Tag Archives: Backup disaster recovery

Your Business is Under Attack from “Them”

What kind of attacks affect businesses in Arizona?

Arizona and Phoenix Metro in particular are not any more vulnerable than other parts of the country when it comes to Natural disaster. As a matter of fact when it comes to natural disasters, Phoenix is listed as the second safest city in U.S. Metro Areas with 1 million inhabitants or more, Rochester, New York being the safest.

      1. Rochester, New York
      2. Phoenix, Arizona
      3. Columbus, Ohio
      4. Buffalo, New York
      5. Cincinnati, Ohio

We are lucky enough to avoid, tornadoes, volcanoes, hurricanes, earth quakes, floods, & wildfires more than most other major cites. Unsurprisingly, many businesses locate their call centers, data centers, and office operations in Arizona taking advantage of the relatively disaster free state and metropolitan area. What then if anything do business need to worry about if we are mostly free from natural attacks? Although we enjoy relative natural stability, mother nature can still pack a wallop when she wants to.

Lightning and Power, and Heat,  Oh My!

Major Metropolitan areas of Arizona can breath a sigh of relief when it comes to most massive natural disasters, however, we are still significantly affected by smaller natural attacks such as lightning which can kick up quite severe in our Monsoon season. Lightning strikes in Arizona annually cause dozens of businesses to lose equipment and data because of their notorious effect on electronics and storage devices. Most businesses are inadequately protected from lightning strikes because they fail to invest in lightning protection equipment and fail to adequately store their sensitive data on high availability backup systems. Arizona heat directly and indirectly affect sensitive equipment and electrical systems in AZ. When the temperatures rise, so does demand on the grid. Older parts of the grid and poorly supplied buildings become more susceptible to “brown outs” and “power spikes” caused by fluctuating power. That variance in power wreaks havoc on computer systems and consequently the data that exists on those systems. As an IT professional I have personally seen power variations damage hundreds of systems in every sort of business over the past dozen years in the Phoenix area. What strikes me funny is the surprised look on people’s faces when I tell them “power destroyed your system”, as if this thought had never occurred to them before. Surge protectors are good, and UPS systems are even better, but the best protection you can buy is in a backup system that continuously backs up your data and keeps your business going, even if a few systems are damaged by lightning, power, or anything else.

What’s the real “attack” threat?

Since so many businesses and so much data is located in Arizona, we face a more menacing threat than any natural disaster. We’re talking about Cyber Threats. Most businesses are not nearly paranoid enough when it comes to cyber crime. Most business spend money on external prevention and internal authentication without addressing data accountability and recovery. IN other words:

“Arizona is a prime location in the world to store Data. Data is more valuable than gold to many people around the planet. This makes Arizona and many businesses located here a major target for cyber criminals, hackers, and data thieves.”

In March of 2013, U.S. Army General Keith Alexander, who is head of the U.S. military’s Cyber Command, said cyber attacks on private companies were getting much worse. He stated that the intensity & number of attacks will grow significantly throughout the year.

May 31st, 2013, Defense Secretary Chuck Hagel stated that cyber-threats pose a quiet, stealthy, insidious danger to the United States. Hagel Quoted, “Cyber threats are real, they’re terribly dangerous,”

The question then becomes, what do we do about it? Prevention is important to be sure. That means implementing the best firewalls, security software, and security policies you can. Equally important, considering the threat, is what to do if your data is stolen, destroyed, compromised. etc. Finding and eliminating the threat are top priorities, next is restoring your data. It’s important to know that your data is stored safely with many revisions available in an offsite location so that you can quickly recover your data. If your live data is corrupt, you need to find revisions of files that are not compromised and bring those back into your live data set efficiently. Does your existing disaster recovery plan account for this?

Remember, cyber criminals do not only exist in a vacuum in China, Pakistan, or Russia, they exist in your organization, your vendors, your public cloud, or your ISP. Sometimes data compromise and corruption occurs by accident from errant software or a careless employee, or even faulty hardware. Prevention and cure are the main focuses when dealing with cyber threats. If your prevention fails, will your cure be quick, efficient and painless, or just as horrifying as the attack itself?

Pull your resources and make Data Security happen within your own company. Work on your business continuity planning and your data recovery planning. If you’re not up to the task, get a professional IT company to help you with the task. Use the best you can find.

To illustrate how many businesses are seeking solutions for Disaster/Data Recovery issues, I’ve researched monthly web inquiries and plotted the results in an infographic that you may find useful.

Disaster Recovery | Infographics

 

If you have questions or need assistance, please reply to this blog or contact us directly. We’re here to help.

TriYoung Knows IT Services is “Big Business”

     Now that the 21st Century is well anchored in time, “It’s not your Grandpa’s business world” is a reality we all must accept, even those of us who consider ourselves “technological dinosaurs.” And, because by attending to our business we can’t possibly keep up with all of the changes in the world of technology, the idea of seeking an IT Services company has become a necessity and not a luxury!

“To give you some idea of just how big the Computer Services business is,” Julie Young of TriYoung Business Solutions, Inc. in Glendale, Arizona, who specializes in IT Services shared, “you need only consider that in 2013 Global tech spending is forecasted to hit $3.8 billion!”

This represents a 4.1% increase over last year.  A partial breakdown of these numbers show that IT Services spending will increase by 4.5% to some $918 billion; Data Center Systems expenditures will jump to $146 billion, up 3.7% and monies spent on Devices will rise 7.9% to $718 billion.

“With that kind of money being spent, it’s not surprising that IT Services companies are becoming a major player in the world market as well,” Young pointed out.

Young’s comment is supported by the fact that Tata Consultancy Services (TCS), a Netherlands-based IT Services firm, has just been named Europe’s top company to work for in 2013.

“We are pleased to have rated the foremost employer across Europe,” D.P. Nambiar of TCS stated.  Nambiar cited the fact that employees are the greatest assets of any company, and TCS has worked diligently to retain their key personnel.

While most of us are not in the market for a firm the size of TCS, we do want to find a firm that meets our needs.  That’s why we need to arm ourselves with as much information and knowledge as we can when we make our choice.
“There are several things you will want to keep in mind during your search,” Young suggested, “including the scope of IT services you are hoping to have provided.”

She was, of course, referring to such issues as IT Consulting; IT Solutions: IT Support; and Business Continuity Planning.  To assist you in your search for an IT Services company, consider the following points:

  • Identify your IT outsourcing goals up front
  • Decide which type of IT Services provider is best suited for your company
  • Don’t let ROI be your only concern
  • Remember that “industry expertise” is not necessarily an advantage
  • Verify “compatibility” between your firm and your IT Services provider

“Unfortunately,” Young said, a pang of regret obvious in her voice, “not everyone in our industry is as scrupulous as one would hope.  So, make sure are choosing a company that has your best interest in mind.”

Young suggested three questions you will want to ask yourself each time an IT Services provider presents a proposal to you:

  • Does the solution suggested actually address a need or issue that I have?
  • How does this technology apply to my business?
  • Will this technology help me generate more business by increasing revenue or productivity?

If you have questions regarding how you can benefit through the efforts of a IT Services provider you may want to contact TriYoung Solutions at 602-424-1700 and Julie and her staff would be happy to assist you in determining the things that you might be lacking with your current IT Solutions program .

To learn more about TriYoung Solutions, go to:

www.triyoung.com

To learn more about this topic go to:

Global tech spending forecast to hit $3.8 trillion in 2013

Now, TCS ranked best employer in Europe

How to Spot an IT Services Provider with an Agenda, Part 1

How to Spot an IT Services Provider with an Agenda, Part 2

Article written by Floyd Allen, professional writer for TriYoung Business Solutions