Data Backups versus a Copy

October 23, 2014

In the old days of corporate computing, all data was backed up.  This was usually done using tapes that were physically connected to servers.  In the last five years, backups commonly have become cloud based.  Instead of a tape drive, servers backup their data to an Internet based server designed to handle many copies of the same files.  Backups are more than just a copy of data; backups can be restored to a specific day because backup servers keep multiple instances of all files.

On the other hand, some users copy their data to an external hard drive.  This is different than a backup because this is just one copy of all files.  Keeping a single copy of files is certainly cheaper – it takes up less space.  But the disadvantage is users have considerably fewer options.

Another advantage of backing up to an online Internet site is that it is offsite.  Should something happen to your building such as fire, flood, or tornado, your data is still readily available.

Want to discuss your options?  Contact Emerson Technologies.

Multi-factor Authentication

October 23, 2014

You log into your computer with a user name and a password.  Both of those are in your head; they are things you know.  That is different from getting cash from a cash machine, where you use your PIN, something in your head, WITH your card, something you HAVE.  Two-factor authentication uses two different types of verification, such as at a cash machine.  The possibilities are:

  • Something you know (such as a password)
  • Something you have (such as a card, cell phone or fob)
  • Something you are (a fingerprint or facial recognition)

Increasingly businesses are using a combination of two of the above options.  This approach significantly increases security.  The most commonly used method involves using a mobile phone or other physical device to generate a one-time use code that changes every minute or so, in addition to a password.  When an employee logs in, they enter their username and password, as usual.  They are then prompted for the current code on their phone.  That seemingly simple change makes attackers’ jobs very difficult.  No longer is a password sufficient to gain access to corporate resources.

In the past, these two-factor authentication systems have been prohibitively expensive for small businesses but they have now become very cost effective.  As hackers become more sophisticated we need to counter their cleverness.

Want to look at how multi-factor authentication can be setup to strengthen the security on your network?  Give Emerson Technologies a call.  We will be happy to explore economical possibilities with you!

Don’t get in the News for being Hacked!

October 23, 2014

More and more often companies are in the news because their electronic computing systems were compromised.  This leads to their customers’ personal information getting into the wrong hands.  Sadly, the most common cause is not performing basic computer maintenance.  Basic maintenance not only updates Microsoft Windows or Microsoft Office, but updates non-Microsoft products too, such as Java, Adobe products, anti-virus software and others.

What’s more, these updates can be pushed out to all of your computers without causing any user downtime.  Emerson Technologies has tools that make this process very easy.  These simple steps go a long way to ensuring the integrity of your data.

To find out how, contact Emerson Technologies.