Infocon Services, Inc. https://www.infoconservices.com Thu, 19 Mar 2015 15:11:10 +0000 en-US hourly 1 http://wordpress.org/?v=4.0.1 IT Continues To Struggle with Shadow Apps https://www.infoconservices.com/2015/03/19/it-continues-to-struggle-with-shadow-apps/ https://www.infoconservices.com/2015/03/19/it-continues-to-struggle-with-shadow-apps/#comments Thu, 19 Mar 2015 15:11:09 +0000 https://www.infoconservices.com/2015/03/19/it-continues-to-struggle-with-shadow-apps/ The first step in solving a problem that you have is admitting that you have it to begin with. To be able ...]]> shadowappsThe first step in solving a problem that you have is admitting that you have it to begin with. To be able to do that, you have to be looking at the landscape in which the problem resides with eyes that want to see it and know where to look.

In the case of “Shadow IT,” many companies don’t even know it exists, or understand what it is, and because of that, may not even be aware that they have a problem until data goes missing or gets corrupted. By then of course, it’s too late to do much more than damage control.

What Is a Shadow App?

A Shadow App is any app that the people in your company use to do the business of the company that has not been formally tested, approved, and signed off on by the IT department. Sometimes, the IT department itself uses Shadow Apps without ever bothering to formally approve them. This is especially true of handy, open-source software, but can be most anything.

If your employees are using DropBox to move files off the company server so they can access their work related data on the go they’re using a shadow app. If they’re using Skype for inter or intra-office communications, and the IT department hasn’t signed off on the program as an accepted means of communication, they’re using a shadow app. The term doesn’t mean that nobody knows about it. In fact, it’s usually the opposite case. Everyone knows about it, and they know that it’s not official company policy, but it gets the job done. It gets results. That’s why it’s being used.

Typically, the IT Department response to the phenomenon has been to follow the employees, retroactively evaluate the software and make it a part of official company guidelines, with rules about how and when they can be used, what sorts of data may be moved across them, and so forth.

The problem though, is that once employee usage conventions have been established, these after the fact policies are very hard to enforce. Besides that, barring catastrophic data loss, how would you even know, or check to see if your employees were complying with the new policies. If they aren’t, then what have you gained by spending time doing the evaluation and creating the policy?

This defines the ongoing struggle that IT Departments nationwide have with the software. Everyone knows it’s being used. Everyone acknowledges that there’s at least some, and potentially significant company data risk because of it, and no one seems to be able to get a handle on it.

Some would say that’s because the genie has been let out of the proverbial bottle, and there’s no putting it back in. Others have committed themselves to trying gamely, if nothing else. Even in the best cases, results have been mixed, lending credence to the idea that maybe there truly is nothing that can be done.

As a business owner, do you know all the apps your employees are using to move and manipulate company data? Of those, do you know how many have been officially sanctioned by your IT Department? Of the ones that aren’t, do you understand the risks imposed by those apps and their use on your company’s data and its future? These are important, significant questions.

Used with permission from Article Aggregator

]]>
https://www.infoconservices.com/2015/03/19/it-continues-to-struggle-with-shadow-apps/feed/ 0
Leverage Tech to Increase Productivity https://www.infoconservices.com/2015/03/18/leverage-tech-to-increase-productivity/ https://www.infoconservices.com/2015/03/18/leverage-tech-to-increase-productivity/#comments Wed, 18 Mar 2015 16:29:31 +0000 https://www.infoconservices.com/2015/03/18/leverage-tech-to-increase-productivity/ It has been said over and over, and proven by research and real life experience, that technology can be used to effectively ...]]> leveragetechtoincreaseIt has been said over and over, and proven by research and real life experience, that technology can be used to effectively increase productivity. One of the questions that is not often addressed is how a company, regardless of size, go from zero tech to productivity tech without interrupting the daily workflow and losing productivity in the process. If the net increase is zero productivity, then the entire transition may have been for naught.

Planning Is Primary

In smaller businesses, the transition can be made without a lot of fuss. Perhaps the biggest reason smaller business can make the change is that they are quickly evolving, so there is a growth mentality that is ongoing; incorporating new ideas or ways of doing business feels natural. But when moving up in scale to larger companies, a decline in productivity to leverage technology can set the company a step back from the competition, from which it may make some time to recover.

This is why planning is primary. Whether in the small business or the large enterprise, planning through regularly-scheduled interdepartmental meetings can considerably smooth the transition process of incorporating or upgrading technology that will increase in productivity. The goal is to create a net advantage for the company as a whole. Ensuring that every department is involved with the process means that once the plan is set in motion everyone will benefit.

Measuring Productivity

Once the plan is set in motion there has to be an objective way of measuring the actual impact on productivity. Some departments will find this easier to do than others. For example, the number of customer service calls and the quality of customer service can be measured through customer satisfaction surveys. The evidence generated will be simple to digest and easily understood. In other departments, the measurement may be more subjective. In either case, it is important to define standards by which the expected increase in productivity can be measured.

Equally important is that the measurements be performed on a periodic basis over a defined period of time. Choose to err on the side of more measurements over a longer period of time, rather than fewer measurements over a short period. Not every technology introduced will have an immediate impact, nor will there be a consistent result from every department’s measurement. It is possible that in certain cases the introduction of technology will negatively impact productivity. In this case, management needs to be honest with itself and make the necessary changes to return the department or company to its previous levels of productivity.

The question then becomes whether the investment of time and money in technology has any inherent risk associated with it. The simplest answer is “yes.” What works for one company may not work for another. The makeup of each company is unique, and its employees are chosen to meet both the requirements of the company’s culture and its expectations. Whenever a company chooses to take the step to improve its productivity, a review of everything the company’s brand represents and its overall mission should be a central part of the discussion.

Used with permission from Article Aggregator

]]>
https://www.infoconservices.com/2015/03/18/leverage-tech-to-increase-productivity/feed/ 0
The Problem With Panda Antivirus https://www.infoconservices.com/2015/03/17/the-problem-with-panda-antivirus/ https://www.infoconservices.com/2015/03/17/the-problem-with-panda-antivirus/#comments Tue, 17 Mar 2015 15:12:40 +0000 https://www.infoconservices.com/2015/03/17/the-problem-with-panda-antivirus/ If you use Panda’s free antivirus software, you could be in some trouble. There’s a problem with the software in that it ...]]> binary-system-557614_300x225If you use Panda’s free antivirus software, you could be in some trouble. There’s a problem with the software in that it identifies itself as malware, and puts core files into quarantine. When it does that, if you reboot your PC, odds are good that it won’t boot up again. It won’t be able to, because when it tries to access those core files and sees them in quarantine, it will simply shut your computer back down in order to avoid accessing the “malware” files. That’s a worst case scenario. Other scenarios include random crashes to desktop, random reboots, general instability or an inability to access the internet until the issue is fully resolved.

A spokesman for the company says that the erroneous signature file was corrected immediately, so most of the problems have been fixed, but at least one person in ten may still suffer from one or more of the above problems until a final resolution is reached.

For the time being, the company advises Panda-Free users simply not to reboot their machines, and that a permanent solution is forthcoming.

Not The First Time

Detecting viruses and malware is an inexact science, at best. Hackers are a clever lot, and relentlessly innovative. They’re constantly changing the profiles of the software they write, which means that antivirus companies must constantly evolve and adapt with them, lest something harmful get through the chinks in your virtual armor.

Because of this, it is sometimes the case that software that’s perfectly fine, safe, and even necessary for your computer to function gets flagged as malware, with often tragic results. In 2010, the venerable antivirus company McAfee, accidentally flagged and deleted one of the files essential for Windows XP to function. You can guess the result. Overnight, millions of PC’s with the software installed became little more than high-tech paperweights.

There are no perfect solutions to the problem, but big companies, Google included are paying an increasing amount of attention to the issue. In addition to their “Project Zero” program which researches and identifies potential exploits in commonly used software, the company owns VirusTotal, which has begun collaborating with a number of antivirus software makers in an effort to research the issue and see if a way can be found to reduce the number of false positives that antivirus software reports.

What To Do About It

This is not a sign that you should immediately dump Panda in preference for some other antivirus solution, although that may be a temptation, in light of the issue. The reality though, is that these things happen. It’s a risk, any time you install any antivirus program made by any company. You won’t gain immunity by switching to some other company, and you may well inadvertently stumble into using the next software that sees such a malfunction.

For the time being, heed the company’s advice and don’t reboot your machines. These kinds of problems put enormous pressure on the company making the software to see that they’re resolved quickly, so this problem will not have a long shelf life.

Image Credit: Gerd Altmann

Used with permission from Article Aggregator

]]>
https://www.infoconservices.com/2015/03/17/the-problem-with-panda-antivirus/feed/ 0
DRAM Rowhammer Allows Hackers to Gain Kernel Privileges https://www.infoconservices.com/2015/03/16/dram-rowhammer-allows-hackers-to-gain-kernel-privileges/ https://www.infoconservices.com/2015/03/16/dram-rowhammer-allows-hackers-to-gain-kernel-privileges/#comments Mon, 16 Mar 2015 16:26:07 +0000 https://www.infoconservices.com/2015/03/16/dram-rowhammer-allows-hackers-to-gain-kernel-privileges/ Google’s “Project Zero” security initiative is bearing fruit, unearthing security issues we’ve never seen before, in hopes of getting them patched before ...]]> dram_rowhammerGoogle’s “Project Zero” security initiative is bearing fruit, unearthing security issues we’ve never seen before, in hopes of getting them patched before the hacking community can begin to exploit them. In this instance, the hack has nothing to do with software, but with RAM, making it an exceptionally dangerous, exotic bug.

The technique, dubbed “Rowhammer” by Yoongu Kim in a paper titled “Flipping Bits in Memory Without Accessing Them,” should be considered an unintended side effect of accessing memory, rather than a proper bug. It relies on the physical structure of certain DRAM chips, the memory components of which are arrayed in rows. By repeatedly accessing one “row” of memory, you can sometimes alter an adjacent row. In other words, hammer one row of memory, and you can disturb and adjacent region, thus, its name.

As the title of this piece indicates, when done correctly, it can allow a hacker to gain kernel privileges, essentially giving them run of the entire machine.

Google’s Project Zero team tested a variety of laptops built between 2010 and 2014, using an assortment of DDR3 DRAM chips and found the vulnerability to be present in 15 of the 29 tested. Their report can be found here.

Manufacturers of these devices were aware of the problem but failed to report it or notify the public and instead regarded it as a simple reliability issue. The Google team, however, found a way to exploit the “reliability issue” to gain control of the machine. Their conclusion is that if the companies manufacturing these machines with “reliability issues” been more forthcoming, more attention would have been paid to the problem sooner and a patch or fix found. As it stands, they assumed that it would be too exotic and difficult to exploit.

One Bright Spot

The good news in this case is that DDR4 DRAM chips are not vulnerable to Rowhammer style attacks. The bad news is that there are a number of machines in service today, built between 2010 and 2014 using potentially-vulnerable DDR3 DRAM.

How Dangerous Is it?

It should be noted that the Google team was only able to gain kernel privileges using extraordinary techniques and exploits. This is not to say that it would be impossible for a determined hacker to do likewise, but in terms of threat level, this has to be regarded as fairly low. Is it cause for concern? Absolutely yes, because if such an attack were to succeed on your system a hacker could gain total control.

The best way to reduce your exposure to zero is to upgrade to DDR4 DRAM. Is it likely to be exploited? That is impossible to say, but the odds seem low. It is not outside the realm of possibility, but bugs like FREAK and Heartbleed from several months ago represent a much greater, more immediate threat and should be handled with greater urgency.

Kudos to the Google Project Zero team for bringing another security flaw to light. This one might not be as dire as some of the others we’ve seen in recent months, but it still bears further investigation.

Used with permission from Article Aggregator

]]>
https://www.infoconservices.com/2015/03/16/dram-rowhammer-allows-hackers-to-gain-kernel-privileges/feed/ 0
Business Begins to Adopt Drones https://www.infoconservices.com/2015/03/14/business-begins-to-adopt-drones/ https://www.infoconservices.com/2015/03/14/business-begins-to-adopt-drones/#comments Sat, 14 Mar 2015 16:30:01 +0000 https://www.infoconservices.com/2015/03/14/business-begins-to-adopt-drones/ The drones are coming. The FAA has now taken the first step toward making commercial use of drones a viable option. While ...]]> businessbeginstoadoptdronesThe drones are coming. The FAA has now taken the first step toward making commercial use of drones a viable option. While they have yet to create a set of rules governing their use, they have issued guidelines, and they’ve begun to allow some companies regulatory exemptions so that they can begin experimenting with putting the aircraft into service.

So far, the recommended guidelines are fairly sparse, but they do include details such as a recommendation to fly at an altitude of no more than 400 feet, so as not to interfere with commercial air traffic, and a maximum cargo carriage of 55 pounds.

The Business Case for Drones

Drones cannot and will not replace all forms of shipping, but it’s clear that they could be disruptive to certain segments of that market. Domino’s Pizza, for example, has already begun experimenting with pizza delivery via drone, and Amazon’s Jeff Bezos has been talking about using a drone-based delivery system for many of the products Amazon sells.

There are other business cases to be made for drones. For example, they could be used to replace some security staff at sensitive locations. Obviously some physical security would still be needed, but drones make the ideal monitoring platform. Small, unobtrusive, quiet, and in operation twenty-four hours a day. Even if the use of drones in this case didn’t reduce headcount, it would certainly enhance a security team’s effectiveness.

Drones could also be used for things like building inspections, and even customer service, in cases where a replacement component needed to be delivered to a client or worker in the field.

It’s an important first step, but it is just that – a first step. The FAA will need to issue clear and comprehensive rules so that businesses know what is and is not allowed before you can expect to see mass, rapid adoption of the technology. Even so, estimates are that by 2018 there will be some 7500 commercial drones in the skies.

A (Potential) Strategic Advantage

The two biggest advantages that drones provide to companies are their flexibility and their efficiency. In terms of flexibility, they can be configured for a variety of missions and purposes, especially in cases where it might be physically dangerous to send one of your employees. From a pure liability standpoint, in some cases, it would make much more sense to send a drone, rather than risking the health and/or safety of an employee. In terms of efficiency, here, we’re speaking strictly in terms of overhead cost. If a case can be made in your particular business to use drones for delivery or other tasks, then one of the key drivers of that decision is likely to be cost, as compared to keeping a full time employee in place and paying him or her benefits. Drones don’t get sick and they don’t need time off, except in cases of maintenance.

The bottom line is that while drones may not be a fit for every business, they clearly have a place. Now that the FAA has taken these initial steps, more and more businesses will be taking a hard look at the technology to see where and how it might be deployed.

Used with permission from Article Aggregator

]]>
https://www.infoconservices.com/2015/03/14/business-begins-to-adopt-drones/feed/ 0
Protecting Yourself from FREAK https://www.infoconservices.com/2015/03/13/protecting-yourself-from-freak/ https://www.infoconservices.com/2015/03/13/protecting-yourself-from-freak/#comments Fri, 13 Mar 2015 17:45:23 +0000 https://www.infoconservices.com/2015/03/13/protecting-yourself-from-freak/ There’s a new SSL security flaw that’s making the news, and as usual, it has the major tech companies scrambling to provide ...]]> protecting_yourself_from_freakThere’s a new SSL security flaw that’s making the news, and as usual, it has the major tech companies scrambling to provide patches. In some cases, patches are available now. In others, they’re still about a week away. Here’s what you need to know and how to guard against it.

Background

This latest security flaw is actually quite old, but only recently discovered. Essentially, this is an artifact of an earlier era in computing. As our security measures have grown more robust new architecture has been built atop the old, without stripping the old out. This, of course, has set up a situation where a savvy, observant hacker can exploit the old code that’s still built into the system, completely circumventing the new, more robust security measures.

Scope of Impact

Originally, this was reported as an Apple issue, but it has since come to light that Microsoft and Android devices are impacted as well. In fact, most devices are impacted, including those running Windows Vista, 7, 8, 8.1, and Windows Server 2003. It stands to reason that older and unsupported operating systems are also vulnerable. It’s all the more reason to do that upgrade you’ve been putting off, because in the case of unsupported OS’s, no help is coming. If you don’t upgrade, you’re going to remain vulnerable to the threat this newly revealed security flaw represents.

In addition to these, the Android browser is vulnerable, as is Internet Explorer, pre-update-41 Chrome, and Opera. Patches are all forthcoming, but at present, the safe havens are Chrome 41 and Firefox. Switch to either of these until the other patches are officially released.

Also note that if you’re using Server 2012 or Server 2008, but have those configured for desktop use, you’re also vulnerable. Tablet and Phablet users will need to wait for the manufacturer to release patches before they’re fully covered, even after Google patches the Android OS.

All of that to say, this is a very big, pervasive security flaw that impacts an enormous number of machines.

Implications of Not Taking Precautions

Opting to not protect yourself will leave system’s passwords at risk. A hacker can use the exploit to gain root level access, take control of the machine and ferret out all passwords stored on the device in question. That poses a simply unacceptable security risk for most, so the best course of action is to take what steps you can to minimize your exposure, await the patches, and then apply them as soon as they are available.

Unfortunately, there will be more of these. Based on the evolution of security protocols and how they have been applied, it’s all but certain that we haven’t seen the last of these kinds of issues. Kudos to the tech companies for stepping up and releasing patches as quickly as they are able, but no matter how quickly they act, there’s still a window of time in which you and your company are vulnerable.

Used with permission from Article Aggregator

]]>
https://www.infoconservices.com/2015/03/13/protecting-yourself-from-freak/feed/ 0
You Need To Build THIS into Your BYOD Policy Now https://www.infoconservices.com/2015/03/12/you-need-to-build-this-into-your-byod-policy-now/ https://www.infoconservices.com/2015/03/12/you-need-to-build-this-into-your-byod-policy-now/#comments Thu, 12 Mar 2015 16:30:20 +0000 https://www.infoconservices.com/2015/03/12/you-need-to-build-this-into-your-byod-policy-now/ The great problem with free apps is that they’re often developed by very small companies. That’s not an inherently bad thing, but ...]]> buildthisintoyourbyodpolicyThe great problem with free apps is that they’re often developed by very small companies. That’s not an inherently bad thing, but these tiny development houses usually can’t afford to do a lot of QA and bug fixing or checking. Often, that can lead to free apps that have giant security holes in them. Security holes like the ones you so often find in free apps can then be used by hackers to gain access to the handheld device in question, and by extension, any and all data on it.

Implications for Your Business

Increasingly, companies are embracing the idea of BYOD – Bring Your Own Device. They almost have to, because employees will do it anyway. The barriers that once prevented easy access to company data from non-standard, non-company approved devices are all but gone. People want to be able to use the handheld of their choice, and the combination of cloud-based technology and high-speed, low-latency wireless connectivity makes it a foregone conclusion that employees will, one way or another, access company data on their own devices.

Since business can’t stop it from happening, the next best thing is to build policy around it and try to control the access as best they’re able. An essential element of that strategy needs to include some type of accountability. For example, an agreement on the part of the employee that if they intend to use one of their own devices to access company data there should be restrictions on the type and number of non-business apps placed on that device.

Free, unsecured, and often badly written apps can contain backdoors as described above, and that not only puts the employee’s device at risk, but any company data they accessed with it. This, of course, is a bit of a grey area, and can be a touchy subject. After all, the device does not belong to the company, how can they mandate to the employee what they can, or cannot install on their own equipment? Pushback of some kind is all but inevitable.

The point of separation though, is this: Employees can put whatever apps they want on their own equipment, sure. What they can’t do is put company assets at risk by doing so. There’s actually a fairly simple solution for the apparent problem, and it comes from the sheer number of handhelds in service today.

There are more handhelds in active use than there are people living on the planet, and not everyone, everywhere, has one. That means, by definition, that most of the people who do have one probaly have two. Thus, the solution is made clear. On the device you choose to bring to work, don’t put apps on it that will, or could, threaten the integrity of company data. On your alternate device – the one you use at home for pleasure, put whatever you like on it.

There will probably still be some pushback, but the logic of the position is sound, and your employees will respect it. Provided, of course, that you have it built into your policies from the start, and are upfront about both it, and the reasons that stand behind the decision.

Used with permission from Article Aggregator

]]>
https://www.infoconservices.com/2015/03/12/you-need-to-build-this-into-your-byod-policy-now/feed/ 0
Are Mobile Payments More Secure Than Credit Cards? https://www.infoconservices.com/2015/03/11/are-mobile-payments-more-secure-than-credit-cards/ https://www.infoconservices.com/2015/03/11/are-mobile-payments-more-secure-than-credit-cards/#comments Wed, 11 Mar 2015 17:45:18 +0000 https://www.infoconservices.com/2015/03/11/are-mobile-payments-more-secure-than-credit-cards/ Most people are of the opinion that credit card transactions are fairly secure, in spite of the fact that over the past ...]]> aremobilepaymentsmoresecureMost people are of the opinion that credit card transactions are fairly secure, in spite of the fact that over the past eighteen months there have been a number of fairly large breaches in which millions of customer transactions were exposed. The reality is that mobile payments on platforms like Apple Pay, are even more secure.

Key Differences

It comes down to better technology. Mobile payment platforms simply have more tech to work with. The vast majority of credit cards still operate using a simple magnetic stripe, which is itself unsecure, and while the transaction processing software that actually handles the transfer of funds is fairly robust, there’s nothing inherently secure about the cards themselves. They are prone to being digitally stolen, and this is, in fact, a fairly common practice amongst tech-savvy thieves.

Contrast that with the mobile payment device platform, and the differences are striking. Using Apple Pay as an example, we find that the user’s actual financial data are stored on a special chip inside the device. When transactions are made, the user’s actual account information is never used. Rather, proxy account numbers are given. This is pivotal, because if the vendor that the individual purchased from was hacked, then all the hackers would get from that individual would be the proxy numbers. They would be worthless on the black market because there would be no actual account number to which the information was tied and thus no exposure.

That difference alone makes mobile payment platforms like Apple Pay much more secure than old style plastic credit cards, but it doesn’t stop there. Apple also uses a security token system to help better track purchases for the purposes of identifying fraud, and (at least with Apple Pay in particular) the system cannot be accessed except via biometrics, using the phone’s built-in thumbprint scanner.

Any one of those by themselves would make mobile platform payment systems more secure than their credit card counterparts, but taken together, there’s just no contest. It’s true that some credit card companies are trying to modernize by offering “smart cards.” These do have some updated security features that make them more secure in contrast to the old style magnetic stripe credit cards, but there’s only so much you can do with a credit card. The additional security features aren’t even in the same league with what you find in the world of mobile payment platforms.

With the plethora of mobile payment features, the explosion in popularity of handheld devices, and a greater comfort level with digital life in general it’s more likely than ever that we’ll finally see the advent and widespread use of the digital wallet. We’ve had the core technology to make that a reality for a few years now. What’s been lacking to this point was consumer confidence in the platform and its security. That seems to be changing, and we could well be on the cusp of a paradigm shift in retail and payment processing. Are you positioned to take advantage of it?

Used with permission from Article Aggregator

]]>
https://www.infoconservices.com/2015/03/11/are-mobile-payments-more-secure-than-credit-cards/feed/ 0
Energy, Technology, and You https://www.infoconservices.com/2015/03/10/energy-technology-and-you/ https://www.infoconservices.com/2015/03/10/energy-technology-and-you/#comments Tue, 10 Mar 2015 18:58:14 +0000 https://www.infoconservices.com/2015/03/10/energy-technology-and-you/ There is a sea change occurring in the area of electricity generation, and whether you realize it or not, whether you think ...]]> energyThere is a sea change occurring in the area of electricity generation, and whether you realize it or not, whether you think about electricity beyond paying your monthly bill, it is going to have an impact on you and your business.

What’s Changing?

The first, biggest change at the strategic level has been China’s big push into the solar market. The country’s massive economies of scale have brought the price of solar down to the point at which it’s price-competitive with coal in many areas of the country. In fact, some states have embraced solar so completely that it now accounts for a majority of their power generation. Hawaii, for example, doesn’t even need to turn its diesel generators on if it’s a sunny day. Solar provides 100% of their daily power needs. An extreme case? Sure, but it clearly shows the trend. A lot of that is thanks to China’s entry into the global solar market.

Another big change where electricity generation is concerned is in storage. Over the past ten years, battery capacity has doubled, then doubled again, while the price has fallen by more than half. This has made possible, to cite one example the Tesla with its 300 mile per charge capacity, and there’s more on the way. Elon Musk, the owner of Tesla Motors, has invested a staggering five billion dollars into a state-of-the art battery facility, right here in the United States.

As the nation continues to embrace renewables, another change, the importance of which cannot be overstated, is the fact that our power generation is becoming increasingly decentralized. Net metering laws in a majority of states is helping this along greatly. What it means is that individual people and businesses are taking an increasing role in providing at least some of their own power and making up the difference by tapping into the grid. Some companies, such as Google, actually aim as part of their business plan to be a net power producer, turning the generation of electricity into a profit center instead of having to pay a monthly bill to the power company.

What About Oil?

It is true – the price of oil has been quite low in recent years, causing some to speculate that the low cost per barrel will derail the huge run that renewables have had. This, however, misses a compelling point. Most people get their electricity from coal-fired plants, not oil-driven plants. Thus, the price of a barrel of oil, whatever it is, doesn’t have any real impact on the overall cost of generating electricity.

Aside from that, consider the following scenario. Two investment options. One has a cost curve that has been steadily and consistently plunging for decades. The other is subject to sharp spikes upwards and downwards, but has historically tended upwards, which investment would you make?

The former describes the cost curve for solar, while the latter describes the cost curve for oil. Solar and other renewables are now firmly entrenched in our economy. They’re the way forward and they’re transforming energy markets, which in turn, are transforming every business that relies on electricity, which is to say all of them.

Used with permission from Article Aggregator

]]>
https://www.infoconservices.com/2015/03/10/energy-technology-and-you/feed/ 0
What to Look For in a Managed Service Provider https://www.infoconservices.com/2015/03/09/what-to-look-for-in-a-managed-service-provider/ https://www.infoconservices.com/2015/03/09/what-to-look-for-in-a-managed-service-provider/#comments Mon, 09 Mar 2015 17:45:05 +0000 https://www.infoconservices.com/2015/03/09/what-to-look-for-in-a-managed-service-provider/ Today, many business that are looking for ways to cut costs while managing their websites and other technological and resource related tasks ...]]> What_to_Look_for_WhenToday, many business that are looking for ways to cut costs while managing their websites and other technological and resource related tasks have found Managed Service Providers to be the answer to their needs. Managed Service Providers (or MSPs) provide managing, monitoring and resolutions of problems for IT systems within a business. The problem is that there are many service providers billing themselves as Managed Service Providers when all they really offer is a flat rate service package, rather than all of the necessary components found in professional Managed Service Providers. Before actually taking the plunge and hiring an MSP, it’s a good idea to understand what a Managed Service Provider should offer and how to tell if they will be an asset to your business.

What does a managed service provider do?
A managed service provider will monitor your systems (through Managed Service Software) 24/7 for any problems or potential problems and alert you to them in a timely fashion. A managed service provider will also fix most problems such as security holes, software glitches, server problems, email service problems and so on. Basically, any foreseeable problem that may cause your company substantial productivity and/or financial loss will be caught and addressed by your managed service provider in order to keep your IT infrastructure running smoothly, with little to no downtime.

What should I keep in mind when hiring a managed service provider?
A few things you might want to consider when hiring a Managed Service Provider are the following:
• Do they have a proven track record?
• Do they have a comprehensive package or portfolio to address all of your business needs?
• Do they offer 24/7 support with immediate answers to concerns or questions?
• Are they focused on security and do they make your IT security their top priority?
• Are they focused on customer service and providing the best service available?
• Do they offer a reasonably priced service compared to other MSPs?

How can I tell if they are legitimate?
One thing you should do before you hire a Managed Service Provider is check with other businesses to see whether they have a good track record. You can find reviews online of many different managed service providers, which will also help you to make an informed and educated decision on who to hire. You should look for whether they provide ALL necessary managed services to keep your IT infrastructure safe and secure as well as keeping your systems running at peak performance. Some Managed Service Providers only offer one or two services, such as connectivity and data backups, and some only offer after-the-fact assistance, such as help if your database goes down, or if your network goes offline; you can call them and they will fix it. A managed service provider should offer monitoring services that monitor all of the key components in your network infrastructure and should be alert to any possible problem so that it can be immediately addressed, often before it actually breaks.

A good managed service provider will also be able to offer advice to help maximize your IT efficiency, alerting you to better software solutions, integrated database functionality, tighter security measures and other things of this nature. You should also be able to contact your MSP to ask questions, get advice on running your IT infrastructure and be provided with helpful advice to maximize your overall security and proficiency. If they don’t offer this kind of service, the best advice I can offer you is to look elsewhere for an MSP who does. There are many competing service providers and if one doesn’t offer what you need, keep looking. Don’t settle for less than what your business deserves.

How much is it going to cost?
A good managed service provider will not be cheap, but it should be affordable cost-effective. Most MSPs charge a flat monthly fee for their service, based on the level of services, number of networked devices and other infrastructure factors. Managed service providers will be able to work with you to discover exactly what services you need and set up a plan that meets your budget, while providing a proactive monitoring solution to keep your systems running at peak performance. In order to find the best pricing, you will need to check out several recommended managed service providers and get price quotes from each. You will then be able to factor in what services are provided for what costs by which MSPs and make an informed decision on which one will be the best match for your particular IT needs.

To put it succinctly, the more research you do, the greater your success will be in finding the perfect Managed Service Provider for your needs. Keep in mind the basics outlined here, and you should have no problem finding the right managed service provider for your particular business and IT needs. Once you have found the right MSP, you’ll see a dramatic difference in your IT Infrastructure with reduced downtime, increased operating proficiency, reduced operating costs and a well-running and secure IT infrastructure.

Used with permission from Article Aggregator

]]>
https://www.infoconservices.com/2015/03/09/what-to-look-for-in-a-managed-service-provider/feed/ 0