectively assess the needs of your business and suggest the best ways to address them. They should know how to implement, service, and repair your company’s current systems, and should be able to adapt (or upgrade) that technology to meet future growth goals.

A trusted adviser is a technology consultant who comprehends and executes best practices for organizations of all kinds. These individuals (and their organizations) should be capable of addressing the unique needs, goals, and opportunities of your company, realizing that no two businesses are the same. While the basic technology doesn’t differ significantly among organizations—laptops, desktop computers, servers, networks, email programs, and office applications—the way it's employed and the corresponding tools may differ significantly.
The Difference is a Trusted IT Adviser
For example, a financial firm and a large news organization might have similar computer systems, but a trusted adviser wouldn’t assume their technology was deployed the same way. He would spend time assessing the business goals of each company, using a professional protocol to determine the unique needs and goals of each. The financial firm may be planning to open a second office, which would require network enhancements to securely link each facility. The newspaper business, on the other hand, may need to minimize their computer costs to offset declining subscriber revenue. Proposing similar infrastructure enhancements for each company would not be in the best interest of either of these clients and the success of each, in part, depends on their ability to effectively leverage new technologies.

If you want to find a “trusted IT adviser”, you’ll be hard pressed to find a national or state-wide list using that term. There are association and regional directories for IT service providers, but discovering one with the knowledge and consulting skills that match your specific business needs will require some additional investigation. The methods required to find and validate qualified candidates may differ between industries and geographic areas, but the best way is to spend time with some top prospects and discuss how they will address your business needs.

Portfolio of Service

The first step when researching technology providers is to determine the specific services these companies offer, such as whether they provide proactive support and services. This is a determining factor for many businesses, helping them ensure system downtime is minimized and that the health of the technology infrastructure is maintained at acceptable levels at all times. While it’s not a deal breaker, a managed IT service (proactive support) allows the technical adviser to map your network-connected computer systems and provide specific performance details before suggesting any changes. It’s quite similar to the diagnostics a car repair shop uses to identify precise problems with your engine, rather than replacing parts until the knocking stops. In addition to computer assessment, managed services can monitor network and device performance on a continuous basis, allowing a provider to fix issues before they become serious enough to disrupt your business operations.

Building the Right Strategy for Your Business
The complete list of IT and business consultation services is too large to include here, but the following are several common areas to consider when evaluating an IT provider’s portfolio.

  • Managed IT (proactive monitoring, remote remediation and support)
  • Network (design, integration, optimization)
  • Hardware (procurement, installation, support)
  • Business systems (software consulting, selection, process improvements)
  • Software applications (installation, patch management, removal)
  • Security (assessments, firewall, desktop, network, email)
  • Email management (servers, security)
  • Disaster recovery (remote and on-site backup, restoration)
  • IT support (help desk, warranty repair, printer repair) 
Due to unique industry or particular business needs, you may require a technical team with a specific expertise, such as a hospital needing someone to implement a medical records system, or a bank requiring support for its electronic checking solutions. Ask prospective IT partners to describe their expertise and understanding of your line of business, and be sure to ask for client references that back that up!



TeamLogic IT of Mountain View, CA is part of a nationwide network of computer consultation and managed services businesses providing outsourced IT services. Small- to medium-sized businesses rely on TeamLogic IT to handle a broad range of services from urgent computer repair and proactive maintenance to the installation of entire networks and more. For more information, contact Jon Simms at  MountainViewCA@TeamLogicIT.com or visit  www.teamlogicit.com/MountainViewCA.

Wednesday, October 5, 2011

Phishing a Significant Security Concern for Small and Medium-Sized Businesses

Theft of SS Numbers
As more small and medium-sized businesses make use of online services including email, banking, credit card merchant account management, or the manaagement of their company's website, thethreat of online identity theft or "phishing" may grow into a significant security concern for these businesses. In fact, according to the Anti-Phishing Working Group, a consortium of more than 1000 firms, including a majority of the top U.S banks and ISPs, phishing reports doubled from November 2004 through November 2005 from 8975 to 16882. In addition, the use of password stealing software applications used along with email phishing attempts quadrupled from 260 instances in April 2005 to 1044 in November 2005.

Furthermore, according to a survey conducted by the FBI with over 2000 organizations, 64 percent suffered a financial loss from computer security incidents over a 12-month period. The average cost per company was more than $24,000, with the total cost reaching $32 million just for those surveyed. In addition, the overall cost to Americans through identity theft reached $52.6 billion in 2004 compared to only $1 billion in telecommunication fraud. The survey also reveals that computer theft and computer-based financial fraud ranks second behind worm, virus and Trojan horse computer threats.

What is Phishing

The term “phishing” comes from the analogy that Internet scammers use email as bait to fish for password and financial data from the sea of Internet users. Since hackers have a tendency of replacing "f" with "ph,” the term phishing was derived. The term has also evolved over the years to include not only obtaining user account details but also access to all personal and financial data.

In practice, phishing is a form of Internet fraud that aims to steal valuable information such as credit card or social security numbers, user IDs and passwords. Generally, a fake website is created almost identical to that of a legitimate organization, typically a financial institution such as a bank, credit card or insurance company. An email is sent requesting that the recipient visit the fake website and enter their personal details, including security access codes and account information.

The Threat to Small and Medium-Sized Businesses

In the results from a survey conducted by Trend Micro, a provider of network antivirus and Internet content security software and services, 43 percent of respondents have experienced an email-based phishing threat and half of all U.S. businesses with less than 500 employees have encountered phishing at work. The survey goes on to state that at least one-third of these respondents said they lost personal information, experienced drop-offs in productivity or were victims of identity theft; one-fifth said they also lost company information. Respondents also reported the most increases in phishing attacks were among small-business users.

What Do Phishing Scams Look Like


Legitimate links go to Spoofed sites
Over the last few years, phishing scams have become more and more sophisticated. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate websites. To make these phishing e-mail messages look even more believable, the scam artists may use legitimate links that appear to go to the actual financial institution’s website, but actually take you to a phony scam site or possibly a pop-up window that looks exactly like the official site. These copycat sites are also called "spoofed" websites. Once you're at one of these spoofed sites, you might unwittingly send personal information to the phishers. They then have the ability to use your information to purchase goods, apply for a new credit card, or otherwise steal your identity.
While there is no one solution to protect against phishing attempts, businesses should use and keep up-to-date antivirus and spyware protection as well as spam blocking software. In addition, businesses are urged to take great care when receiving email from insurance, credit card companies or banks, as few genuine financial institutions use email to communicate in this manner. Consider outsourcing. While ISPs offer security services for companies, a professional managed services provider can tailor their services specifically for the small and medium-sized business, providing similar levels of IT support previously found only in large companies.



Are you concerned about the secuity of your data?  Call TeamLogic IT at 650.204.3150 for a free consultation.  We use only the best tools available and can monitor your systems 24x7.  Whether it is virus protection, intrusion prevention, insuring regulatory compliance, or helping your company to establish and document your security policies, our trained security experts can help you through whatever security concerns you have.

Taking the worry out of your technology.