416-410-5030 | Client Login | Remote Control Remote Control

Logical Talk

The Idealogical Blog

­

3 Things to Rely on for Ransomware Protection Before You Resort to Backup

Relying on backup recovery is a good backup option to have, but it’s equally important to invest in security approaches that help you avoid ransomware in the first place. Here are a few things you can easily do to help ensure it doesn’t come down to you putting all your eggs in the backup basket:

  1. Use a multi-layered security strategy: No security tool is 100% effective, but using a multi-layered approach that includes firewalls, antivirus, and behavioral-based malware detection can help ensure that even if one layer doesn’t catch a threat another layer will.
  2. Conduct user training, and lots of it: Whether it’s through malvertising, phishing, or social engineering the biggest weak point attackers target is user behavior. Schedule regular training with your users to go over best practices and how they can avoid having their computers compromised by malware.
  3. Patch early, patch often: Security software needs regular updates and patches to keep up with new cyber-attacks. Make sure all your security software is regularly updated.

ideaLogical hopes you enjoyed this email blog and will Visit our blog page if you missed the other segments of this series.

By |December 31st, 2018|Logical Talk|0 Comments

3 Tips to Make Your Backup protected from Ransomware

While all this may look like a lot of bad news, the upside is that there are some quick tweaks you can make to your backup strategy that will make it more effective against ransomware.

  1. Embrace 3-2-1 backup: 3-2-1 backup is a backup strategy that requires you to have three copies of your data in two different locations, one of which is offsite. Making your backup 3-2-1 compliant ensures that even if one copy of your backup is encrypted by ransomware you’ll still have at least one off-site copy that can’t be touched.
  2. Use both image and file backup:  Image backup creates a snapshot of your computer that allows you to restore your computer to a state it was in at a previous point in time.

A single image file is easier to easier to manage and quicker restore than thousands of individual files which will help reduce your RTO. However, a file-based backup will allow you to recover single files more quickly than a whole system image. So, if your user needs a critical document right away you can recover it for them while you restore the rest of the image.

  1. Test, test, test: As a best practice, testing out how long it […]
By |December 17th, 2018|Logical Talk|0 Comments

Using Backup to Recover from Ransomware: 4 Things You Must Consider

While it’s true that restoring from backup is the best option when you’re hit with a ransomware attack there are several things to think about when you use backup as the core of your ransomware protection strategy.

Recovery point objective (RPO): Recovery Point Objective is the timeframe dictating how often backups are created. It also informs the dates and times you can recover from. If you take weekly backups and you suffer data loss you can restore that computer exactly as it was a week ago. If you take daily backups and suffer data loss you can restore your computer as it was the day before.

It’s important to understand what your RPO is and how much data you could stand to lose if you were hit with ransomware and had to recover from your backup.

Ex: If your RPO is a week and your backups occur on Sunday, ransomware hit on Saturday is going to wipe out a week’s worth of work. If your RPO is 24 hours, on the other hand, at most you’re going to lose a day’s worth of work.

Recovery time objective (RTO): Recovery Time Objective is the rough amount of time it will take to restore a computer from backup […]

By |December 10th, 2018|Logical Talk|0 Comments

Just Because you have a backup

When faced with a ransomware attack the current wisdom is if your computer gets infected and it encrypts your files you have three basic options:

  1. Pay the ransom
  2. Restore from a backup
  3. Cut your losses and nuke the computer

Of those three choices, backup is obviously your best option. Assuming everything goes well, you’ll get your data back and you can get back to work knowing you dodged a bullet.

But remember, just because you have a backup in place doesn’t mean you’re protected from ransomware. Recently, members of the Spiceworks IT community shared their experiences with ransomware in a brief survey. While most reported backing up their data, only 42% could fully recover everything that had been compromised or encrypted.

Relying solely on a backup as ransomware protection is like using your emergency brake for everyday driving: it may get the job done but it’s going to be messy.

The truth is, restoring from backup isn’t always going to go smoothly. There’s also no guarantee it’s going to be comprehensive. It’s a much-preferred option to paying the ransom, but to make sure it’s a viable option there are several things you need to prepare for and consider. Otherwise, if or when ransomware does hit, you […]

By |December 2nd, 2018|Logical Talk|0 Comments

The True Cost of a Poorly Maintained Network

 

There are some losses that are nearly impossible to calculate. It’s very hard to put a price tag on things like diminished productivity and lost time, but you know they have a major impact on your bottom line. As a direct result of technological failures due to a poorly maintained network, businesses of all sizes encounter these losses every day. No one is exempt from system crashes, network outages and other computer problems.

In an effort to quantify these losses, many businesses turn to industry statistics, but statistics can only give you an average – and no business is average.

Still, no one can deny the fact that such an interruption can cost a considerable amount of money. It doesn’t matter whether the outage is caused by a server crash, hardware failure or some other outside force. If your business has ever come to a screeching halt because of failed technology, you understand this fact all too well.

 Need further convincing? Take a look at these statistics:

  • 93% of companies that lost their data center to a disaster for at least 10 days filed for bankruptcy within one year. 50% of businesses that found themselves without data management for this same time period […]
By |April 27th, 2017|Helpful Advice, Logical Talk|0 Comments

Is Your IT Technician a Partner – Or Just a Computer Mechanic?

BLOG_No Fly Solo 2

Secrets to Finding a Great IT Consultant – Part Eight

Being a computer consultant is about more than just fixing computers. It’s about helping a business run smoothly and efficiently. It’s about improving productivity, boosting profits and elevating your customer service efforts.

How can a consultant do all these things without truly understanding the nature of your business? The answer is simple: they can’t. A person can’t be qualified to recommend solutions without first understanding the problems.

It’s hard to underestimate the importance of this demand. You could have found the most brilliant technician; but if he doesn’t understand the nature of your business or lacks the right business skills, you won’t get the most from your technology investments. That’s why it’s critical to find a technician who either has substantial experience in your industry or is willing to spend the time to learn about the inner workings of your business.

Here are nine questions to ask yourself to determine if your technician is truly a business partner, or just a “computer mechanic”:

• Do they dig to uncover the source of the problem, or do they only look […]

By |March 23rd, 2015|Helpful Advice, Hiring for IT|1 Comment

10 Steps Businesses Must Take Now to Avoid a Data Breach

In 2014, the media was abuzz with tales of corporations struggling to retain market share and customer loyalty in the aftermath of some serious data leaks, such as the ones at Sony and Home Depot. Although the big data breaches at international corporations are often the ones that make the news, smaller incidents occur much more frequently – even though you might never hear about the breach that occurred at that accounting firm down the street.

While many businesses believe something like this will never happen to them, unfortunately, it’s becoming more and more likely for small and medium-sized businesses.

Smaller businesses tend to have less time, money and staff to address security concerns and keep their security applications up to date. They are seen as ‘low hanging fruit’ for hackers looking for easy prey. Smaller companies that have larger companies as customers can also be an enticing target as an entry point or a stepping stone to more lucrative information. And if you handle payment cards from customers you may be vulnerable to those looking to steal money from individuals. Attacks on smaller businesses are indeed on the rise: according to Symantec, 31% of all targeted spear […]

By |February 27th, 2015|Helpful Advice|0 Comments

Two Big Reasons Why Your IT Consultant Should Be Insured

Secrets to Finding a Great IT Consultant – Part Seven

Any IT company or technician you consider hiring should be insured. All qualified technicians should have two kinds of insurance. If a firm isn’t insured, you’re taking a major risk by hiring them. Their prices may be cheaper up front, but you could end up paying thousands more in the long run.

Workers’ Compensation Insurance – Without workers’ compensation insurance,
you’re liable in the event that one of their technicians gets hurt at your office. That
technician can, and probably will, sue you.

Errors and Omissions Insurance – What happens if one of their technicians makes
a major mistake that wipes out your company’s crucial files? Well, if they have
errors and omissions insurance, you’ll get money from their insurance company.
If not, they’ll probably file for bankruptcy and you’ll be stuck with the loss.

If you’re lucky, the loss won’t bankrupt you too.

Any legitimate IT services company should be happy to provide you with proof of their insurance.

Note: This content is based on an excerpt of “The Search for Hassle-Free IT” book. Request your FREE copy.

By |February 20th, 2015|Hiring for IT|0 Comments

5 Exclusive Strategies to Help Prevent Blacklisting

BLOG-blacklisted
No one ever thinks it will happen to them, until it does. You’re going about your day, emailing your clients, but no one seems to be getting back to you. Did you suddenly become invisible? Did you enter some alternate reality where you’re the only person left in the world? You check in with your colleague next door who acknowledges your existence with a friendly “hello”. He also mentions to you that one of his vendors didn’t seem to get his order this morning. Can you check into it?

If this scenario is familiar than chances are you’ve experienced the pain of blacklisting yourself. A blacklist is a list of IP addresses, domains, or senders known or suspected of sending spam. It is created by an anti-spam organization and blocks the receipt of mail from senders who have been listed. If you end up on a blacklist, your recipients will not get your emails. You may not receive a bounceback, and chances are good that neither you nor your recipients will know about it for at least a few hours.

Nowadays the loss of email is comparable to the loss of telephone services or an […]

By |February 10th, 2015|Helpful Advice, Tips and Tricks|0 Comments

5 Items to Demand in Your IT Services Contract

IT Services Contract

Secrets to Finding a Great IT Consultant – Part Six

All too often, the details of a project, such as response time to emergencies, project completion timelines and problem resolution methods are agreed upon verbally rather than in writing. Unfortunately, these are the very things that are most likely to come back and bite you later.

There are a few problems with verbal contracts. For one, people forget things. Maybe your technician had every intention of following through on his word, but he just forgot. If it was in a written contract, though, he’d be sure to remember. Also, people often misunderstand one another. You may think the other party is agreeing to one thing and he thinks he’s agreeing to another.

Another problem with these handshake deals is that you’re dealing with an eager salesperson. Before your contract is signed, many salespeople will promise the moon and the stars – whether or not they can deliver is another story.

If these details were outlined in your IT services contract, things would be clear and people would be accountable.

To avoid disappointment and potential disaster, here are 5 things you […]

By |January 23rd, 2015|Helpful Advice, Hiring for IT|0 Comments