Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

World Backup Day: 9 Questions You Must Ask When Planning A Backup Strategy

March 30, 2015 by The T By D Team Leave a Comment

March 31st is:

 World Backup Day

 

83% of us own a computer.    89% own a mobile phone.
But only 1 in 4 people make regular backups of their data.

 

 

 

Think You’re Safe?  THINK AGAIN!

 

World Backup Day2

 

  •  6% of all PCs will suffer data loss in any given year.  This equals 4.6 million PCs that suffer data loss every year.
  • 60% of companies that lost their data for any amount of time, SHUT DOWN within 6 months of the loss.
  • 93% of companies that lost their data for 10 days or more, filed for bankruptcy within 1 year of the loss.

What Is A Backup?

It’s a separate copy of your important photos and documents.

So if something happens to your computer or mobile phone, your photos and information are completely safe.

Losing Your Data Is More Common Than You Think:
  • More than 60,000,000 computers will fail this year.
  • More then 200,000 smartphones are lost or stolen every year.

That’s countless documents and treasured memories DESTROYED.

If something went wrong today, what would you lose forever?

World Backup Day

 

Go To worldbackupday.com to take

The World Backup Day Pledge:
“I solemnly swear to backup my important documents and precious memories on March 31st.”

 

“I will also tell my friends and family about World Backup Day – friends don’t let friends go without a backup.”

9 Questions You MUST Ask Yourself When Planning a Backup Strategy*

It takes time to create and implement a backup and recovery plan.  You need to figure out what data is important and needs to be backed up, how often the data should be backed up, and more.

To help you create a plan, consider the following questions:

 

1.  How important or sensitive is the data on your systems?

The importance of data can go a long way toward helping you determine if you need to back it up – as well as when and how it should be backed up.

For critical data, such as a database, you’ll want to have redundant backup sets that extend back for several backup periods.

For sensitive data, you’ll want to ensure that backup data is physically secure or encrypted.

For less important data, such as daily user files, you won’t need such an elaborate backup plan, but you’ll need to backup the data regularly and ensure that the data can be recovered easily.

 

2.  What Type Of Information Does The Data Contain?

Data that doesn’t seem important to you, might be very important to someone else.

Thus, the type of information the data contains can help you determine if you need to backup the data – as well as when and how the data should be backed up.

 

3.  How Often Does The Data Change?

The frequency of change can affect your decision on how often the data should be backed up.

For example, data that changes daily should be backed up daily.

 

4.  Can You Supplement Backups With Shadow Copies?

Shadow copies are point-in-time copies of documents in shared folders.

These point-in-time copies make recovering documents easy, because you can easily go back to an older version in case a document is deleted or overwritten accidentally.

You should use shadow copies in addition to standard backup – not to replace backup procedures.

 

5.  How Quickly Do You Need To Recover The Data?

Time is an important factor in creating a backup plan.

For critical systems, you might need to get back online swiftly.

To do this, you might need to alter your backup plan.

 

6.  Do You Have The Equipment To Perform Backups?

You must have the backup hardware to perform backups.

To perform timely backups, you will need the proper equipment, and the proper expertise.

We recommend a minimum of 3TB external hard drive per computer, plus a separate 3TB external hard drive for each server.  However, each business is different and has its individual needs.

Call Technology by Design at 1-204-800-3166

for a free estimate.

 

7.  Who will be responsible for the backup and recovery plan?

Often, businesses opt to save money and perform the backups themselves.

However, only 20% actually do the backups correctly and on time.

Call TbyD for a free estimate on your

personalized Managed Backup and Recovery Plan.

Choose 1 person at your organization to be a primary contact for the organization’s Backup and Recovery Plan.

 

8.  What’s The Best Time To Schedule Backups?

Scheduling backups when system use is as low as possible, will speed up the backup process.

However, you can always schedule backups for off-peak hours.  Some workstations require up to hourly backups.

You need to carefully plan when key system data is backed up.

 

9.  Do You Need To Store Backups Off-Site?

Storing copies of backups off-site is essential to recovering your systems in the case of a local disaster (e.g. flood, fire, theft, etc.).

In your off-site storage location, you should also include copies of the software you might need to install to reestablish operational systems.

*Adapted from the Microsoft Press book “Microsoft Windows Server 2008 Administrator’s Pocket Consultant by William R. Stanek


cyber
 
 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!


Filed Under: FAQ, Featured

ALERT: Banking Email Scam

March 25, 2015 by The T By D Team 1 Comment

Scam AlertALERT:  

Banking Email Scam

 

The National Credit Union Administration (NCUA) is warning netizens about a recent phishing email scam.

The NCUA reports that emails are being received by consumers in the U.S. and Europe from what appears to be a legitimate website managed by an Australian financial services company called “National Credit Union”.  This company claims to offer financial products and services to consumers in the U.S. and Europe.

The emails are similar to the one below:

NCUA Email scam

 The emails ask consumers to verify their identity in a “routine check for security purposes”.  The emails request personal information, such as Social Security numbers, account numbers, log-in information, and a request to transfer large amounts of money.

The NCUA emphasizes that it has no affiliation with the “National Credit Union”, and that they would never ask consumers for such information.

 

What To Do If You Receive A Suspected Scam Email:
  1. Do not reply to the email.  Do not click on any links.  Do not open any attachments.  Do not give any information.  Do not act on financial requests.  Delete the email.
  2. Contact the NCUA’s Fraud Hotline, toll-free 1-800-827-9650.  All reports remain confidential.
  3. File a complaint with the Internet Crime Complaint Center.  The center is a partnership between the FBI and the non-profit National White Collar Crime Center established as a clearinghouse for Internet-related crimes.
  4. Visit the “Frauds and Scams” page on MyCreditUnion.gov.  This page, operated by the NCUA, gives an overview of CyberCrime scams.  
If you think your identity has been stolen, contact your financial institution as soon as possible.  

Dispute any fraudulent transactions and, if needed, close your accounts and open new ones.  Also, to protect your credit, notify the 3 big credit bureaus, Equifax, Experian, and TransUnion, to place a “Fraud Alert” on your credit reports.

If you find any “National Credit Union” phishing emails in your inbox, following these steps can prevent an incredible amount of lost time, hassle, and money.

 

Got Cyber-Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: ALERTS, Featured

Definition: Netizen

March 25, 2015 by The T By D Team Leave a Comment

Definition:  Netizen

aka:  CyberCitizen

An entity or person actively involved in online communities, and a user of the Internet, especially an avid one.

Filed Under: Definitions

Stay Safe On Public HotSpots

March 23, 2015 by The T By D Team Leave a Comment

WiFi HotSpot2

Stay Safe On Public HotSpots

 

Public Wi-Fi hotspots are everywhere.  Coffee shops, waiting rooms, highway rest stops, arenas, etc.  If there’s people sitting around, chances are, there’s free WiFi.

 

And wherever there’s free WiFi, there’s security risks.

 

Connecting your device, whether it be a laptop, tablet, or smartphone, to a public WiFi hotspot is a little bit like stepping off the curb without looking; it’s dangerous.  You could avoid connecting altogether, but that’s not an option when you’re on the road:  You need to get work done, communicate, and access the Web, and public WiFi may be the only option available.

There are undoubtedly some doubters out there who are thinking right now “I’ve been on public WiFi lots of times, and nothing bad ever happened.”  That may be true, but these days, blindly joining public WiFi hotspots is a little like playing Russian roulette.  Every day that passes, the tools that CyberCriminals use to snoop, swipe, and infect your systems get better, easier to use, and more automated.  If it only takes a few seconds for a data thief to break into your system and start wreaking havoc, then you need to spend a few minutes to make sure your defense shields are up.  And it’s easy enough that even someone that doesn’t know the hard drive from the floppy drive (Hint:  floppy drives don’t exist any more) can minimize their exposure to WiFi hotspot threats you’re likely to encounter.

  1. Maintain Security Software.  This one should go without saying.  However, we run into people several times a day, that either do not have or do not have up-to-date security software.  Security software is typically pretty good at preventing unauthorized users from accessing your system, notifying you of the presence of infected files, and removing harmful link and malware.  Make sure you have antivirus, anti-malware, and firewall utilities.  Windows comes with firewall software enabled by default, but you may have to seek out third-party options for antivirus and anti-malware software.  For instructions on how to make sure your firewall is enabled in Windows7 click: HERE.  For instructions on how to make sure your firewall is enabled in Windows8 click:  HERE.  It’s also a good idea to make sure your device’s OS and other applications are up-to-date before you sign on to any public WiFi hotspot.
  2. Don’t Share.  Never mind what Sesame Street taught you.  The first time you connect to any network, Windows asks if you’re connecting to a Home Network, Work Network, or Public Network.  Do yourself a favor and always select “Public Network” when connecting to a WiFi hotspot.  This ensures that your device is not visible to others using the hotspot, blocks malicious software, prevents access to the HomeGroup, and turns off network discovery.
  3. Connect Manually.  Although doing so may seem tedious, make sure you’re manually connecting to hotspots every time.  Rogue hotspots hosted by CyberCriminals tend to use SSIDs (Service Set IDentifiers) that sound like they’re being hosted by a legitimate business.  You may be inside a Starbucks, but that doesn’t mean you should trust any available hotspot with the coffee shop’s name in the SSID.  Whenever possible, verify the hotspot’s SSID with an employee before signing on.
  4. Choose Password-Protected SSIDs.  We know that the human instinct for immediate gratification is overwhelming.  It’s easiest to try the open networks before inquiring about a password to one of the closed ones.  But fight that urge.  Although password-protected networks aren’t inherently any safer, they can help you determine whether the network is hosted by the business, or a nearby data thief with a portable router.  
  5. Practice Safe Surfing.  When you are connected to a public WiFi hotspot, avoid using e-commerce and banking sites, if possible.  If you must connect to these sites, make sure that no one else has a clear view of your device’s screen or keyboard while you enter usernames or passwords.  Also ensure that the sites on which you enter your information encrypt your data.  Remember that secured URLs begin with “https”.  When you are finished, log out of the site immediately.  
Following these easy steps for keeping your device (and information) secure, will go a long way to thwarting would-be WiFi hotspot hijackers.  Now you can connect with confidence.

 

Got Computer Bugs?

Call 1-204-800-3166

For Cyber-Extermination!

Filed Under: FAQ, Featured

Definition: HotSpot

March 23, 2015 by The T By D Team Leave a Comment

Definition:  HotSpot

A physical location that offers Internet access over a wireless local area network (WLAN) through the use of a router connected to a link to an Internet service provider.  HotSpots typically use WiFi technology.

Filed Under: Definitions

Definition: WiFi

March 23, 2015 by The T By D Team Leave a Comment

Definition:  WiFi

A facility allowing computers, smartphones, or other devices to connect to the internet or communicate with one another wirelessly within a particular area.

Filed Under: Definitions

Definition: SSID

March 23, 2015 by The T By D Team Leave a Comment

Definition:  SSID

Service Set Identifier

A case sensitive, 32 alphanumeric character unique identifier that is used for naming wireless networks.  When multiple wireless networks overlap in a certain location, SSIDs make sure that data gets sent to the correct destination.

The SSID is different than the name that is assigned to a wireless router.  

Filed Under: Definitions

Definition: Network Discovery

March 23, 2015 by The T By D Team Leave a Comment

Definition:  Network Discovery

A network setting that affects whether your computer can find other computers and devices on the network, and whether other computers on the network can find your computer.

Filed Under: Definitions

Definition: HomeGroup

March 23, 2015 by The T By D Team Leave a Comment

Definition:  HomeGroup

Applies to Windows7.  A homegroup makes it easier to share files and printers on a home network.  You can share pictures, music, videos, documents, and printers with other people in your homegroup.  Other people can’t change the files that you share, unless you give them permission.

Filed Under: Definitions

How-To: Ensure Your Firewall Is Enabled In Windows8

March 23, 2015 by The T By D Team Leave a Comment

How-To:

Ensure Your Firewall Is Enabled In Windows8

  1. From the “Start” screen, type “firewall”.
  2. Select “Settings” from the menu that appears on the right side of the screen.
  3. Click “Turn Windows Firewall On or Off”
  4. Select the radio buttons for “Turn On Windows Firewall” for public networks.
  5. You can also use the “Block All Incoming Connections” option from this menu.  This is suggested for added protection while on public WiFi.

Filed Under: How-To

  • « Previous Page
  • 1
  • …
  • 11
  • 12
  • 13
  • 14
  • 15
  • …
  • 52
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in