Sep 29, 2009

Cyber Insurance

Great article by Kim Komando. She lives in Phoenix AZ and is fabulous at teaching about computers and technology! Enjoy the article and you may also want to visit her website or facebook account!

proAktivR Basics

proAktivR Questions and Answers
the low cost solution to a healthy computer network

What exactly does proAktivR do?
Our computer services are very simple. We remotely watch over and verify accuracy in 4 basic areas: (1) Data Backup and Recovery (2) Virus’ (3) Software Patches and Updates (4) User Activity & Compliance with corporate IT policies. Your company’s future may be in jeopardy if you are exposed in even one of these areas. Don’t risk it! Call in the watchdogs!

I think we already do backups. Why would I need to sign up for your Backup Monitoring & Verification?
Many companies THINK they have a backup routine. Many companies, unfortunately, have to learn the hard way that their “backups” haven’t been running properly, if at all. We analyze your data and configurations, set you up on a good backup routine either on equipment at your office, or online through our affiliation with Mozypro. We then monitor your backups EVERY DAY to make sure they have executed properly and backed up all data as required. We communicate with your contact person EVERY DAY letting them know the status of the backup and if there have been any problems that need to be addressed.

Why would I need your Virus Protection Monitoring & Verification? I already have virus software.
Virus protection in this day and age is of vital importance – second only to data backups. In a corporate network environment simply running standard virus software is not enough. Similar to our Backup Service, our Virus Service will monitor your systems in detail on a weekly basis. We make sure your anti-virus software is running and up to date with the most recent virus definitions. We analyze activity on your systems and watch for possible risks and threats. We communicate with you weekly with status updates and advice on action items.

What is the Software Patches and Updates Monitoring & Verification?
Software Patches and Updates go hand in hand with keeping an eye on virus activity. Unfortunately, there are people out there looking for opportunities to send viruses your way and compromise your corporate information. These “hackers” can find “holes” in software and voila, your information has been compromised. Microsoft software holds the biggest lure for such hackers. Fortunately Microsoft knows this and is dedicated to providing free patches and updates for their customers. We keep you current on these updates and patches and communicate the status weekly.

Why would I need you to Monitor & Verify User Compliance with our corporate IT policies?
Using software that is installed on workstations at your place of business, we track and monitor activity, including internet sites visited, email sent and received, files opened from emails, anything that happens on the computers will be tracked. You decide the level of monitoring based on your corporate policies. Why do you need this? Keeping your systems and information safe and running well means making sure employees are not compromising your company through risky behavior. It’s not about looking over employees shoulders; it’s about protecting your business and your information. It’s about figuring out why one particular computer seems to crash constantly - costing you time and money with your IT person. We monitor this activity, keep you abreast to what’s going on, and give you our expert advice on how to make corrections and educate your employees.

Contact Us
For more information on proAktiv R services please contact Kristin Qualls at or call 425-788-1181. Even if you are not interested in our services right now – I welcome your friendship! Maybe you can find some helpful tidbits from posts I’ve made or maybe we just enjoy chatting back and forth once in awhile! (my blog)

Are Employee's Compromising your Data?

You've heard it before - company get's attacked by virus - data integrity is compromised. How does it happen? Why are companies so vulnerable to these attacks? According to an article by Information Week Business Technology, the problem may lie with your employees.

"The findings from a global security study on data leakage revealed that the data loss resulting from employee behavior poses a much more extensive threat than many IT professionals believe."

"In the hands of uninformed, careless, or disgruntled employees, every device that accesses the network or stores data is a potential risk to intellectual property or sensitive customer data. Magnifying this problem is a disconnect between the beliefs of IT professionals and the realities of the current security environment for countless businesses. The new findings show that "insider threats" have the potential to cause greater financial losses than attacks that originate outside the company.

As a company committed to helping neutralize these threats, we have long encouraged our customers to write policies and procedures in respect to internet and email usage. The best and most safe route is to restrict usage of the internet to those websites that your IT professional has already researched and deemed "safe". Set employees up without administrator access rights such as installing programs and downloading files. Restrict email attachments - possibly setting up an alternative way for receiving them. There are many options you can discuss with your IT professional. Of course, in reality, you can't restrict employees to the extent that their hands are tied and they can't even do their jobs and use the awesome technology at their disposal to assist and empower them to do their work. It's a fine balance and one that each company has to explore for themselves - deciding what level of risk they are comfortable with.

Maybe you have questions about security risks and how vulnerable your company is ... maybe you know that you have some level of protection but are worried about if it's even working properly - do you even have your data backed up - are you sure?

Call or email us - we'd love to visit with you and suggest ideas you can do yourself - or we have services to address these areas if that is what you feel will work for you company. What ever you do, don't ignore IT Security - it could mean the difference between being in business and going out of business.