508-909-5961 [email protected]

DR tips for hurricane season

This year, the National Oceanic and Atmospheric Administration (NOAA) predicts up to four unusually active hurricanes. With that in mind, there’s no better time to test your disaster recovery (DR) plan. But to avoid data loss and expensive downtime from such catastrophes, there are several things that need to be accounted for.

The post DR tips for hurricane season appeared first on Complete Technology Resources, Inc..

DR tips for hurricane season

This year, the National Oceanic and Atmospheric Administration (NOAA) predicts up to four unusually active hurricanes. With that in mind, there’s no better time to test your disaster recovery (DR) plan. But to avoid data loss and expensive downtime from such catastrophes, there are several things that need to be accounted for.

The NOAA forecasts 11 to 17 tropical storms in the Atlantic, the Caribbean Sea, and the Gulf of Mexico. Hurricane season has officially begun and is expected to last until the end of November. The four allegedly active hurricanes are presumed to be Category 3, 4, or 5 on the Saffir-Simpson Hurricane Wind Scale (Category 1 is the weakest and 5 the strongest).

But don’t panic just yet; here are five steps you can take to protect your business during hurricane season.

1. Schedule a DR drill

Despite having a DR plan, many companies don’t test their plan, at least not as often as they should. So if you’re one of those companies, it’s crucial to conduct a DR drill now. A lot can change in the months or years since you have last tested your plan -- systems updates, infrastructure upgrades, employee turnover and more. By scheduling a drill, you’ll be able to make sure everyone knows their roles and that all critical systems are covered.

Note that you should try to perform desktop walkthrough exercises, operational tests, and simulated recovery exercises on a regular basis.

2. Make sure your staff are prepared

All your staff should know what the evacuation procedures are as well as their responsibilities in the DR process. If not, coordinate with HR to make sure everyone in your company understands what the plan of action is for hurricane season. Staff with specific responsibilities need to get the documentation needed to effectively manage their roles in the event of a hurricane.

Set meetings with your DR team and schedule training for new team members. Your DR team should be able to quickly mobilize other employees to the DR site before bad weather hits. Don’t forget to touch base with any providers you are supposed to work with in case of an emergency, too.

3. Secure your backup site

In addition to a secondary location for data storage, your DR plan should also include another backup site so that you can continue your operations. In the event of a hurricane, dedicated space is imperative since your backup sites will likely be occupied with employees.

You should also consider the redundancy of utilities at your DR site, making sure you have enough power feed, fiber carriers, and anything else you’ll need to remain operational.

4. Check for amenities at your DR site

Whether your DR site is in the hurricane zone or in the nearest city, chances are hotels will be overbooked as people fight for a place to stay. This means your staff will likely be stuck onsite around the clock, so you need to make sure there is enough amenities to get them through this hectic period. Is there a place for employees to shower and sleep? Is there enough food and water to last them for at least a couple of days? These amenities will help your staff pull through as they restore your operations.

5. Update your DR plan’s appendix

Your DR plan should have an appendix with contact information, SLAs, and systems inventories information. More importantly, this information needs to be up-to-date; the last thing you need is calling your IT vendor when a server goes down only to reach the wrong number.

Go through all critical information in your DR plan and add any other information as needed. Vendors and shipper's contact information are a must as they will guarantee that you get hardware and power supplies backup without any hassles.

Unlike a fire drill which can be conducted on a yearly basis, your business continuity and disaster recovery plan needs to be tested regularly to meet your company’s changing needs. If you don’t already have a DR plan, or have any further questions, don’t hesitate to give us a call.

Published with permission from TechAdvisory.org. Source.

The post DR tips for hurricane season appeared first on Complete Technology Resources, Inc..

Read More

How to optimize website images for SEO

Search engine optimization (SEO) is one of the most difficult and frustrating aspects of running a modern business. Web services and platforms that provide automated SEO reports like WordPress, Google and Raven tools tend to oversimplify their advice.

The post How to optimize website images for SEO appeared first on Complete Technology Resources, Inc..

How to optimize website images for SEO

Search engine optimization (SEO) is one of the most difficult and frustrating aspects of running a modern business. Web services and platforms that provide automated SEO reports like WordPress, Google and Raven tools tend to oversimplify their advice. If you’re trying to change your results from red to green, you might need to look more closely at your site images.

Do my images really affect my SEO?

One of the reasons images tend to be overlooked when auditing SEO is because it’s easy to forget just how many your website has. Maybe when you first built your site you had a few photos on your homepage, but nowhere else. Over time however, you probably added countless visual elements in blog posts, landing pages and team photos -- drastically increasing the influence of your images on your SEO.

Image resolution and load speed

The first thing to check is how your images affect your site’s speed. If you’re using ultra high-resolution photos, users on mobile devices or satellite data connections will have trouble loading your site. Site load times affect your site’s ranking on Google, so make sure to pare them down to a more reasonable resolution and save them as web-friendly file types (GIF, JPEG and PNG).

Keywords and image title

The days of keyword-stuffing are long gone, but that doesn’t mean you can get away with uploading images with filenames like DSC2558.jpg. Before uploading an image to your site, make sure to name it something relevant to the content, such as gym-trainer-helping-lift.jpg or call-center-customer-service.jpg. This makes it easier for search engines to derive information about the content from the images on a page.

“Alt text” and title text

Even though Google is getting better at recognizing image content without any help from text identifiers, describing your images in your website’s backend is still important for SEO. Every image on your site should have as much text-based information as possible without disrupting the user experience.

To see how this works in WordPress, open up your site dashboard and click on Media. This will display all the images, videos and audio on your site. Select any photo and click “Edit more details.” Whatever you include in the Caption field will be shown below the image, so make sure it corresponds with your content. If it doesn’t work with the content, skip it. In this case user experience takes priority over SEO.

The Alternative Text and Description fields will be shown to visitors only if the image doesn’t load or if they select it manually. They may not seem all that important, but these should be considered non-negotiable for SEO purposes.

Check that your site is doing all these things before requesting another SEO report. If your score changes, start regularly auditing your image optimizations. If you’re still seeing red, there are a number of web- and cloud-based platforms that can help you improve your content. Give us a call today to find out more!

Published with permission from TechAdvisory.org. Source.

The post How to optimize website images for SEO appeared first on Complete Technology Resources, Inc..

Read More

4 HIPAA protections against ransomware

Keeping up with HIPAA regulations may be a pain for most healthcare institutions, but it does provide guidelines on how to protect your organization from devastating cyberattacks. That said, following HIPAA rules may be your best shot in fending off ransomware like WannaCry.

The post 4 HIPAA protections against ransomware appeared first on Complete Technology Resources, Inc..

4 HIPAA protections against ransomware

Keeping up with HIPAA regulations may be a pain for most healthcare institutions, but it does provide guidelines on how to protect your organization from devastating cyberattacks. That said, following HIPAA rules may be your best shot in fending off ransomware like WannaCry.

For those who don’t know, WannaCry was first discovered in the UK. It affected over 20% of the UK’s National Health Service and created bottlenecks in hospital administration and treatment. Many healthcare institutions claimed that the privacy of patient data was not compromised, but the success of the attack shows how vulnerable these industries are to new, emerging threats.

Within 24 hours, the ransomware eventually spread and infected hundreds of thousands of machines in 150 countries. But despite WannaCry’s success rate with healthcare institutions in Europe, the malware was less effective in the US -- thanks to companies that strictly followed these HIPAA guidelines:

Malware protection
Securing your endpoints with advanced antivirus software, firewalls, and intrusion prevention systems can help detect and block attacks targeting your patient data. In fact, most antivirus software has been able to prevent WannaCry since early April; with that in mind, you should keep your security systems patched and running full system scans on a weekly, if not, daily basis.

Up-to-date software
Just like your security products, your business applications, operating system, and other software should always be up to date. WannaCry was able to spread only due to vulnerabilities in outdated Windows operating systems (which were actually fixed back in March). Simply taking a few minutes to check for updates and install them will save you lots of financial and legal trouble in the future.

Incident response plans
Should a malware attack occur, HIPAA requires that companies have strategies in place to mitigate the damage. When dealing with highly sensitive patient data, encryption systems are a must. And in cases when ransomware strikes, companies should have cloud backup and disaster recovery plans to restore files in a clean computer to keep operations running.

Security tests and risk analyses
Once you’ve established a security framework and incident response policy, risk analysis and security tests are crucial last steps. Hiring IT staff to perform a risk analysis will help you identify and isolate system vulnerabilities to prevent cyberattacks. Also, security tests are important in finding out whether your defenses are capable of preventing different types of attacks from exploiting any weaknesses.

Employee awareness
Of course, none of this can substitute for good security training. Staff who understand security best-practices like setting strong passwords and critically double-checking download links can ensure your firm’s safety.

Experts anticipate that this attack will spur on copycats, so complying with these security tips and best practices (even if your company is not under HIPAA regulations) is key to survival. And if you need guidance with security or healthcare compliance, we’re the ones to talk with. Call us today if you need help keeping WannaCry and other malware at bay.

Published with permission from TechAdvisory.org. Source.

The post 4 HIPAA protections against ransomware appeared first on Complete Technology Resources, Inc..

Read More

Bluesnarfing: what you need to know

When buying a technological device today, whether it’s a smartphone, a speaker, a keyboard or a smart watch, one of things people look for is Bluetooth compatibility. And who could blame them when Bluetooth has become a ubiquitous feature of technology that everyone can’t live without.

The post Bluesnarfing: what you need to know appeared first on Complete Technology Resources, Inc..

Bluesnarfing: what you need to know

When buying a technological device today, whether it’s a smartphone, a speaker, a keyboard or a smart watch, one of things people look for is Bluetooth compatibility. And who could blame them when Bluetooth has become a ubiquitous feature of technology that everyone can’t live without. But just like any technology, convenience can quickly turn into chaos when fallen into the wrong hands. With that in mind, here’s what you need to know to guard against cybercriminals when using Bluetooth.

Google paid a settlement fee of $7million for unauthorized data collection from unsecured wireless networks in 2013. While their intention likely wasn’t theft, many disagreed and called them out for Bluesnarfing, a method most hackers are familiar with.

What is it?

Bluesnarfing is the use of Bluetooth connection to steal information from a wireless device, particularly common in smartphones and laptops. Using programming languages that allow them to find Bluetooth devices left continuously on and in “discovery” mode, cybercriminals can attack devices as far as 300 feet away without leaving any trace.

Once a device is compromised, hackers have access to everything on it: contact, emails, passwords, photos, and any other information. To make matters worse, they can also leave victims with costly phone bills by using their phone to tap long distance and 900-number calls.

What preventive measures can you take?

The best way is to disable Bluetooth on your device when you’re not using it, especially in crowded public spaces, a hacker’s sweet spot. Other ways to steer clear of Bluesnarfing include:

  • Switching your Bluetooth to “non-discovery” mode
  • Using at least eight characters in your PIN as every digit adds approximately 10,000 more combinations required to crack it
  • Never accept pairing requests from unknown users
  • Require user approval for connection requests (configurable in your smartphone’s security features)
  • Avoid pairing devices for the first time in public areas

Bluesnarfing isn’t by any means the newest trick in a cybercriminal’s book, but that doesn’t mean it’s any less vicious. If you’d like to know more about how to keep your IT and your devices safe, give us a call and we’ll be happy to advise.

Published with permission from TechAdvisory.org. Source.

The post Bluesnarfing: what you need to know appeared first on Complete Technology Resources, Inc..

Read More