3 Tips to Shield Your Business From A Data Disaster

Take a moment to consider your answer to this question, “What would you do if all of your business’s data was somehow lost overnight?” How would you react, and what would you do about it? Your data is valuable, so much in fact that your business would be lost without it, and likely wouldn’t be able to run properly.

A surprising amount of small businesses don’t have any disaster recovery plan set up for the worst-case scenario, thinking that something like that could never happen to their business. But, here’s one more question: “Do you want to take that risk?” The responsible answer would be “no”, because there’s a lot more at risk than just your company’s data. If your data were compromised, it could mean that all of your clients’ personal information could also be at risk.

Thankfully, Michell Consulting Group is here to give you three tips and tricks that will keep you from questioning the future of your data. While our Backup & Disaster Recovery (BDR) solution can completely get rid of any worries you have about keeping your data safe, there are a couple of things you can do for yourself to ease your mind.

Prepare for the Worst, But Hope for the Best
If you prepare for the worst, you know that you’ll be ready for anything, come what may. This way, even if you are struck with small inconveniences, you will be ready for them. Even if the worst happens, you’ll be ready for that, too!

The first step in creating this plan would be to take an inventory of all of your data systems, storage, and hardware. Once you know what you have and what you need, it will be easier to figure out what the best plan of action is for backup planning. You aren’t alone with this. Michell Consulting Group would be happy to help you out. We can advise you every step of the way of your data backup and recovery journey.

The Best Offense is a Good Defense
Perhaps the best way to prepare for the calamity called data loss is risk prevention. We see this all of the time – in order to keep robbers out of your house, invest in a security system, or to keep your home safe from burning down, turn off the stove and electrical before you leave. The same can be said for data recovery. However, risk prevention is easier said than done.

Michell Consulting Group can hook you up with all sorts of methods of protecting your data, like firewalls and antivirus software. We can also make sure that your protection systems are kept up-to-date with our remote patching services.

Is It Really Gone?
You might recall telling your mother that something is gone, or lost. She didn’t believe you, so she started snooping around herself. Before long, she would find what you were looking for, saying it was there the whole time. You would get mad because you looked foolish, but then you realized that you just weren’t looking hard enough.

Before you get too flustered over the prospect of lost files, make sure that it is indeed lost or corrupted before taking any drastic measures. Sometimes people can misplace files, and with today’s growing technology, it isn’t surprising. Who knows – maybe Michell Consulting Group can even help you find the files, too!

Call in Michell Consulting Group!
Notice a pattern here? Anything related to data backup and recovery is covered with Michell Consulting Group’s BDR solution. You can integrate all kinds of different measures to prevent data loss, but you don’t want anything less than the best for your backup needs. Call Michell Consulting Group at 305.592.5433 to work with professional IT technicians who will protect your data at all costs!

The SAP Experts Symposium – Michell Consulting Group is Proud to Welcome the Brightest Minds Working with SAP

On Tuesday, May 6, 2014, we had the pleasure to meet with our partners and learned about the market-leading products such as B1 Advanced Solutions, Shaperlight, DiCentral (Alligacom), and Valogix Inventory Planner. Michell Consulting Group was able to tie them all together to get the most out of their knowledge for the attendees’ business benefits. We were able to share real-world examples of how using SAP and the Certified Partners could increase productivity, profits, and customer satisfaction.

SAP Expert Symposium Agenda and Speakers:

  • 8:30 AM – 9:00 AM: Registration and breakfast
  • 9:00 AM – 9:30 AM: Welcome and Introductions, John Del Rio , Michell Consulting Group
  • 9:30 AM – 10:30 AM: Optimize the Value of Property, Plant and Equipment with Business One, Joe Lewis, B1 Advanced
  • 10:30 AM – 10:45 AM: Break (15 mins)
  • 10:45 AM – 12:00PM: Maximizing Profits: Best Practices in Inventory Planning Using SAP Business One, Tom Glacken, Valogix
  • 12:00 PM – 1:00 PM: Lunch and Networking
  • 1:00 PM – 2:00 PM: Managed EDI for SAP Business One,  Rocco Nobile, DiCentral
  • 2:00 PM – 2:15 PM Break (15 mins)
  • 2:15 PM – 3:15 PM: Warehouse Management, Tim Singleton,  AchieveIT 
  • 3:15 PM – 3:30 PM: Break (15 mins)
  • 3:30 PM – 4:30 PM: “Sharperlight – Simplified Business Intelligence”, Luiz Rizo, Michell Consulting Group
  • 4:30 PM – 5:30 PM Q&A/Networking

Check out the pictures here!


Social Media Scammers Play Dirty

Ever since the public has been logging on to the Internet, certain people have been using the Internet to take advantage of others. Whether it be through scams, viruses, malware, phishing, or a whole slew of other dangerous activity, cyber criminals have been very good at making Internet security an industry on its own. With the colossal popularity of social networks like Twitter and Facebook, miscreants are capable of targeting even more users than ever before. On top of that, their methods seem to be hitting people where it hurts. Learn how you can prevent falling into one of their traps.

Cyber criminals are adaptive – they target weak points and vulnerabilities not just in technology, but the vulnerabilities in society as well. Think about the infected attachments that used to get passed around in chain emails, or the Nigerian Advance Fee scams where a complete stranger would offer you ‘the sum of $40 million U.S. dollars’ if you send them a few grand to unfreeze their bank accounts. I hope that very concept sounds like hogwash to everyone, but believe it or not, folks fall for it.

Social Media scams work the same way; they target both a vulnerability in the technology and spread it by focusing on a human weakness. One recent example is the death of Steve Jobs – cyber-crooks took advantage of this unfortunate headliner and fabricated a fake Steve Jobs Charitable Foundation asking for donations to help young programmers. Other scams include offering free iPads, but the end results really just tricks you into clicking on a link and submitting your personal information. Other scams are designed to peak your interest with topics like discovering who is viewing your Facebook profile, or claiming that there are pictures of you or your friends here that ‘you won’t believe.’

Often, clicking on these links will spam your friends with the same message, which contributes in the spreading of the scam. The links can even take you to a site that can infect your machine with malware, or trick you into sharing private information with the scammer. On top of that, it can install an app on your Facebook account that will continue to hijack your account and spam your friends. The problem is when you see something posted by a friend, even if it is suspicious, your guard is down. This means scams like this spread faster than wild fire.

What to Look For

If you’ve clicked on a link posted by a friend and it just doesn’t seem to be what you expected, raise a flag. Be wary of offers to find out who’s been looking at your Facebook profile, free iPads (and other popular consumer electronics), or sensationalized content involving you (like messages referring to pictures of you or your friends from last weekend). These are typically going to be scams. If you aren’t sure, try strumming up some dialog with your friend before clicking. If they don’t know what you are talking about, chances are they are spreading spam posts without even knowing it. If someone sends you a link, ask them about it before just clicking it.

If you get friend requests from users you don’t know, check their location. If they are local, chances are they are legit. You might even be able to go one step ahead and Google their name to see if there is any information about them being a scammer. Granted, it’s terrible that we need to resort to these levels in a social environment, but it is better to be proactive.

Above all else, don’t ever share your personal information (social security number, credit cards, and passwords) when things seem suspicious. If it suddenly appears you need to log back into Facebook, you are probably being phished – a scam that makes you think you are providing sensitive information to log into a site, but really that data is being sent to a crook.

What to do When You are the Victim

If you think you’ve been scammed, go into your Facebook privacy settings and edit the settings next to Apps and Websites. Click the X next to any apps that you want to delete. You’ll want to go onto your profile and remove any posts that app has made and alert your friends to what happened, and share these instructions with them in the event they fell victim as well. Finally, change your Facebook account password. It wouldn’t hurt to check your antivirus and make sure it is running the latest definitions, just to be safe.

Social Network Safety Rules to Live By

  • Verify Facebook apps before you approve them. During the approval process (before you grant the app access to your account), the app will display the author’s name. Clicking on it should take you to the app’s homepage. Check for anything that seems strange, out of place, or unprofessional. You can also check user experience and even do a Google search to find out if it is a scam or not.
  • Don’t give out personal information (including your login and password). Always check the URL in your address bar to make sure you are on the official (Facebook, Twitter, LinkedIn, etc.) website when logging in.
  • Be skeptical: It’s likely your friend doesn’t have embarrassing photos of you from last weekend, or has a solution for finding out who’s stalking their account on Facebook. When in doubt, a quick Google search should be able to confirm a scam.
  • With social media, a big part of the way scams and attacks get passed around is amongst trustworthy friends and acquaintances. Not everybody is mindful of security.
  • And the big golden rule that will provide you the best protection is to be mindful of what you click on.

Do you think you’ve been scammed?  Contact us at 305-592-5433 for assistance in recovery and future prevention.  If you are a Miami business owner and would like help educating your staff on internet and social network safety and best practices, don’t hesitate to contact us!