September 2012
In this issue

Securing the Road to Virtualization

Reward Your Best Customers

Social Networking Safety: 11 Tips

Business Continuity Tip
Continuity Tip

National Preparedness Month

The Federal Emergency Management Agency (FEMA) in partnership with the Ready Campaign will kickoff National Preparedness Month (NPM) this September. The campaign encourages all Americans to take the necessary steps to ensure their homes, workplaces and communities are prepared for disasters and emergencies of all kinds.

Here are a few tools and resources worth checking out:

  • Webinars – Agility will host 4 free webinars in September on different aspects of business continuity and disaster preparedness.
  • Free Breakroom Poster – Help your employees and coworkers prepare with this free disaster myths poster for your breakroom.
  • Share #NPM – Easily spread the word about the National Preparedness Month initiative on LinkedIn, Twitter and Facebook.

Quote for Today

Children have never been very good at listening to their elders, but they have never failed to imitate them.

James Baldwin

Just for Laughs

Securing the Road to Virtualization and Beyond
reprinted with permission from Symantec

When it comes to ensuring the security of the global IT enterprise, it's a dangerous world out there. According to the Symantec 2011 Internet Security Threat Report, malicious attacks have increased nearly 81% over previous years, the number of targeted attacks on organizations of all sizes is escalating, the adoption of mobile is increasing vulnerability, and data breaches are on the rise.

The massive IT shift to virtualization and eventually private and hybrid clouds is only adding another layer of complexity to the security challenge. Traditional enterprise security controls and protocols don't necessarily translate to the virtual world, and virtualization technology in itself introduces a brand new set of risks, many of which are not adequately addressed using existing security best practices. As a result, organizations aren't doing enough to mitigate risks in their next-generation environments—an oversight that can wreak havoc as critical business systems transition to virtual and cloud-based environments as a means of increasing business agility in a more cost-effective manner.

Read On

Reward Your Best Customers
reprinted with permission from Microsoft

The strategy is simple: Give high-paying customers an incentive and they'll come back and buy more.

That way, you boost sales, find new customers through referrals, and lower your costs of marketing and customer acquisition.

So how do you accomplish this? By figuring out who your best customers are and what motivates them to buy. Once you know that, you can add incentives to make it worth their while to buy more.

What's loyalty got to do with it?

Marketing programs that reward customers for their patronage are not new. Long before airlines established frequent flier clubs and credit card point rewards, there was the Sperry & Hutchison Green Stamps program. Sperry Hutchison, the distributor of the stamps, launched the program in 1896. At its height in the mid-1960s, with 80% of U.S. households collecting stamps and 800 redemption centers nationwide, S&H was overseeing an $825 million market.

Read On

11 Tips for Social Networking Safety
reprinted with permission from the Microsoft Safety & Security Center

Social networking websites like MySpace, Facebook, Twitter, and Windows Live Spaces are services people can use to connect with others to share information like photos, videos, and personal messages.

As the popularity of these social sites grows, so do the risks of using them. Hackers, spammers, virus writers, identity thieves, and other criminals follow the traffic.

Read these tips to help protect yourself when you use social networks.

  1. Use caution when you click links that you receive in messages from your friends on your social website. Treat links in messages on these sites as you would links in email messages. (For more information, see  Approach links in email with caution and  Click Fraud: Cybercriminals want you to 'like' it.)
  2. Know what you've posted about yourself. A common way that hackers break into financial or other accounts is by clicking the "Forgot your password?" link on the account login page. To break into your account, they search for the answers to your security questions, such as your birthday, home town, high school class, or mother's middle name.

Read On


Idealogical Systems Inc.
2900 John St.- Suite 400 |  Markham, ON  |  L3R 5G3  |  416-410-5030  |