NEWS FROM THE EDGE

Tech Tips and Advice from the Experts at Dynamic Edge

Check out Bruce’s clear and insightful look into healthcare’s plague with cybersecurity risks.

Order your copy on Amazon here!

it-support-job-retentionOne of the largest challenges in Information Technology is hiring the right people, but in my opinion the greatest challenge is growing the right people.

What do I mean by this? Let me give you an example.

A couple of weeks ago, I was interviewing job candidates. There was one candidate stuck out to me, but not in a flattering way. His resume looked pretty good—15 years technical experience at a well-known company. His salary requirements reflected years of experience.

The problem?

He really didn’t have much experience. For the past 15 years, he had been doing the same exact thing day in and day out. Rather than being a solutions expert, he was simply a solution expert- One. Period.
continue reading

As a business owner, I am constantly putting a magnifying glass to all of our expenses, trying to see if we really need something or if there’s something better worth investing in. Many people may think “I don’t need a new computer” even if their machine is getting hard to work with. What I want to underscore today is that you really need to know when to invest in new hardware because old machines may be costing you more money than you’d ever suspect!

When should I replace an old machine?

Generally, our rule of thumb is that after 3 years, technology has evolved to the point that any hardware older than 3 years will leave your business at a disadvantage. The cost of ownership on that machine grows to the point that it’s really not a feasible option to hang on to the old dated hardware anymore. Today I want to walk through why using old machines for business work can be a liability.

Below are 5 costs to consider when thinking about investing in hardware.
continue reading

failing-backup

Business Backing Up Their Data To Backup Servers On Their Network Should Realize Their Backups Can Be Completely Destroyed.

The headlines keep coming in—reports of business large and small—hospitals, police departments, doctor’s offices, restaurants—all fall victim to ransomware and cybercrime. And the majority of these organizations failed to recover their data because they didn’t have a solid backup strategy.

While having a protected network should be part of any IT Support Team’s on-going security strategy, relying solely on a first line of defense to protect your business continuity has left businesses in ruin. Over 85% of businesses experiencing a data breach fail within two years of a cyberattack.

And of those businesses, nearly all (93%!) assumed that simply having a backup server on their network would protect them from disaster.

The problem with making an assumption that your backups are safe is that your backup server can be easily destroyed by a Crypto attack.
continue reading

disciplined-it-supportOne Word: Discipline.

What most offices lack when they experience a data breach or cyberattack is a lack of discipline guiding and enforcing their security standards.

Let me give you two quick stories of where a lack of discipline hurt offices and end with one concrete example of how discipline helps save lives.

Example 1: Backups are On, but Not Working!

One of the most common things I find when auditing a prospective client is that the entire office thinks that their backups are working. Their IT guys tell them that they are getting backups and the majority their IT guys for their word (not that all IT guys are trustworthy, unfortunately).
continue reading

Why the Equifax Data Breach Could Be Draining Your Business Accounts (And Why You Might Not Even Notice!)

Last week’s Equifax announcement of 143 million people affected by one of the most sweeping data breaches (and likely the most danger) attacks ever may be more worrisome than you may suspect. Since Equifax validates credit scores for virtually everyone, they hold in their disposal millions upon millions of records of personally identifiable information—much of which if not locked under key day in and day out could easily allow criminals to steal your identity.

Last week, one of my colleagues had the misfortune of having his identity stolen. The timing and circumstances aligned perfectly with the Equifax data breach as the most parsimonious way his identity could have been stolen (he is a IT Security expert that is especially careful with disclosing sensitive personal information). If identity theft happened to him, it could easily happen to any of you—and with big data breaches of completely sensitive information, you should be more vigilant than ever with both your personal AND business identity and footprints.
continue reading