Showing posts with label data back-ups. Show all posts
Showing posts with label data back-ups. Show all posts

Monday, 13 January 2014

Recent Computer Scam of ‘Significant Risk’


Remain Vigilant & Ensure Virus
Protection & Firewalls are up-to-date
Vigilance is always required when looking after your IT systems. There are always new scams trying to infiltrate your systems and damage them, or even steal from you. 
We regularly have to repair systems which have been affected so we encourage everyone to make sure they have up-to-date protection, but users also have to play their part.

One simple piece of advice is to never open an email with an attachment unless you know exactly who it is from and are expecting it. Be particularly careful of .zip or .exe files. Opening these can unleash a piece of software called a Trojan. Named after the Trojan Horse of Greek mythology, a Trojan needs to be allowed in to your systems but once there it can wreak havoc. One classic access route is the user opening a zipped (.zip) or executable file (.exe). An email with an executable file often looks like it contains a software program so might appear to be offering you something useful.

A cunning trick used by some viruses and Trojans is to send itself to everyone on an infected computer’s contact list. So you might receive an email from someone you recognise and think it is genuine, but it could actually be a mechanism for spreading a Trojan. This is why the advice is to make sure you are expecting the file, rather than merely recognising the name. If in doubt, call the person and ask if they deliberately sent it to you or not, before you open it.

One recent example was ‘cryptolocker’, which was serious enough for the National Crime Agency to issue a ‘significant risk’ alert. Cryptolocker encrypts files on your computer, such as photographs, documents, databases, PowerPoint presentations – anything that might be useful to you – and then issues a ransom notice on your computer, giving you 72 hours to pay up. If you don’t, the encryption key will be deleted which means you will permanently lose access to the files. It’s fiendishly clever but also an absolute nightmare if you get trapped by it.

We’ve written several articles in the past about protection, such as Spam and Viruses, Remote Security and Secure Remote Working, but the key pieces of advice are:
  • Make sure you have a high-quality protection system in place with virus protection and firewalls. Speak to a reputable IT support company if you need assistance.
  • Keep your protection up-to-date. A good system will do this automatically in the background but you will need to periodically renew it to maintain your protection.
  • Keep an offsite back-up and perform it regularly. In the event of being held to ransom by cryptolocker, for example, you could dump the old computer and reload everything you have on it to a new one from your back-up. It needs to be offsite and remote though, as cryptolocker will seek out any drives connected to your computer, such as external hard drives or cloud solutions and also encrypt files found there.
  • Exercise sensible precaution as you would do in your own home. Would you let an unexpected visitor into your home without checking their credentials first? You should use the same principles when letting files and data into your computer systems.

Tuesday, 5 March 2013

Seamless Mobile Working

IT Solutions for
Mobile Working
Many companies have an IT network based in the office but also have employees who often need to work away from the office. Whilst they might have mobile phones and tablets that enable them to work wherever required, there are a number of aspects that need to be considered, including:

  • Back-ups. Anything done on a laptop, netbook, tablet or mobile will not be backed-up unless you specifically do it – it’s not automatic in the way it might be in the office. So anything done on a device will be gone forever if you lose or damage it, unless you have consciously and specifically performed a back-up.
  • Sharing. Items stored on a server or computer at the office cannot be accessed via a remote device – unless you specifically make an arrangement to be able to access it. It can get very messy and annoying trying to access the documents you want.
  • Accessing company-wide systems. You might have a system or software used across the organisation, such as email, calendars or a specific application. Unless you integrate your mobile and IT systems the two will remain separate, meaning you can’t access the company calendar or the essential software you need when out of the office .
  • Business continuity and disaster planning. If something happens and staff can’t get into the office, perhaps because of weather disruption due to snow and ice for example, they might be able to work from home or another location - but only if you have set up the arrangements in advance for them to do so. It’s often too late to create this ability after the event has happened. We have created some useful articles to help you understand more about the alternative ways of doing this which you can access at What is Disaster Planning & Business Continuity? and An Introduction to Remote Working.

None of these issues are insurmountable though, and a good IT support company will be able to advise on the best solutions for your organisation and its circumstances. With the growth in mobile devices and remote working, we would suggest ensuring your IT company has suitable experience in integrating mobile and IT systems, otherwise you might find yourself dealing with multiple organisations and incompatible systems.

Wednesday, 14 November 2012

Sharing & Backing Up Across Multiple Devices

The Ability To Back Up Data
Across Multiple Devices
Mobile phones, tablets, netbooks and other such devices are great for allowing you to work remotely and not be tied to the office.

But the potential problem with them is that they are not backed-up, which means that if something goes wrong with your device, you might lose everything on it. So if you lose your phone or spill coffee on your iPad, you could have lost everything on it. Everything. Documents, contacts, photographs – the lot, never to be replaced.

There’s also the problem of not being able to access data or files on your server when you’re out, unless you specifically connect your device to it. So that important document you want to work on might not be accessible.

One of the solutions to this is called SafeSync Safesync from Trend Micro. It works by synchronising everything on your team’s remote devices, seamlessly and automatically in the background. So you can access files on your device and it will automatically be backed-up, giving you both access and security.

The cost is based on the number of users and storage space needed, so there will be a package available that suits your need.

SafeSync isn’t the only method we have of doing this but a big advantage is that you don’t have to guess which device something might be stored on. Have you ever wanted to find a particular tune or photo but can’t remember if it’s on your phone or tablet? With SafeSync it doesn’t matter as you can access it from any device, regardless of which one you thought it was stored on.