Is Your Business Ready for Hurricane Season?

Hurricane season is in full swing. Hurricane Florence is barreling towards the Carolinas and there are three other systems being watched. Most coastal residents have some idea as to how to prepare their house and other buildings for hurricanes, but what about your I.T. stuff? Are you storm-ready on the I.T. side?

Back It Up

The most important thing to do is make sure everything is backed up. If you haven’t done a digital backup of all your important files, now is the time to do it. Consider things like Excel spreadsheets, photos, emails, Quickbooks, etc. There are different backups to consider:

Onsite = Onsite backups use devices like USB and removable hard drives. They are easy, fast, and don’t require internet. However, you have to remember to take the backup device with you if you evacuate.

Cloud/Offsite = If you have a lot of data and/or don’t want to risk forgetting your backup devices when you evacuate, you might prefer a cloud-based option. This way, if your office floods and/or electricity goes off, your data is being stored somewhere else and is still accessible via cloud.

Both onsite and offsite options can be set up to backup your information regularly, which is ideally what you should do.

Failover

Depending on your setup, you may also want to consider a failover system. For example, if you have an important server running at your business that you’re worried about losing power to, you can set up a failover system to take over if/when your main system goes offline. Of course, you’ll need to monitor said failover system, just like you need to monitor backups. If you don’t monitor such things, they may not work when you need them.

You’ll likely want to keep tabs on your employees, so find out their hurricane evacuation plans ahead of time. Some may evacuate out of the danger zone and yet remain in an area that loses electricity and/or cell phone service, while other employees may evacuate far enough away that they will retain both and could work remotely if requested.

If you are interested in our data backup services, please contact us, and stay safe this hurricane season.

Have You Tried Rebooting It?

It’s stereotyped as the favorite question of IT help desk people: “Have you turned it off and back on?”  On the surface, it seems like a ridiculous question. How on earth could rebooting a device possibly fix anything?  And yet, it does. I’ll explain, and hopefully the next time an IT person asks you this question, you’ll be less inclined to roll your eyes. Continue reading “Have You Tried Rebooting It?”

FBI Warns of ATM “Jackpotting” Threat

About a week ago, some scary information started making the rounds.  The Telegraph reported that the FBI had issued warnings that there would potentially be a hacking attacking on ATMs worldwide.  There was a threat that hackers would be unleashing a “jackpotting” attack, and that millions of dollars were at risk.  The time-frame of that particular warning may have passed, but the general concern remains as such attacks will doubtlessly occur in the future.

Continue reading “FBI Warns of ATM “Jackpotting” Threat”

The Alphabet Soup of VoIP

If you have read some of our older blog posts, you may realize that we at Core Networks are fans of VoIP. However, if you have stumbled across our blog to read some of our newer posts, you probably don’t understand what VoIP is, other than some fancy type of telephone. In future posts I plan to explain just what VoIP is, but first, we must first have some foundations to build on. There is an alphabet soup of tech-y terms surrounding VoIP, and in this post we’re going to examine those terms.

VoIP Phone
VoIP Phone

Continue reading “The Alphabet Soup of VoIP”

MAC vs IP Address

I figured I’d give you all a break from malware and talk about something different.  In that spirit, I’m doing a little post about IP addresses and MAC addresses.  I’m going explain the difference between MAC and IP addresses by starting with question: “What is an IP address?”

IP address stands for Internet Protocol address, while MAC address stands for Media Access Control address.  That probably means nothing for those that are not tech-savvy, and trying to explain them by discussing things like network identification will just be confusing.  Instead, I am going to explain them by comparing them to cars.

IP Address Windows Configuration
IP Address Windows Configuration

Continue reading “MAC vs IP Address”

Malware 101

In our previous post we discussed the Russian malware known as VPNFilter.  In this post we figured we should pull back a little and give you a rundown on malware in general.  You’ve probably heard lots of terms associated with malware – viruses, rootkits, Trojans, etc, – but maybe you don’t understand how they’re related.  We’ll try to clear that up.

"<yoastmark Continue reading “Malware 101”

Russian Malware and Protecting Your Business

Hello Internet! We’re reopening our blog, and we figured a good place to start would be a discussion of a current event. In this post we’ll be discussing why the FBI has asked people to reboot their routers. The reason? A bit of Russian malware called VPNFilter.

Russian Hackers
Russian Hackers

Continue reading “Russian Malware and Protecting Your Business”

5 Ways a VoIP System Can Immediately Help Streamline Your Business

Even with the remarkable benefits of VoIP systems, there are still a large number of businesses that are using landline phones. The modern world of internet and high-speed data has made a significant difference for businesses, especially when it comes to modern communication. Cloud hosted systems, or VoIP services are the most common choices, for businesses that are shifting from regular landlines. If you’re still unsure about the possible ways a VoIP can help your business, here are 5 ways it can immediately help streamline your business: Continue reading “5 Ways a VoIP System Can Immediately Help Streamline Your Business”

Business Security and Your Anti-Virus Software

When you’re the owner of a business, one of the most important aspects is making sure that the workplace is secure. Not only is it important that you educate your employees on the dangers of cyberspace, for example, but you need to be sure you’re doing your part as well. Don’t share you password(s) with anyone, and always make sure to keep them updated. With that said, do you have anti-virus software installed as well? It’s one of the most efficient ways to protect a business.  Here are some important tips to consider when using it. Continue reading “Business Security and Your Anti-Virus Software”