May 2011
In this issue

Building A Small Business Network

Top-Notch Password Security

Stretch Your IT Budget

Protect Your Private Information

Employee Spotlight

Business Continuity Tip
Employee Spotlight
Darren Meunier
Darren joined the Idealogical team early in 2010, having previously worked in technical support in Sudbury, Ontario. He graduated from a three year Computer Engineering / Technology program at Cambrian College in 2008. Darren’s key role as Team Leader is to visit the Logical Care clients in his area once a month and to support the helpdesk. Darren has currently completed the following certifications VMware Vsphere 4, Microsoft SQL Server 2008 Installation and Maintenance, Zen Desktop 4 and Mac Integration 10.6. Darren has shown great dedication in going above and beyond the call of duty to complete client projects, and serves as a champion for client needs when acting as a go-between with vendors.

On long weekends, Darren returns to Sudbury to visit family and friends. Recently, Darren has been engaged in learning Japanese and he enjoys Japanese cuisine. He plans one day to visit to experience the culture first hand.

Continuity Tip
Tornado Preparedness Checklist for Your Business

Over the past week, 15 states were hit by severe tornadoes. All told, hundreds of tornadoes were reported and many people lost their lives.

The economic impact on the business community has yet to be determined, but one thing is certain, those businesses with a continuity and disaster recovery plan in place are the key to recovery for some of the hardest hit areas.

The following checklist will help mitigate the risk to your business, and help protect your most important asset – your people.

Download this Tornado Preparedness Checklist from Agility Recovery.

Just for Laughs

Quote for Today

Each day of our lives we make deposits in the memory banks of our children.

Charles R. Swindoll,
The Strong Family


Building a Small Business Network: The Basics
used with permission from Cisco

A small business network isn't just about making contacts and exchanging business cards at trade shows. In today's global economy, a small business network is about reducing your operating costs. It's about reacting quickly to changing markets and customer needs. It's about being prepared for the future.

A small business network begins with a secure and reliable data network foundation that's fast and accessible. Here are seven ways that a small business network can transform your company:

1. Work Anywhere
A small business network uses a host of technologies such as virtual private networks (VPNs) that enable mobile employees and teleworkers to work securely at home, on the road, or at customers' offices. They have full, secure, remote access to your phone system, data network, customer database, and any other tools they need to be productive. It's almost like they're in the office.

2. Access Customer Data Wherever, Whenever
With a secure small business network, you can input, update, and view information about customers in a database. You can access that database using a computer, phone, or handheld device. Having constant, secure access to customer information helps workers better serve customers. And satisfied customers often result in increased revenues.

Read On

5 Tips for Top-notch Password Security
by Kim Komando
used with permission from the Microsoft Small Business website


Whether it's a few PCs or hundreds on your network, there's one thing that can separate your system from being compromised: a great password.

Why? Hackers want access to anything and everything. If they can guess your user name and password, you might as well have given them your wallet and the keys to your building.

Before we talk about what makes a good password, let's begin with the first of five things to know and practice in using passwords.

1. Don't be complacent: Attacks can and do happen.

Hackers are a devious bunch and will stop at nothing to get into your network and files. They use three different methods to get to you: brute force, dictionary attacks, and social engineering.

Brute force is the most time-consuming method. Basically, it involves a program that tries every combination of letters, numbers, and keyboard characters to guess your password. It starts with trying every character, then tries two-character combinations, and so on.

The longer the password is, the exponentially more difficult it becomes to crack. According to George Shaffer, a password expert, a password that is eight characters in length and utilizes lower- and upper-case letters, numbers, and keyboard characters won't be cracked for two years.

Read On

Stretch Your IT Budget with These 6 Technology Tips
used with permission from HP Small Business Center


For small- and medium-sized companies, the difference between a successful year and a dismal one often comes down to how well they can stick to the b-word: BUDGET.

Luckily, the recipe for budgeting success is simple: spend less, while making more. But there’s a virulent SMB myth that — especially in a weak economy — the only way to save money is to forgo buying the new computers, servers, and printers that your employees need. Not true.

Below are some simple reasons why investing in technology can actually save you money over the long term.

1. Understand the total cost of ownership (TCO)
Many SMB owners suffer from sticker shock when contemplating the upfront costs of buying new equipment. Unfortunately, they don’t see how much higher the overall price tag is for holding onto old, outdated machines when you factor in maintenance, resale value, and energy consumption.

And, don’t think that buying cheaper equipment is necessarily better for your wallet. While consumer PCs and printers may take a smaller initial bite out of your budget, they don’t offer the same robustness or security standards that make business equipment worth every extra penny.

Read On

5 Sure-Fire Ways to Protect your Private Information
used with permission from the HP Small Business Site

Last year, the reputation of online security took yet another major hit when over 200,000 users of Gawker Media websites — including those users who log in via Twitter — had their usernames and passwords hacked and distributed across the web. This massive data breach just goes to show that, while data security remains a major concern for Internet users the world over, protecting your business’s confidential information is more than just a worry, it’s vital to survival.

With that in mind, here are five sure-fire ways to keep your professional information under digital lock and key — whether you’re online or off.

Online Security
1.  The first step to protecting sensitive data is beefing up your network security. By incorporating dynamic encryption keys, media access controls, and WiFi Protection Access (WAP), you can help ensure that you and your employees are only sharing data with trusted websites and decreasing the chance that your wireless network will be compromised. Then, and only then, can you practice web surfing with confidence.

2.   Select only business notebooks that come preloaded with HP ProtectTools — an embedded security suite that allows for protected data sharing, access right management, network firewall protection, and more.

Not only does this robust tool provide notebook security management, but it can also enhance your existing security programs — such as virus detection software — to provide a unified defense for your business network and PCs.

Read On


Idealogical Systems Inc.
2900 John St.- Suite 400 |  Markham, ON  |  L3R 5G3  |  416-410-5030  |