416-410-5030 | Client Login | Remote Control Remote Control

Logical Talk

The Idealogical Blog

­
Idealogical

About Idealogical

For over a decade, Idealogical has provided the Greater Toronto Area with managed computer support services designed for small business – everything from expert installation and implementation to remote and on-site technology management.

3 Things to Rely on for Ransomware Protection Before You Resort to Backup

Relying on backup recovery is a good backup option to have, but it’s equally important to invest in security approaches that help you avoid ransomware in the first place. Here are a few things you can easily do to help ensure it doesn’t come down to you putting all your eggs in the backup basket:

  1. Use a multi-layered security strategy: No security tool is 100% effective, but using a multi-layered approach that includes firewalls, antivirus, and behavioral-based malware detection can help ensure that even if one layer doesn’t catch a threat another layer will.
  2. Conduct user training, and lots of it: Whether it’s through malvertising, phishing, or social engineering the biggest weak point attackers target is user behavior. Schedule regular training with your users to go over best practices and how they can avoid having their computers compromised by malware.
  3. Patch early, patch often: Security software needs regular updates and patches to keep up with new cyber-attacks. Make sure all your security software is regularly updated.

ideaLogical hopes you enjoyed this email blog and will Visit our blog page if you missed the other segments of this series.

By |December 31st, 2018|Logical Talk|0 Comments

3 Tips to Make Your Backup protected from Ransomware

While all this may look like a lot of bad news, the upside is that there are some quick tweaks you can make to your backup strategy that will make it more effective against ransomware.

  1. Embrace 3-2-1 backup: 3-2-1 backup is a backup strategy that requires you to have three copies of your data in two different locations, one of which is offsite. Making your backup 3-2-1 compliant ensures that even if one copy of your backup is encrypted by ransomware you’ll still have at least one off-site copy that can’t be touched.
  2. Use both image and file backup:  Image backup creates a snapshot of your computer that allows you to restore your computer to a state it was in at a previous point in time.

A single image file is easier to easier to manage and quicker restore than thousands of individual files which will help reduce your RTO. However, a file-based backup will allow you to recover single files more quickly than a whole system image. So, if your user needs a critical document right away you can recover it for them while you restore the rest of the image.

  1. Test, test, test: As a best practice, testing out how long it […]
By |December 17th, 2018|Logical Talk|0 Comments

Using Backup to Recover from Ransomware: 4 Things You Must Consider

While it’s true that restoring from backup is the best option when you’re hit with a ransomware attack there are several things to think about when you use backup as the core of your ransomware protection strategy.

Recovery point objective (RPO): Recovery Point Objective is the timeframe dictating how often backups are created. It also informs the dates and times you can recover from. If you take weekly backups and you suffer data loss you can restore that computer exactly as it was a week ago. If you take daily backups and suffer data loss you can restore your computer as it was the day before.

It’s important to understand what your RPO is and how much data you could stand to lose if you were hit with ransomware and had to recover from your backup.

Ex: If your RPO is a week and your backups occur on Sunday, ransomware hit on Saturday is going to wipe out a week’s worth of work. If your RPO is 24 hours, on the other hand, at most you’re going to lose a day’s worth of work.

Recovery time objective (RTO): Recovery Time Objective is the rough amount of time it will take to restore a computer from backup […]

By |December 10th, 2018|Logical Talk|0 Comments

Just Because you have a backup

When faced with a ransomware attack the current wisdom is if your computer gets infected and it encrypts your files you have three basic options:

  1. Pay the ransom
  2. Restore from a backup
  3. Cut your losses and nuke the computer

Of those three choices, backup is obviously your best option. Assuming everything goes well, you’ll get your data back and you can get back to work knowing you dodged a bullet.

But remember, just because you have a backup in place doesn’t mean you’re protected from ransomware. Recently, members of the Spiceworks IT community shared their experiences with ransomware in a brief survey. While most reported backing up their data, only 42% could fully recover everything that had been compromised or encrypted.

Relying solely on a backup as ransomware protection is like using your emergency brake for everyday driving: it may get the job done but it’s going to be messy.

The truth is, restoring from backup isn’t always going to go smoothly. There’s also no guarantee it’s going to be comprehensive. It’s a much-preferred option to paying the ransom, but to make sure it’s a viable option there are several things you need to prepare for and consider. Otherwise, if or when ransomware does hit, you […]

By |December 2nd, 2018|Logical Talk|0 Comments

The True Cost of a Poorly Maintained Network

 

There are some losses that are nearly impossible to calculate. It’s very hard to put a price tag on things like diminished productivity and lost time, but you know they have a major impact on your bottom line. As a direct result of technological failures due to a poorly maintained network, businesses of all sizes encounter these losses every day. No one is exempt from system crashes, network outages and other computer problems.

In an effort to quantify these losses, many businesses turn to industry statistics, but statistics can only give you an average – and no business is average.

Still, no one can deny the fact that such an interruption can cost a considerable amount of money. It doesn’t matter whether the outage is caused by a server crash, hardware failure or some other outside force. If your business has ever come to a screeching halt because of failed technology, you understand this fact all too well.

 Need further convincing? Take a look at these statistics:

  • 93% of companies that lost their data center to a disaster for at least 10 days filed for bankruptcy within one year. 50% of businesses that found themselves without data management for this same time period […]
By |April 27th, 2017|Helpful Advice, Logical Talk|0 Comments

Idealogical’s Andre Vittorio Featured in VOICE Magazine Article “Web 2.0: Safety and Security Concerns”

Idealogical President Andre Vittorio has been featured in the winter edition of VOICE magazine in an article entitled “Web 2.0: Safety and Security Concerns”

By |December 3rd, 2014|News and Awards|0 Comments

Idealogical President Andre Vittorio Appears on the Business Fix TV Show

Idealogical President Andre Vittorio Appears on the Business Fix TV Show

By |May 14th, 2014|News and Awards|0 Comments

Idealogical President Andre Vittorio Wins Markham Board of Trade’s ASPIRE Award

Idealogical President Andre Vittorio Wins Markham Board of Trade’s ASPIRE Award

By |April 19th, 2013|News and Awards|0 Comments

Globe and Mail Article featuring Idealogical President Andre Vittorio

Globe and Mail Article featuring Idealogical President Andre Vittorio: Computer makers selling hype or help?

By |March 2nd, 2010|News and Awards|0 Comments