Like currency, your business data is life-blood; and there are many ways that business data can be lost.
Why is a reliable back up process necessary? Small to medium sized business are statistically more likely to lose data and it can be devastating. Here's why:
There are a series of ways to help prevent the loss of business data such as having up to date anti-virus and software security plus simple procedures and cyber security awareness for staff. But no matter what and how much, these will not entirely illuminate the risk. Therefore, a simple but reliable back up plan must be part of any business's procedures. The back up process will then ensure that in the event of data loss, you can recover an up-to-date duplicate record of files. And just to confirm, here are many simple (and not so simple) ways that your business data could be lost forever:
Chances are, one or more of these have happened to you, or you know some one who has experienced one of these.
The 321 Back up process
You probably know about it, it's been tried and proven for many years but still to this day, not everyone has a reliable back up process in their business. The 321 back up process is simply:
3 separate copies of files
2 on different local devices devices/medium
1 offsite (NOTE: drop box, google drive or one drive are not strictly back up because if you delete a file on your device, it will also delete in the offsite folder).
Here is an example of an effective 321 back up process. Your business has an onsite server with 5 onsite PC's on the network and 3 offsite laptops also connected to the server via the internet. All files reside on the server. There is a hard drive back up on site hooked to the server that copies all the files. There is also a back up "in the cloud", where the files are updated and stored offsite. In this example, there are 3 copies of the files, 2 of which are on independent onsite devices and 1 copy is offsite. There can be variations on this theme depending on the configurations of desktops, laptops and users but the ratio of 321 shouldn't change. The challenge is to configure your 321 process so that backups occur at an appropriate frequency through a mix of automation and procedures.
If you would like to discuss your computer and network security or if you would like to know more, please contact Loyal I.T. Solutions on 02-43370700 or email Michael Trimblett
LOYAL I.T.- We specialise in I.T. solutions for your business; providing software, hardware, networks, configurations, consulting and support for 15 years from their base on the Central Coast.
|Posted in: Services Security IT IT Consulting|
The chances are that if you experience any form of data breach, then not only is your company's information at risk but you are also at risk of breaching the privacy act. It's often assumed that data breach only means being hacked by a sophisticated gang from a rogue nation trying to influence votes or steal national secrets; It is more often associated with the wrongful acquisition of personal information that is residing in the databases of small to medium-sized businesses.
From February 22nd this year, the federal government has amended the Notifiable Data Breaches scheme under Part IIIC of the Privacy Act 1988. It now includes mandatory reporting if your business:
You might be surprised at what constitutes an eligible data breach and how a breach could occur. An eligible Breach refers to the unauthorised access, loss, or disclosure of personal information that could cause serious harm to the individual whose personal information was involved in the data breach.
"Serious harm" in this context, may include physical, psychological, emotional, financial or reputational harm. This affects any business who holds personal information about their clients such as medical records or credit card details.
Examples of data breaches can be in the form of:
Data security is an on-going issue for all businesses and this change to the privacy act has added another dimension to the responsibility of most businesses.
To notify of a data breach, visit the Office of the Australian Information Commissioner's (OAIC) website and fill in the "Notifiable Data Breach Form". If a business fails to disclose a data breach on more than two occasions, the OAIC can seek a penalty of up to $21M.
Digital information loss is by far the hardest to protect against as hacking attempts can take place from anywhere at any time. Simply clicking on the wrong email or visiting a compromised website can lead to your customer's data being leaked.
LOYAL I.T.- We specialise in I.T. solutions for your business; providing software, hardware, networks, configurations, consulting and support for 15 years from our base on the Central Coast.
|Posted in: News Services Security IT Consulting Networking Security|
Loyal I.T. Solutions will be closed from midday December 22nd through to 8:30am on Monday January 8th. We will have select members of our team available for emergencies between these two dates. Should you require emergency assistance during that time, please contact our office on 02 4337 0700 for instructions.
We thank all of our clients for your continued support during 2017. Wishing you and your families a very Merry Christmas and all the best for 2018.
|Posted in: Misc|
It's happened again. Yahoo reports there has been a huge data leak of the email addresses and passwords of 771 million people. I did not escape the breach, nor did many of the email addresses we use at Loyal I.T.
Currently, it is unknown where the breach occurred, but it is important for everyone who has been breached, to update your password to something new and most importantly, something strong. Strong passwords are generally over 8 characters long, contain a capital letter, a number and a symbol.
To check to see if your email address and password have been compromised, visit https://haveibeenpwned.com/ and enter your email address. If you have been pwned (the internet's cute way of saying "owned") then it is suggested to change the password for that email account and for any accounts you use that email address to log in to.
With any luck you won't see:
If you need assistance with updating your passwords, please contact us on 02 4337 0700.
|Posted in: Security|
Michael T & Naomi piled into Brendan's car on a Tuesday morning recently, ready to take on the "big smoke" Darling Harbour, Sydney to attend the annual I.T. trade show CeBIT.
For Michael & Brendan, this was not their first time however, for Naomi it was. Naomi was busy questioning the guys on the drive down about all things I.T. in the hope to get her "geek on".
We arrive & it is on! There were multiple speakers, stands galore & geeks (I mean, I.T. like people) everywhere!
Our first stop was the speaker who discussed "IoT" meaning "Internet of Things". This was actually really interesting speech, in short, the Internet of Things refers to the growing network of connected objects that are able to collect and exchange data using embedded sensors. Cars, lights, refrigerators, watches and other appliances can all be connected to the IoT.
Some applications are:
- Smart homes ie Lights that can be dimmed, T.V systems that can be programmed, air conditioners that can be switched on etc all from your mobile phone.
- Wearables ie Smart Watches like the Fitbit and Apple Watch
- Connected Car ie streaming music from the internet in your car
The speaker also touched on how the cost of I.T. infrastructure has reduced dramatically over the years, one key point he made was back in the day, it would cost approx. $10k for 1 TB of data storage in the Cloud, now it costs around $100.00 for 1 TB of data storage in the Cloud.
After this talk, and being wowed with an I.T. overload, we needed to top up our energy reserves with an impromptu yummy lunch on the Harbour edge, where we spared a thought for our colleagues who were holding the fort in our absence..
Recharged and ready to go, we were straight back into the trade show, where we were dazzled by the robotic dog.
Got to play with Lego.
We tried to win a cute, fluffy evil Watchguard Ransombear but, we completely bombed out.
Got to sit in a driverless Pod car that is going to become the way we travel in cities in the near future.
and we had an amazing (lifelike) drawing of the "A Team" done on the Smart Kapp board by newspaper cartoonist, Peter Byrne.
This whiteboard could live stream the image to a nearby TV screen and when done, the image emailed in PDF format to selected email addresses. Amazing technology.
All in all, we had a great day learning all about the IoT, or as Microsoft like to say "IoYT - Internet of Your Things".
|Posted in: Team News Misc IT|
for enquiries or log a job.