Small Business Technology Challenges

74
Overcoming the IT Hurdle

description

A presentation for non-technical people on the technology challenges facing small businesses, and some solutions for overcoming them.

Transcript of Small Business Technology Challenges

Page 1: Small Business Technology Challenges

Overcoming the IT Hurdle

Page 2: Small Business Technology Challenges

Background – Infinity Technologies

  Started in 1996 – Retail Software

  Provide IT Support and Phone Systems

  9-person Tech Staff – Microsoft Certified

  Small Business Focus – 5 to 50 Users

Introduction

Page 3: Small Business Technology Challenges

The Five Biggest IT Challenges Facing Small Business

Introduction

1.  Data Loss 2.  Security Vulnerabilities 3.  Downtime 4.  Cloud Confusion 5.  Productivity Problems

Page 4: Small Business Technology Challenges

Recommendation: Have a plan to manage your IT

Introduction

1.  Develop a ‘Playbook’ (living document) 2.  Systemize 3.  Delegate tasks and duties 4.  Plan ahead as much as possible

Page 5: Small Business Technology Challenges

Technology solutions are still seen as critical to survival

The market for small and midsize IT spending in the US continued to grow through the recession, moving from $305 billion in 2007, to a projected $411 billion in 2012.

Compass Intelligence. “SMB Mania: Analysis of vendor marketing strategies targeting the SMB market.” September, 2008.

Introduction

Page 6: Small Business Technology Challenges

Small businesses’ IT spending tends to involve outsourcing

“CONVENTIONAL WISDOM ONCE TOLD US THAT A COMPANY WITH 1,000 EMPLOYEES IS MORE SUCCESSFUL THAN ONE WITH JUST TEN EMPLOYEES. TODAY, THAT WISDOM HAS BEEN TURNED ON ITS HEAD AND WE ARE SEEING SMALL AND MIDSIZE BUSINESSES ACHIEVING RECORD GROWTH, AND ACCOMPLISHING MORE WITH FEWER RESOURCES.”

Compass Intelligence. “Stimulating SMB: Small and mid-size business IT market today & a look at the latest survey results.” September,

2009.

Introduction

Page 7: Small Business Technology Challenges

Small businesses’ IT spending tends to involve outsourcing

Page 8: Small Business Technology Challenges

Threat #1

Page 9: Small Business Technology Challenges

The data loss threat is real

Threat #1: Data Loss

70 percent of small firms that experience a major data loss go out of business within a year.

Contingency Planning, Strategic Research Corp and DTI/Price Waterhouse Coopers (2004) and is widely quoted in places

such as: Diana Shepstone, National data awareness project launched to help businesses prevent data disasters ( Data Centre Solutions, Jan. 8, 2007)

Page 10: Small Business Technology Challenges

Equipment theft/loss has become more prevalent as the number of mobile and remote workers has increased

Threat #1: Data Loss

34 percent of small and mid-size businesses admitted that they have lost a company laptop.

30 percent of respondents have important data contained on the laptop, which is not backed up in the office.

Insight UK Survey, 2009.

Page 11: Small Business Technology Challenges

Redundancy is the key to an effective Data Protection Strategy

Threat #1: Data Loss

RAID

Offsite External

Page 12: Small Business Technology Challenges

Redundancy is the key to an effective Data Protection Strategy

Threat #1: Data Loss

RAID

Offsite External

1. Inexpensive 2. Set and Forget 3. Fairly Standard 4. Local

Page 13: Small Business Technology Challenges

Redundancy is the key to an effective Data Protection Strategy

Threat #1: Data Loss

RAID

Offsite External

1. Hands On* 2. Device Dependant 3. Software Costs 4. Local

Page 14: Small Business Technology Challenges

Redundancy is the key to an effective Data Protection Strategy

Threat #1: Data Loss

RAID

Offsite External

1. Device Dependant 2. Local 3. Subscription* 4. Degree of Trust 5. Configuration

Page 15: Small Business Technology Challenges

Online Backup is a standard Best Practice

Threat #1: Data Loss

“YOUR BACKUP MUST BE OFFSITE, SECURE, AND AVAILABLE FOR RECOVERY 24/7. ONE POPULAR OPTION THAT MEETS THE ABOVE CRITERIA, WITH THE ADDED BENEFIT OF EASE OF USE AND AUTOMATION, IS ONLINE BACKUP.”

Walzer, Jennifer. “Small business guide: Disaster recovery. New York Times, September 9, 2009.

Page 16: Small Business Technology Challenges

Redundancy is the key to an effective Data Protection Strategy

Threat #1: Data Loss

RAID

Offsite External

Total Solution (sort of…)

Page 17: Small Business Technology Challenges

Redundancy is the key to an effective Data Protection Strategy

Threat #1: Data Loss

RAID

Offsite External

Total Solution (sort of…)

..if you Verify & Test

Page 18: Small Business Technology Challenges

Monitoring the success/failure results of backups is critical

Threat #1: Data Loss

It is therefore important that backups are not only automated to avoid human error but also periodically tested. It is useless having a backup system if restoration does not function as advertised.

“Security Threats: A Guide for Small and Mid-Sized Nonprofits, Brad Dinerman and GFI Software, 2009

Page 19: Small Business Technology Challenges

Threat #2

Page 20: Small Business Technology Challenges

In many cases, Security is viewed strictly as a cost center

Threat #2: Security Vulnerabilities

“WHEN ECONOMIC CIRCUMSTANCES LOOK DIRE, IT IS EASY TO TURN SECURITY INTO A CHECKLIST ITEM THAT KEEPS BEING PUSHED BACK. HOWEVER THE REALITY IS THAT, IN SUCH SITUATIONS, SECURITY SHOULD BE A PRIMARY ISSUE. THE LIKELIHOOD OF THREATS AFFECTING YOUR ORGANIZATION WILL PROBABLY INCREASE AND THE IMPACT CAN BE MORE DETRIMENTAL...”

Dinerman, Brad. “Security threats: A guide for small and mid-size nonprofits.” GFI Software, 2009.

Page 21: Small Business Technology Challenges

Threat #2: Security Vulnerabilities

“Trend Micro 2008 Annual Threat Roundup”. Trend Micro, 2009

Page 22: Small Business Technology Challenges

Exploit and attack threat levels continue to increase

Threat #2: Security Vulnerabilities

“Trend Micro 2008 Annual Threat Roundup”. Trend Micro, 2009

Page 23: Small Business Technology Challenges

Threat #2: Security Vulnerabilities

Page 24: Small Business Technology Challenges

Botnets have become an extreme threat

Threat #2: Security Vulnerabilities

Botnet is a jargon term for a

collection of software agents, or robots, that run autonomously and automatically.

Botnet From Wikipedia, the free encyclopedia

Page 25: Small Business Technology Challenges

Exploit and attack threat levels continue to increase

Threat #2: Security Vulnerabilities

Altogether, ZeuS and other botnets control more than 100 million computers. This gives cybercriminals more computing power than the entire world's supercomputers combined.

Trend Micro. Threat Encyclopedia 2010.

Page 26: Small Business Technology Challenges

ZeuS Server installation page

Threat #2: Security Vulnerabilities

“ZeuS A Persistant Criminal Enterprise”. Trend Micro, 2010

Page 27: Small Business Technology Challenges

Security providers struggle to keep up

Threat #2: Security Vulnerabilities

“Trend Micro 2008 Annual Threat Roundup”. Trend Micro, 2009

Page 28: Small Business Technology Challenges

Threat #2: Security Vulnerabilities

Page 29: Small Business Technology Challenges

Social Media has become a favorite method for exploits

Page 30: Small Business Technology Challenges

Social Media has become a favorite method for exploits

Page 31: Small Business Technology Challenges

Exploit and attack threat levels continue to increase

Threat #2: Security Vulnerabilities

Going into 2010, it is likely that social networks will continue to be the target of cybercriminals. However, it is also likely that social networks will be further used by legitimate businesses seeking new ways in which to communicate and engage with customers. For the business the challenge is how to harness the benefits of social networks while ensuring their own business networks remain secure.

Trend Micro, Inc. “The future of threats and threat technologies.” December, 2009.

Page 32: Small Business Technology Challenges

Attacks are trending to be more localized and targeted

Threat #2: Security Vulnerabilities

“OVER THE PAST FEW YEARS, THE THREAT LANDSCAPE HAS SHIFTED, THERE ARE NO LONGER ANY GLOBAL OUTBREAKS, AS WERE PREVIOUSLY EXPERIENCED WITH SLAMMER OR CODERED. EVEN THE MUCH-COVERED CONFICKER INCIDENT OF 2008 AND EARLY 2009 WAS NOT TRULY A GLOBAL OUTBREAK—RATHER IT WAS A CAREFULLY ORCHESTRATED AND ARCHITECTED ATTACK. GOING FORWARD, LOCALIZED AND TARGETED ATTACKS ARE EXPECTED TO GROW IN NUMBER AND SOPHISTICATION.”

Trend Micro, Inc. “The future of threats and threat technologies.” December, 2009.

Page 33: Small Business Technology Challenges

Advice for Businesses: PREVENTION

Threat #2: Security Vulnerabilities

1.  Keep your PC/network security current 2.  Choose secure passwords 3.  Educate staff on safe web usage 4.  If possible, limit web surfing through

Content Filtering 5.  Do regular scans for spyware infections

Page 34: Small Business Technology Challenges

Threat #3

Page 35: Small Business Technology Challenges

Downtime can be the result of many possible factors

Threat #3: Downtime

Page 36: Small Business Technology Challenges

The costs associated with downtime can add up quickly

Threat #3: Downtime

"In a new study on network downtime, Infonetics Research found that medium businesses (101 to 1,000 employees) are losing an average of 1% of their annual revenue, or $867,000, to downtime.” Infonetics Research. The Costs of Downtime: North American Medium Businesses 2006

Page 37: Small Business Technology Challenges

Typical Small Business:

Threat #3: Downtime

Page 38: Small Business Technology Challenges

Economic conditions have forced many businesses to put off purchases of IT equipment

Threat #3: Downtime

“To survive what many view as the worst economic downturn since the Great Depression, 69 percent of manufacturers indicated they reduced their workforce, followed by delaying capital expenditures (66 percent), negotiating with suppliers for better deals (48 percent) and cutting promotional activities (37 percent).

Society of Manufacturing Engineers. “Manufacturers detail recession survival strategies in new survey.” September 3, 2009.

Page 39: Small Business Technology Challenges

Economic conditions have forced many businesses to put off purchases of IT equipment

Threat #3: Downtime

Nearly 40% of the PCs in small businesses are more than 3 years old, and a large percentage of them are running older operating systems such as Windows XP

“SMB Perspectives: SMBs – The Case for Buying Modern PCs. Techaisle, March 2010.

Page 40: Small Business Technology Challenges

Average Mean Time Failure Rate:

Threat #3: Downtime

Page 41: Small Business Technology Challenges

Advice for Businesses: Maintenance & Planning

Threat #3: Downtime

1.  Perform regular maintenance 2.  Look into redundant internet services 3.  Develop a failover plan for telecom 4.  Plan for equipment refresh cycles

Page 42: Small Business Technology Challenges

Threat #4

Page 43: Small Business Technology Challenges

Mickey does NOT live in the Cloud Threat #4: Cloud Confusion

Page 44: Small Business Technology Challenges

Reliance on the Internet for satisfying computing needs

Threat #4: Cloud Confusion

Page 45: Small Business Technology Challenges

Cloud usage is widespread and fairly common:

Threat #4: Cloud Confusion

69 percent of America’s Internet users are using some form of Internet-based computing, such as web-based e-mail or photo storage.

Source: Pew Research Center, 2008

Page 46: Small Business Technology Challenges

Consumer Cloud Services

Over 600 million unique users Over 6 million songs in the

catalog

14 billion ads per month

10 billion messages processed daily

500 million active Windows Live IDs

Over 3 billion WW queries each month

370 million active accounts

2 billion unique calls per year

Petabytes of data every month to millions of PCs

23 million subscribers

Page 47: Small Business Technology Challenges

The technical definition:

Threat #4: Cloud Confusion

Cloud computing is computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services.

Source: Wikipedia

Page 48: Small Business Technology Challenges

Reliance on the Internet for satisfying computing needs

Threat #4: Cloud Confusion

Page 49: Small Business Technology Challenges

Cloud technologies provide a new method for content delivery

Threat #4: Cloud Confusion

Page 50: Small Business Technology Challenges

The Cloud is changing entire industries

Threat #4: Cloud Confusion

Page 51: Small Business Technology Challenges

Types of Cloud Services

Threat #4: Cloud Confusion

software as a service infrastructure as a service platform as a service

consume it migrate to it build on it

“SaaS” “PaaS” “IaaS”

Page 52: Small Business Technology Challenges

Software as a Service (SaaS)

Threat #4: Cloud Confusion

SaaS defined: “A model of software deployment

where an application is hosted as a service provided to customers across the Internet.”

Source: Wikipedia

Page 53: Small Business Technology Challenges

Why Business is Embracing the Cloud

“By 2012, 20% of businesses will own no IT assets.”

Gartner, Gartner Highlights Key Predictions for IT Organizations and Users in 2010 and Beyond, January, 2010

Survey of 318 customers on satisfaction with SaaS noted “top 3 pros were no in-house maintenance(57%), shorter rollout(49%), usable anywhere via internet(46%).” Burton Group, “Gartner and Burton Group SaaS Surveys: Same High-Level Findings, Different Conclusions.” Craig Roth July, 2009.

Page 54: Small Business Technology Challenges

Familiar and Integrated

•  25 GB mailbox per user •  Shared calendaring and contacts •  Always-up-to-date anti-spam & anti-virus •  Access from Outlook on PC and Outlook

Web App in the browser •  Offline access w/ Outlook synchronization •  Support for Windows Phone, iPhone,

Android, and Blackberry

•  Single location for sharing and collaboration •  Collaboration sites for teams, projects,

meetings, and documents. •  Offline access to documents in Outlook •  Forms & workflow •  Portal sites, content management, and search

•  Online meetings, presentations, and training sessions

•  Desktop sharing & whiteboard tools •  Rich media, hi-fi recording, live webcam video •  Multi-party video, VOIP/audio, switching •  Web client support for remote attendees

•  Business class Instant messaging (IM) and chat

•  Seamless presence awareness •  1:1 video and voice chat •  Integration across Microsoft Office Outlook

calendar and contacts and other apps, SharePoint

•  Quickly check on another user’s availability

Page 55: Small Business Technology Challenges

Small Business Feedback

Page 56: Small Business Technology Challenges

Advice for Businesses: PREVENTION

Threat #2: Security Vulnerabilities

1.  When time to replace, consider Cloud 2.  Add online storage for additional backup

redundancy 3.  Leverage Cloud solutions to improve

operational efficiencies 4.  Avoid the hype – look for proven

products

Page 57: Small Business Technology Challenges

Threat #5

Page 58: Small Business Technology Challenges

Productivity can be negatively impacted by many possible factors

Threat #5: Productivity Problems

Page 59: Small Business Technology Challenges

Threat #5: Productivity Problems

Page 60: Small Business Technology Challenges

Threat #5: Productivity Problems

Page 61: Small Business Technology Challenges

Threat #5: Productivity Problems

Page 62: Small Business Technology Challenges

Threat #5: Productivity Problems

Page 63: Small Business Technology Challenges

Threat #5: Productivity Problems

Page 64: Small Business Technology Challenges

Voice Over IP phone systems greatly improve operations

Threat #5: Productivity Problems

“BEYOND ITS SUPERIOR FLEXIBILITY, VOIP SAVES BUSINESSES MONEY. DEPENDING ON THE SERVICE YOU CHOOSE, YOU MAY BE ABLE TO AVOID PAYING FOR BOTH BROADBAND AND TELEPHONE SERVICES—OR SIGNIFICANTLY SCALE BACK YOUR TELEPHONE BILLS.”

Foley, Mary O. “VoIP: What are you waiting for?”

Page 65: Small Business Technology Challenges

Web filtering and shaping can also help boost productivity

Threat #5: Productivity Problems

Are you experiencing any of these situations?   Limited visibility of Internet traffic   Slow Internet despite adequate bandwidth   Lost hours due to internet abuse   Anonymous proxy sites bypassing URL filters

Page 66: Small Business Technology Challenges

Web filtering and shaping can also help boost productivity

Threat #5: Productivity Problems

Page 67: Small Business Technology Challenges
Page 68: Small Business Technology Challenges

Recommendation: Have a plan to manage your IT

Conclusion

1.  Develop a ‘Playbook’ (living document) 2.  Systemize 3.  Delegate tasks and duties 4.  Plan ahead as much as possible

Page 69: Small Business Technology Challenges

SUPPO

RT

STRATEGY

INFRASTRUCTURE Proactive Management

Centralized Services  Downtime & Performance Monitoring  Weekend Auto Maintenance Service  Backup Monitoring and Alerts  Security Patch Management  Virus and Spyware Protection  Asset Inventory  Reporting

Network Administration

Day-to-Day Support   Help Desk Support   Backup and Disaster Recovery   Desktop and Server Optimization   Web Content Filtering   Adding and Removal of Users   Best Practices Checklist

Chief Information Officer

Virtual CIO   Technology Roadmap Planning   Design and Implementation Planning   Budget and Strategy Planning   Research & Testing of New Technologies   Vendor Liaison

Reactive Support

Field Support   On-Site Support   Rapid Reaction/Response   Mini-Project Jobs   Third Party Product Support   Virus REMOVAL and Cleaning   Recovery in Event of Server Crash

ITOrganiza+onforAnyBusiness

Page 70: Small Business Technology Challenges

INFRASTRUCTURE

Proactive Management Centralized Services  Downtime & Performance Monitoring  Weekend Auto Maintenance Service  Backup Monitoring and Alerts  Security Patch Management  Virus and Spyware Protection  Asset Inventory  Reporting

Page 71: Small Business Technology Challenges

INFRASTRUCTURE

Network Administration Day-to-Day Support   Help Desk Support   Backup and Disaster Recovery   Desktop and Server Optimization   Web Content Filtering   Adding and Removal of Users   Best Practices Checklist

SUPPO

RT

Page 72: Small Business Technology Challenges

SUPPO

RT

Reactive Support Field Support   On-Site Support   Rapid Reaction/Response   Mini-Project Jobs   Third Party Product Support   Virus REMOVAL and Cleaning   Recovery in Event of Server Crash

Page 73: Small Business Technology Challenges

SUPPO

RT

STRATEGY

INFRASTRUCTURE

Chief Information Officer Virtual CIO   Technology Roadmap Planning   Design and Implementation Planning   Budget and Strategy Planning   Research & Testing of New Technologies   Vendor Liaison

Page 74: Small Business Technology Challenges

Recommendation: Have a plan to manage your IT

Conclusion

1.  Develop a ‘Playbook’ (living document) 2.  Systemize 3.  Delegate tasks and duties 4.  Plan ahead as much as possible