All posts by admin

Ensure Your Business Continuity with Data Backup

By | Data Recovery | No Comments

Your business wasn’t created overnight. But frighteningly, it can be lost that quickly. If management and ownership are the central nervous system behind your company, then your team are the internal organs. But your data – your data is the life blood of the entire organization.

All three are vital to your company’s survival, and it would fail with a sudden loss of any of them. The easiest of the three to lose is, of course, the data. That’s why your data backup is so crucial to your business continuity.

You Need Frequent Data Backup
How far back can you afford data to be lost? A hour’s worth? A day’s worth? Maybe a bit more? Sadly, far too often, businesses whom have secured data backup only realize after the need for data recovery that their backups are not occurring nearly often enough. Some businesses must try to continue after making the horrible discovery that their most recent backup is weeks – sometimes even months old! Your data backup is doing you very little good if your backups are not recurring on a helpful schedule.

You Need Viable Data Backups
Let’s say, then, that your backups are occurring on a satisfactorily frequent basis. You then experience a data loss, but breathe a sigh of relief when you learn your most recent backup had been performed the night before. But then – as you begin to download the recovery files – you receive an error message. It won’t proceed. The backup file – is corrupt. As are many of the less-recent backup files. Your backups were not tested for viability, and were allowed to continue archiving in their corrupt format – leaving you with essentially nothing. Can your business afford that?

You Need a Plan for Business Continuity
Both the frequency and the corruption issues aside, let’s look at another scenario: you get a call in the night – there’s been a fire. You race up to the office at 2:30 in the morning to see your entire office gutted. Everything is gone. The next day, you call your backup provider to ensure your data is safe, and after a brief check, they assure you that it is. “You can begin downloading the recovery files any time,” they tell you. That’s great – but . . . where are you going to download them? You have no server, no network. Not even a workstation left. How will your business continue if you can’t even access your data because you have nowhere to put it?

You Need Jabtech
With Backup and Disaster Recovery from Jabrech, we take steps to ensure your backups occur on a very regular basis, and all backup files are routinely tested for viability. And we’ll even sit down with you and craft a business continuity plan in the event of an officewide disaster. It’s our job to make sure you keep going. All you have to do is start the conversation.

Never Let Your Data Fall Hostage to Ransomware

By | Security | No Comments

Ever heard of ransomware? Isn’t it just another computer virus, and can’t your antivirus software just keep it out like the rest of them? If your business thinks ransomware is just another virus, or believes simple software programs will keep you safe from viruses and hackers, this blog is for you.

Let’s flashback to freshman English class ­– just for a moment. Many of the words in our language are combinations of prefixes, suffixes and compound words. Technology terms are no exception to this rule. Consider hardware, software and malware. The theme is evident; “ware” is in each word. The word hardware pays respect to older, non-digital technologies, i.e. construction tools. Think of software as a traditional instruction manual – it tells you how to use the hardware. Now, jump back to our current day and the difference is that digital technology allows our instruction manuals to do a lot of work for us. Malware, however, doesn’t pay homage to anything from the past. It’s root word “mal,” short for malicious, makes its context easily understood.

Malware is an umbrella term, which encompasses a variety of unsolicited software and computer viruses. Ransomware is one of, if not, the worst types of malware, and its intention is made known in its name. Ransomware takes your technology and data hostage, requiring you to pay for its release. In most cases, no amount of software will save your information once hackers capture it.

You don’t have to be a victim to ransomware, but planning and training are essential to maintaining your cyber-security.

Know the Enemy Behind Ransomware

First things first, hackers targeting your company with ransomware are out to make a quick buck. They use a variety of methods to seize your data, but the result is always the same. Once they have your information, they encrypt it, lock you out of it, inform you of what they have done, and then tell you the only way to unlock your data is to pay them.

Hacking communities have a code of honor, shocking as it sounds, and most keep their word and decrypt your data once they receive payment. Their scheming would fail if no one could trust them to follow through on their end of the deal. But they aren’t playing around either, as even older versions of ransomware are hard for security experts to crack.

You should never be OK buying back what you rightfully own.

Don’t give ransomware hackers the chance to hold your data hostage.

Be Prepared and Educated

Preparation starts with a business continuity plan. How will your business recover from a data loss incident caused by a virus like ransomware? The most efficient backup strategies leverage both local and cloud solutions to drive redundancy and instant up capabilities for an added level of protection. In the event of a malicious network-wide encryption, you would now be able to spin up virtual servers from your cloud backups and get back to business while your local network is being restored to its pre-ransomware state.

But for this to work, it requires regular backups and maintenance. If your backups aren’t up to date or missing current valuable data, then the hacker will still have caused you some trouble. Your company needs to be sure that its primary data source receives regular incremental backups to help avoid additional data loss. The only way to ensure your backups are ready for on-demand recovery is to have an IT professional frequently test them.

Backup planning is just one piece of the cyber-security puzzle. Even if you have enough backups for a lifetime, your productivity will diminish under the weight of having to restore data continually. 58% of data loss is attributed to human error because employees often don’t know how to identify possible viruses. Educating your users on the latest cyber-security trends and how to spot potential attacks is just as important as a backup solution because they are your first line of defense.

If your business is proactive and implements the right business continuity solution and educates your teams, you’ll never have to pay cyber criminals again. Doing these two things means that both you and your clients can rest assured that everyone’s data is secure.

Let Jabtech Be Your Watchdog

Antivirus software, while important, can only do so much. Your company needs a watchdog who can monitor your network 24/7, as ransomware will only continue to get worse. If you still underestimate ransomware and the footprint this virus is leaving, please take a look at this article.

As an experienced Managed Services Provider (MSP), Jabtech has the knowledge and tools to prevent malicious attacks from ever holding your network hostage. Give us a call when you’re ready to take your cyber-security to the next level and send those hackers packing.

Technical Support

Here’s What a Technical Support Specialist Brings to the Table

By | Technology | No Comments

If your company has ten computers or a thousand, one server or twenty, someone had to put it all together. The larger the company, the less likely it is that employees have a hand in any installation. But that’s not what you hired them for anyway. You hired them to use the equipment for work. With all that technology, however, something is bound to go wrong. When it does, someone must fix it. Make sure your company gets it right every time with a technical support specialist.

Technical Support Specialists Don’t Do Guesswork

You lose money and time every moment your network is offline. When you chance quick computer fixes to employees doing guesswork, you run the risk of perpetuating the problem or making it worse. A quick trip to Google might lead you somewhere, but how can you know you’re searching for the right solution?

Technical Support Specialists are versatile IT professionals with extensive troubleshooting knowledge. From computer and electronic systems to software applications, there’s no problem too large for the right specialist. Even if a client can’t explain what’s going on, technical support specialists can run diagnostics and explain the problem on a level customers can understand.

Technical Support Specialists Have You Covered 24/7

With managed IT services, companies can have technical support specialists on retainer. But technical support specialists don’t wait for clients to come calling. Managed Service Providers (MSP) proactively monitor their customers’ networks to stop problems before they even arise. Monitoring can go beyond fixing mechanical and software problems and includes security against malicious activity.

Technical Support Specialist Increase Your Productivity

By taking the IT hat from your employees and keeping them on the job, your company saves time and money. You can also have peace of mind with a team of professionals watching your network at all times. Beyond some of the more obvious solutions, technical support specialists are more budget friendly than paying solutions as problems arise. Think of managed services as a flat rate IT service. For a monthly fee, you have an MSP ready to fix an endless number of problems.

Jabtech Delivers

Don’t know where to start or who to call? Jabtech is a full-service MSP with a team of technical support specialists. With more than a decade of experience, we can service all your needs.

Ready for support?