Blog

Archive for May, 2015

Cloud Computing – How Will it Affect You?

Cloud Computing

What is Cloud Computing?

The hottest emerging concept that has the power to change how we perform tasks is taking place before us – and it is Cloud Computing. Simply put, it is the ability to use resources and tools via the Internet without actually owning or being near them. The only requirement is to be able to access them. Certainly no one can doubt that Cloud Computing and the next generation of the Internet has had a dramatic affect on how people interact and connect with each other – both from an individual standpoint and a business one.

The term ‘Cloud’ is used to indicate the whole of computing services accessible via the Internet. It is an all-encompassing description of the complex internet-connected networks that exist in datacenters all over the world that power services and applications behind the scenes.

Examples of Cloud Computing services you probably already use.

The concept of utilizing resources in these networks is being adopted by businesses both large and small. These resources are categorized to describe their function, and include:

  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
  • Web 2.0

In the most general terms, Infrastructure as a Service means that companies may no longer need to own and house their own back-end servers and other network computing infrastructure besides an internet-connected PC or laptop in order to maintain business functionality. This capability can be purchased on a subscription basis from entities that market these services in a ‘virtual’ manner. This allows businesses to keep their costs low by not having to purchase, maintain and recycle their own equipment for this purpose, and also mitigates the possibility of business interruption due to the highly available nature of these solutions. This equates to increased uptime and profitability for Infrastructure as a Service customers.

Platform as a Service is also known as ‘cloudware’, and refers to the availability of development tools in creating web applications and services to the end user. Like IaaS, you never ‘see’ the inner-workings of this environment unless you are a computer programmer or IT resource, but it exists nonetheless and again affords those who use these tools the ability to reduce costs while running their businesses.

Sofware as a Service is defined as software applications that are subscribed to and accessed only through the Internet, and not installed on local PCs or laptops. Applications built by and accessed via Google fall into this category, as well as the many photo sites to which you can upload your pictures and videos, edit and share them with others. These solutions are gaining tremendous popularity, because end users do not need to install, update and maintain software locally – only connect to it and use it when the need arises.

Web 2.0 describes the whole of the social networking movement on the Internet, and includes but is not limited to destinations such as Facebook, MySpace, LinkedIn and Twitter. These sites offer the ability for people all over the world to share common interests, stay connected and learn more about each other – and these sites aren’t just for the young. Statistics show that the over 50 generation is logging onto these sites in greater numbers than ever before. In fact, in one month alone, Facebook adds over 17,000 new members.

The next time you are on the Internet and upload a photograph and use the online tools to modify that picture, you are participating in ‘cloud computing.’ The picture is probably loaded to a site that uses IaaS for their servers, PaaS in order to provide the visual interface in which you modify the photograph, and SaaS applications you’ll use to access your email program and social networking sites in order to send it to or post it for those with whom you would like to share the picture.

Click here to learn how WJP Enterprises, Inc. can help you benefit from Cloud Computing in Brandon, Plant City, and the rest of Hillsborough and Polk counties.

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Security Breach recovery can come with high costs

Small to medium size businesses are what keep this country moving. Unfortunately, for many of these business owners, budgetary needs force them to make cuts that the mammoth corporations do not have to consider. These budget cuts can often result in reduced security and sub par IT services that in the long run can end up costing the company even more money. Reacting to; and the recovery from, a security breach or attack always costs more after it has happened than what it would have cost to prevent it.

security breachThis fact has been supported by recent surveys, and may come as a surprise to many small and mid-size companies who are under the false impression that hackers and other security threats target larger corporations. It has been discovered that companies that have less than 500 employees are actually more likely to be at risk of an attack or security breach than a larger corporation. Of course, this becomes a problem when the larger corporation has the resources to maintain higher levels of security at a time when smaller companies are dealing with restricted or; in some cases, frozen IT budgets.

The benefits of hiring a Managed IT Services Provider in preventing attacks and security breaches

With a security breach a real concern for small business owners, many are making the decision to bring on outside providers to address their IT needs. Managed services providers can offer an affordable solution to small business owners who are struggling to manage an internal IT staff. In some cases there isn’t even an IT person on staff, which can be just as costly for the small business when they have to bring in a professional on an as needed basis. Considering the money and time spend recovering from a security attack or breach, more business owners are realizing the cost of not having this level of protection is too high to pay. Here we look at how managed services providers can help business owners level the playing field against those who would infiltrate their security systems.

  • Increased knowledge- Managed services providers are in the business of technology. They have trained staff who are able to prevent security breaches and spot any activity that could be perceived as a threat. Moreover, they have the expertise to stop threats and prevent the loss of sensitive and private information that can lead to costly recovery measures.
  • Less expensive than in-house IT- Other IT professionals can provide the same security but it will cost much more to the business owner. What many owners are realizing is paying a flat monthly fee for security and other services provided by msp’s is actually much more cost effective than paying an internal IT staff or outsourcing based on incident.
  • Proactive is better than reactive- The biggest benefit of having a quality managed services provider in your corner is the fact that you are acting in a proactive manner to ensure all of your systems are managed properly. This is less expensive and less time consuming than waiting for something bad to happen and then reacting.

Any small business can benefit from the security provided by a Managed IT Services provider. They can do so at a fraction of the cost, therefore eliminating the fear and unnecessary cost of trying to recover from a breach in security or attack.

Click here to learn how WJP Enterprises, Inc. can help you prevent attacks and security breaches with our Network Security Services for your business in Brandon, Plant City, and the rest of Hillsborough and Polk counties.

Posted in: Security, Tech Tips for Business Owners

Leave a Comment (0) →

Network Connectivity Troubleshooting – Part Two

This is part two in this series for network connectivity troubleshooting.  Confirming the connectivity with the Internet was theNetwork connectivity troubleshooting focus of the first three steps in our process. We now continue with the remaining steps to help you discover what the problem with your Internet connection might be.

1. Check functionality. Once the network cable has been confirmed to be working correctly, we need to see if the router is working correctly. Since you have already unplugged and re-plugged the router in and rebooted both it and your PC, that should have taken care of any automatic configuration issues that might have become hung up. High speed Internet providers can change the network address (also called the IP address) of your router at any time. This usually requires a re-boot of your router (and sometimes of your PC) in order to pick up that new address and begin communicating. Also, there are other network addresses that are used to get outside to the Internet that are automatically configured as well, but we will deal with those in a later step.

2. Test functionality. If after you have rebooted the router and PC and performed all of the steps above, but it appears that you are still having problems, make sure that you try other ways to get outside to the Internet by launching your email program (if you use one). If it works, but your Internet browser still does not, then something is preventing your Internet browser from resolving website addresses on the Internet.

3. Check virus software. When was the last time your PC performed an automatic update or a scan for viruses? Can you try to force an update now? Is it successful? If it has been a week since the last check for viruses, run a full system scan. If this does not work and no viruses are detected, move on to the next steps.

4. Try another system. Do you have another PC or laptop that you can plug in to your router to try and get out to the Internet, or do you know anyone else with a laptop PC who would be willing to bring it over to see if they can plug into your router and get out to the Internet? If so, that will confirm if you have a good working router and cabling. If you or they are able to get out to the Internet, then the problem lies with the original PC you were troubleshooting.

5. Contact your Broadband Service Provider. If you cannot get out to the Internet with another PC or Laptop, work with their support staff to troubleshoot the connectivity issue.

6. Final options. If all else fails, take your PC to another location like a friend’s house or a relative who has high speed Internet access. Plug into their system and see if the PC will access the Internet. Another option is to take your PC to a local shop to have it examined for any virus or spyware software that is not being detected but is preventing you from accessing the Internet. Usually, these local PC repair companies have the software tools to help detect and eradicate these problems.

Troubleshooting a connection for your PC can be a frustrating thing to do because there are so many variables to address. Be patient, and follow the above steps and hopefully you will find the source of your problem sooner rather than later.

Click here to learn how WJP Enterprises, Inc. can help you alleviate your network connectivity troubleshooting problems with our Reactive Response and PC Repair Services for your business in Brandon, Plant City, and the rest of Hillsborough and Polk counties.

Posted in: Tech Tips for Business Owners

Leave a Comment (1) →

Network Connectivity Troubleshooting – Part One

network connectivity troubleshootingTo most computer support persons, having problems connecting to the Internet via a router and a high-speed connection is not a major issue. However, for those who do not understand some basic technology concepts, solving connectivity problems will be a struggle. The following will give you some tips of where to look for network connectivity problems and how to perform some basic network connectivity troubleshooting tasks.

Most of the initial steps of this process are common-sense and incredibly basic, but you would be surprised at the number of calls to help desks that are solved simply by having someone turn on a power switch or plug in a cable to a device!

1. Check the power. Make sure that the power is turned on to your router and that you can see some visible signs of that power on the front of the unit. Usually green or yellow lights flash or stay on constantly when the unit has power. If you do not have any of those, check the electrical outlet for power. Plug in a radio, clock, lamp or other device to see if the outlet is ‘live.’ If so, continue on to the next step. If not, check your electrical box to make sure that your circuit breakers have not tripped because of an overload or other electrical issue.

2. Check the router. If you still get no lights on the front of your router, then unplug it from the electrical outlet and wait for a while (15 minutes to half an hour) and plug it back into that same outlet. Most of these have what we call ‘wall-wart’ type power supplies that have the square-ish black block on the end which plugs into the wall outlet (or power surge suppressor). Sometimes these can go bad. If you cannot get any of the lights to come on at all on your router, even if you test it in a known “good” wall receptacle, it might mean that the power supply or router itself is defective.

3. Check the cables. Now, if you have confirmed that the electrical outlet is working properly and you are getting lights on the front of your router, then you need to check the network cable between your PC and your router. If you have a wireless router and are having trouble connecting by that method, then you need to troubleshoot first by trying to connect with a hard-wired connection, as it is easier to troubleshoot a hard-wired connection than a wireless one (once you have successfully established connectivity through a wired connection, you can resume troubleshooting wireless connectivity). Normally, your router should include at least one network cable for connecting devices directly to it. Use this cable to connect your PC to your router.. On the front of the router are a series of lights (these differ in color by manufacturer) which indicate the presence of a network connection over the network cable (or Ethernet cable) between your PC and router. Locate the network cable which runs from your router to your PC and unplug it from the back of the router. Does one of the lights go out? If so, that is a good sign. If not, then go to the PC end of the network cable and locate where it connects to your PC. Right around this connection there are usually a set of led lights indicating a network connection. By removing your network cable from the PC, you should see the lights go out. And, with your PC powered on, removing this cable will also usually cause a message to come up on your Windows-based PC indicating that your network connection has been lost. If this happens, then it appears that at least your router and PC are ‘talking’ to each other. This is usually noted by the ‘flashing’ activity of these lights.

4.Reboot both your router and your PC. Sometimes a simple reboot will clear up any anomalies between network connections, and this will always be a step any help desk, ISP or router manufacturer’s support personnel will ask you to try.

In part two of this series we will talk about checking functionality of your router and then determining whether your problem might lie solely with your PC.

Click here to learn how WJP Enterprises, Inc. can help with your network connectivity troubleshooting problems with our Reactive Response and PC Repair Services for your business in Brandon, Plant City, and the rest of Hillsborough and Polk counties.

Posted in: Tech Tips for Business Owners

Leave a Comment (1) →

7 Password Tips to Protect Against Business and Identity Theft

strong passwords help prevent identity theftAh, those pesky passwords. If you work in the corporate world or in an office, you have one for your PC/Network and, unless there is a password synchronization application that combines them, you probably have more than one for other applications. Add those to the ones that you have for your home Internet, your banking and other websites that require passwords, and before you know it you have a nightmare on your hands in trying to manage them. How easy a target are you for business and identity theft?

Part of the frustration has to do with the different requirements for password formatting. Some systems only require four characters, some require eight. Some need a combination of alpha and numeric characters and others do the same with the addition of a few capital letters thrown in for extra security. It can be positively maddening.

The worst thing you can do with your passwords is to place them in a text document which can be accessed on the hard drive of your computer. Your files are vulnerable to business and identity theft- even if you think they are not. If someone is intent on finding them, they can. Even if you place them into a password protected document, those can be cracked, too.

Writing them down has its own vulnerabilities, too, and there are varying opinions on this practice. If you do write them down on a piece of paper, put the document in a locked location whether it is in your home or at work.

Here are 6 tips on how to handle your passwords to protect against business and identity theft:

1. Make your passwords complex. People who use easy to remember or short passwords are inviting disaster. Use a little imagination and pick a password that is very difficult to attach to your life. Stay away from birth dates, phone numbers, house numbers, or any other number that is associated with your life.

2. Keep passwords unique. When you change your passwords, make them unique from each other. Do not use the same password on all of your sites. If you do, then you are open to having every site that you have a password to being vulnerable to hackers to log on and steal your identity, money or destroy your reputation.

3. Be obscure. Use a combination of letters, numbers, capital letters and special characters if possible. The more you do this, the more secure your passwords will become. Create an alphanumeric version of a term you can remember. Using this technique the word “Spaceship” becomes “Sp@ce5h!p”. Another technique is to remember a phrase, and use just the first letters of the words. For instance, the Bible verse John 3:16 is easy to remember and “FGsltwtHgHobS.J3:16” is incredibly secure. (Unless of course, all of you use it! Come up with your own!)

4. Longer passwords are more secure.  Most systems allow passwords to be longer than the average person uses. A twelve character password, especially if it’s obscure as described above, will be exponentially more difficult to crack than just a six or eight character password.

5. Change regularly. This is the singular tip that can save you if you do not heed any of the other tips. How often should you change your password? How secure do you want to be? The frequency with which you change your password will determine how secure you are from becoming a victim. The more often you change it, the better you are. The longer you leave it the same, the more vulnerable you become. Three months is a good cycle for a password, but certainly if you fear for the security of your identity, then a monthly change is not out of the question.

6. Password-protect your PC. Be sure to give your PC a password on power-up. This will help protect your files unrestricted access to your PC.

7. Password-protect your wireless home network. If you have a wireless home network, be sure to password protect it as well. Use the same principles above in order to secure your wireless network. This will prevent others from accessing your connection and using it maliciously to hack the personal or business PCs and laptops you and your family use at home.

Finally, there are password programs that can help with this important task, but the best advice is to start with the tips above right away. Password software can be useful as an organizational tool, but it is no match for using sound methods to manage and make your passwords difficult to crack.

Click here to learn how WJP Enterprises, Inc. can help protect you against business and identity theft with our Network Security Services for your business in Brandon, Plant City, and the rest of Hillsborough and Polk counties.

Posted in: Security, Tech Tips for Business Owners, Tech Tips for Computer Users

Leave a Comment (0) →