Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our...
Transcript of Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our...
ldquoInsider Tips To Make Your Business Run Faster
Easier And More Profitablyrdquo
Technology Times
Get More Information About Our Services At wwwsmarthostdesigncom
A very common misconception is that Apple Mac products cannot get viruses Not true There is no such thing as a 100 safe computer Devices running OS X Windows Linux Android or any other operating system are all capable of being infected with a virus or other malware However the likelihood that an Apple Macintosh user gets a virus is much lower than for Windows users In fact many Apple users donrsquot even run any antivirus software on their computers Whether that is a smart strategy is debated by many IT professionals A few of the reasons why Macs donrsquot get as many viruses as PCs are
1 Mac OS X is based on the Unix operating system which is one of the oldest and most secure operating systems around
2 Microsoft Windows is used by many more people so itrsquos a bigger and better target Plus the way that Windows is built makes it easier for viruses to spread across computer networks
3 Many of the tools designed to create viruses or malware are written for the Windows operating system
Windows Threats Even For Macs
Many Mac users find themselves having to use Parallels BootCamp or other virtual software to run Windows only programs such as Microsoft Publisher Because these Macs are now running a Windows operating system they are now susceptible to Windows viruses In addition an Apple computer can certain become a ldquocarrierrdquo of a Windows-based virus This virus would not infect the Apple machine but could infect other Windows machines on your network if it were to send that virus via email or across the office computer network
And Even More Threatshellip
Any software plug-in or other 3rd party add-on that is installed onto any computer that connects to the internet can introduce its own security risks One of the most common ways that the ldquobad guysrdquo are able to attack a Mac is through browser applications and browser plug-ins such as Adobe Flash Adobe Reader Java and others Just about every Mac user has all three of these plug-ins installed on their computers (and many more) These are a necessary part of business but do introduce additional security risks for all computers
The Human Factor
Although Apple Macs are less vulnerable to viruses they are still operated by flawed humans who can still be the victim of Trojan Horses phishing and other online fraud Your best bet is to keep everyone informed about online security risks in your business no matter the computer theyrsquore using
ldquoAs a business owner you donrsquot have
time to waste on technical and
operational issues Thatrsquos where we
shine Call us and put an end to your IT
problems finally and foreverrdquo
- Femi Dada Smarthost Design
Technologies LLC
Volume VI Issue 5 May 2013
Lanham MD
Inside This Issuehellip
Can Apple Macs Get VirusesPage 1 Are You Still Using Outdated Tape BackupshelliphelliphellipPage 2 3 Things You Need To Know About E-mail Marketing Before You Press ldquoSendrdquohelliphelliphelliphelliphelliphelliphelliphellipPage 2 Shiny New Gadget Of The Month Intel Ultrabook ConvertiblehelliphelliphellipPage 3 I Need Your Help On This helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipPage 3 What is Cloud Computing and Why Should You Care helliphelliphelliphelliphelliphellip Page 4 The Lighter Side Philosophy Of Spring CleaningPage 4 How to avoid budget busting mistake when you move your office hellip Page 5 Office move Check List helliphelliphellipPage 5 Coach Ditka You canrsquot motivate someone helliphelliphelliphelliphelliphelliphelliphelliphellip Page 6 Dropbox Is It Secure For Your Business Page 7 What you must Do to Continue Delivering Extraordinary Result helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipPage 8 Top 4 Threats Attacking Your Network And What To Do About Them Page 8
Can Apple Macs Get Viruses
Page 2
3 Things You Need To Know About E-mail
Marketing Before You Press ldquoSendrdquo
Itrsquos everyonersquos favorite application Since
its introduction it has revolutionized the way
we communicate both personally and
professionally It has had a major impact on
how companies market themselves
communicate with vendors send out press
releases rally employees and alert clients to
their latest and greatest promotion The ease low-cost and speed of e-mail in
marketing is the biggest reason why our inboxes are overflowing with spam
In response to the ubiquitous outcry ldquoI hate spamrdquo governments have
crafted regulations surrounding the use of e-mail and if you are one of the
millions of companies using e-mail for marketing then itrsquos important that you
familiarize yourself with these laws But the danger doesnrsquot stop there
Even if you donrsquot get caught by the feds for violating the rules of e-mail
usage you can still end up on a blacklist with the major ISPs such as Yahoo
Gmail GoDaddy and Earthlink Once you get blacklisted you are considered
guilty until proven innocent and ALL the e-mail you send wonrsquot get through
even to people who want to receive itmdasha consequence that could end up
hurting your business more than a fine
What Are The Basic Guidelines Of E-mail Marketing
First and foremost make sure you are only sending e-mail campaigns to
people who have solicited (requested) to be on your distribution list This is
called ldquoopting-inrdquo or subscribing and e-mails sent to these folks are considered
ldquosolicited e-mailrdquo You are perfectly within your rights to send them messages
but if you got their e-mail address by any other means and they did NOT
specifically request to be on your list thatrsquos considered ldquounsolicited e-mailrdquo or
spam Sending promotional e-mails to people who have not requested them is
not only illegal but annoyingso donrsquot do it
Next make sure you provide directions on how a person can remove
themselves from your distribution list in EVERY e-mail The best place to put
this information is at the very bottom of your message You should also
include your full company name and contact information at the bottom so no
one can blame you for cloaking your identitymdashanother legal ldquono-nordquo of e-mail
marketing
Our 1 Recommendation
Lastly when sending e-mail out to your marketing list we recommend
using a service such as ConstantContact or InfusionSoft These web-based
applications will help you manage your e-mail distribution list with automatic
opt-out and opt-in tools and will keep your e-mail server off an ISPrsquos blacklist
Naturally you want to make sure the information you are sending is
interesting and relevant No one wants more junk filling up their inbox so the
better you are at marketing the better your results will be E-mail is not a
magic marketing bullet that will solve all your marketing problems but used
correctly it can certainly help you reach more customers and build stronger
relationships with the people you already do business with
Are You STILL Using
Outdated Tape Backups If your computer network and the data it holds got erased or corrupted because of a virus hard drive crash fire flood or some other random unforeseen disaster how confident are you RIGHT NOW that your business could be back up and running again FAST
If your answer to that is ldquoI donrsquot knowrdquo or ldquoIrsquom not surerdquo you are taking a HUGE risk with your companyrsquos most important assetmdashthe data on your network Just imagine what would happen to your business if you lost your entire client databasehellip
hellipLost all accounting documentation and historyhellipLost all the work files yoursquove spent YEARS developinghellipLost the work files and documentation you so desperately need to service your customershellip
Can you even put a price tag on it Probably notmdashyet so many business owners arenrsquot 100 certain that they could be back up and running after a disaster and are purely hoping that their current tape drive or backup is working and storing a usable copy of their data
Tape Drives Are The MOST Unreliable Unsecured Way To
Back Up Your Data All tape drives fail itrsquos only a matter of ldquowhenrdquo not ldquoifrdquo So if being able to get back up and running again in the event of a data-erasing disaster is important then you need to know about our Smart Managed Backup amp Disaster Recovery (SmartMnnagedBDR) solution would This Disaster-proof backup service does more than just keep a copy of your filesmdashit provides ldquocontinuous data protectionrdquo and enables near-instant disaster recovery because it takes a snapshot of your entire network throughout the day giving you the confidence we could have you back up and running again within HOURS not days or weeks Want to know if your data is REALLY secure and being backed up properly Call us for a FREE Data Backup and Disaster Recovery Audit Call us at 301-576-1122 or go online to
Get More Information About Our Services At wwwsmarthostdesigncom
Page 3
Shiny New Gadget Of The Month
Intel Ultrabook
Convertible
The Intel-based Ultrabook Convertible is one of the most cutting-edge on-the-go laptops to date Quite simply itrsquos a laptop when you need it and a tablet when you want it
Ultrabook with touch display using Windows 8 delivers stunning graphics and the ultimate in precision and control And unlike an iPad or Android tablet this convertible turns into a powerful laptop in an instant
Additionally models with Intel Smart Connect Technology continually update your email and social networks even when your Ultrabook is shut down Yoursquoll wake from sleep mode in less than 7 seconds and already be completely updated so that you can resume what you were doing in the blink of an eye
And with Intelrsquos Anti-Theft Technology if your Ultrabook is ever lost or stolen you can instantly disable the machine from anywhere ensuring that your data is safe and secure
Learn more today at wwwintelcomUltrabook
I Need Your Help On Thishellip
Dear Friend
I have a small favor to ask that in the end will benefit you But first let me
explain whats led up to this
Over the last year weve seen a dramatic increase in the number of clients
who are inquiring about how to access their desktop files email etc on a
mobile device - be it an iPad smartphone laptop tablet etc
Weve also seen an increase in the number of clients who allow employees to
bring their own devices to work andor access the company network from
home using their personal computer or phone If yoursquove been following along
in the last 2 issues of this newsletter yoursquove probably noticed
Naturally this raises a NUMBER of questions and concerns over security
Whats the best way to allow remote access to company data
What are the best policies for privacy and cloud computing
How can we ensure our compliance with data breech laws and
regulatory controls
Thats why weve decided to hold a series of educational webinarsseminar on
this topic in the coming months to answer important questions and to guide
clients to use safe best practices when introducing mobile devices onto their
network
However Im struggling to narrow down the topic and the questions we
should address during these sessions since mobile and cloud computing are
such big topics
So instead of just guessing I was hoping you could do me a favor by
answering the following 2 questions
What is the single most important question you would like us to address
on the topic of mobile and cloud computing
Second
Whats the single biggest CONCERN you have about cloud computing
and employees remotely accessing your network with mobile devices
If you would just take a moment to send me an email at
femidadasmarthostdesigncom and give me some direction in this I would
be grateful
Many thanks
Client Spotlight Fujitec America When Fujitec America in Lanham MD was relocating their office they needed a
Technology Company to help them plan co-ordinate access and install the new of-
fice technologies Fortunately Gorge Jonson was referred to Smarthost Design Tech-
nologies ldquoSmarthost Design Technologies took the ball and run with it giving me
peace of mindrdquo Gorge JohnsonmdashGM Fujitec America Would you like your
company highlighted here in our ldquoClient Spotlightrdquo Then give us a call today at 301-
576-1122
httpsmarthostdesigncomFujitec
Get More Information About Our Services At wwwsmarthostdesigncom
Page 4
Get More Information About Our Services At wwwsmarthostdesigncom
What Is Cloud Computing And Why Should
You Care
Therersquos a good chance that MOST of the software applications you use
every day are now SaaS applications or ldquosoftware as a servicerdquo In other
words you donrsquot have to install them on your server or PC ndash you simply access
it as a pay-as-you-go model for only the licenses space and features you use
This gives you the ability to access highly sophisticated software and
functionality at a fraction of the cost ndash or even for free ndash and without long-term
commitments
For example Google is a massive free cloud application ndash the power
required to search billions of web sites and content in seconds and deliver the
relevant results to your screen far exceeds the capacity of your PC Facebook is
another free cloud application that allows you to post pictures play games and
connect with your friends in real time without having to install those
applications on your computer Of course there are also the applications such
as Salesforce Constant Contact SurveyMonkey etc that you pay to use
With the recent introduction of cloud-based office applications like
Office 365 Google Apps and thousands of other SaaS applications itrsquos
becoming unnecessary for some businesses to purchase and maintain an onsite
server Now companies can host one or more of their applications data e-mail
and other functions ldquoin the cloudrdquo That simply means itrsquos stored offsite in a
highly secure high-availability ldquoutilityrdquo company that has far more power and
resources than you could ever logically have onsite as a small business And
with devices getting cheaper and Internet connectivity exploding cloud
computing is suddenly a very smart viable option for small business owners
What Are The Benefits Of Cloud Computing
1 Eliminates the need for expensive server upgrades and allows you to use
cheaper devices (PCs etc) to get the
same work done
2 Frees you to access applications
from any device and any location
All you need is an Internet
connection
3 Built-in disaster recovery and
business continuity
4 Only pay for what you need and use
(utility pricing)
Is Cloud Computing Right For You
While there are a ton of benefits
to cloud computing itrsquos NOT right for
every company Some applications
donrsquot play well in the cloud You need
commercial-grade Internet
connectivity and some functions like working with big graphics files are
better kept local or the slowness will make you crazy However in almost
every case parts of your computer network (functions) can easily be put in the
cloud to save you money and give you better service So before you donate
your server and sign up for Google Apps or Office 365 itrsquos important you talk
to someone who can honestly assess your unique situation and tell you the
pros and cons of making the switch to cloud computing
Is Your Phones System Costing Too Much
Your are in LUCK
NOW Get Security as a
Services
If you are interested in other services
and would like us to look it up send me
an email
at femidadasmarthostdesigncom
FREE Desk
Phone Promo
Free Cisco SPA
303G For each User
Requires 12ndash Months Agreement
Have you got A virus
hacked or worried your staff
are spending time on un-
related business websites -Managed Network Security could be
the solution plus meet key Gov
Health Marchant SOX HIPPA and
other gov compliances
- SmarthManged Network Security
gives you the peace of mind with
Includes Secure Firewall
Unlimited Monotoring
Unlimited support
Free Setup and Insatll
For a simple Monthly Flat Fee
Call 301-576-1122 ext 101
Page 5
Get More Information About Our Services At wwwsmarthostdesigncom
How To Avoid The Top 3 Budget Busting Stress
-Inducing Mistakes When Moving Your Office Moving is always a pain in the rump but it doesnrsquot have to be a horrific expensive experience The number one lament from someone whorsquos experienced a ldquobadrdquo move is ldquoI didnrsquot know I
needed tohelliprdquo followed closely by ldquoI completely forgot thathelliprdquo In other words itrsquos what you donrsquot do that makes the move a disaster To make your move easy and effortless here are the 5
most common mistakes you want to avoid
Mistake 1 mdash Trying To Save Money By Using Your Employees To Move Your Computer Network
Donrsquot ask your staff to disconnect move and reconnect computers phones and other devices just to save a few bucks Yoursquoll frustrate them and end up with phones ringing at the wrong extension lost cables and workstations that get dropped rendering them useless You donrsquot want to let the movers do this job either they may be great at moving furniture but a network is a lot more sophisticated and sensitive Be smart and hire an IT
pro to pack and move your network
Mistake 2 mdash Not Hiring The RIGHT IT Firm To Move Your Network
While wersquore on the topic make sure you know what to look for when outsourcing the move A few things to look for would include references from other clients proof of insurance (get them to fax you a copy) a service level guarantee limiting the amount of time you are down and a professional organized approach to quoting the move A real pro will insist on visiting your current location as well as your new location to conduct a detailed site survey NEVER hire anyone who wants to quote moving your network over the phone Additionally look for an IT company that will apply the charges for conducting your site survey against the total cost of the move if you choose them
Mistake 3 mdash Not Giving Your Phone Internet And Cable Vendors Enough Advance Warning
Eighty percent (80) of unexpected communications blackouts and cost overruns on network moves are caused by failure to properly plan voice data and electrical installation in advance Just because the prior tenant had computers and telephones is no guarantee that the cabling is suitable for your phones and your computer network Advance planning will help you avoid emergency rush fees or band aid fixes to make things work
Internet and telephone connections require as much as six weeks advance notice to be installed tested and ready the day you move in And if you are building a new office donrsquot leave it up to the builder to decide how many power outlets network and phone connections you will need With printers scanners faxes and other technologies
connecting directly to the network these days the rule of thumb of one electrical outlet one phone and one network connection per employee is woefully outdated Consult your IT provider in the early planning stages to ensure you have what you need before
the drywall goes up
Need an Office Move
Check List
As an IT Provider we have helped many of our clients move their office and in that process we have
developed a check list that will ensures that no stone is left un turned when it comes to moving your office If this type of checklist would make you office move easier or anyone that you know then go to
httpSmarthostdesigncomoffice
And download it Or give us a call at 301-576-1122
Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series
What the Heck is Google
Adwords and how can it help
your business Find out Date May 15th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
Website SEO SMO
Facebook LinkedIn Twitter
How can this help your
Business Find out Date June 12th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
BYOD Policies Security of
your Critical Intellectual
Property (IP) How can you
minimize your business risk
Find out Date July 17th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash
If you are interested in topic
and would like us to do a
webinar on that subject
send me an email
at femidadasmarthostdesigncom
Page 6
Here From Femi Corner
Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate
themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and
managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada
Get More Information About Our Services At wwwsmarthostdesigncom
The Lighter Side
PHILOSOPHY OF SPRING CLEANING
I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press
Page 7
DropBox ndash Is It Secure For Your Business
A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip
Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely
When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to
easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant
What To Use Instead If you need to transfer files outside of your network and need to do so
securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your
data
Who Else Wants To Win A $10 Gift Card
The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana
Buell of Shillina Gupta $ Associates PA in Columbia MD She was the
first person to correctly answer my quiz question from last month April
is named after the Greek goddess Aphrodite She is the goddess of
The correct answer was c) Love Now herersquos this monthrsquos trivia
question The winner will receive a gift card to Chic-Fil-A
RESTAURAN
Which May celebration was first observed in 1908
a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day
Email me right now you answer at
femidadasmarthostdesigncom or
Call 301-576-1122 ext 101
Get More Information About Our Services At wwwsmarthostdesigncom
What you must Do to Continue delivering Extraordinary Result
in your Business
Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business
That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource
Page 8
Top 4 Threats Attacking Your Network And What To Do About Them
1 Overconfidence User overconfidence in security products is the top threat to your
network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn
storms (unstoppable rapid fire pornographic pop-ups) and more subtle key
loggers that steal passwords Surveys promising free stuff result in theft of
information like your motherrsquos maiden name high school etc used to answer
common security questions leading to theft of otherwise secure data Think
before you click
2 Social Networking Sites Social networking sites like Facebook are exploding in popularity
Threats range from malware (eg viruses worms spyware) to scammers trying
to steal your identity information and money Many businesses and government
agencies are using these sites to communicate with clients and constituents so
simply blocking access is no longer reasonable Defending your company while
allowing employee access requires social network education for your employees
and the enforcement of strong acceptable use policies We can help you develop
a policy then monitor compliance using a Unified Threat Management device
that controls and reports on network access
3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once
limited to laptop computers mobile network devices now include PDAs
handheld computers and smart phones with new appliances appearing in the
stores every month Mobile devices often contain sensitive data yet they are
easily lost or stolen Be sure to password protect and encrypt data on all mobile
devices whenever possible Include mobile devices in your acceptable use
policy
4 Cloud Computing
ldquoThe Cloudrdquo in its most simple form involves using the Internet to
access and store your data When you access email using a web browser you are
working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly
gaining popularity and is just the beginning Companies like Microsoft IBM
and Google envision the day when we will use inexpensive terminals instead of
computers to run programs and access data located somewhere on the Internet
You need to be sure that any data you store and access across the Internet is
secure not just where it is stored but during the trip to and from the Internet
Monthly Spiritual Devotion
12 I know how to live on almost nothing or with everything I have learned the
secret of living in every situation whether it is with a full stomach or empty
with plenty or little 13 For I can do everything through Christ who gives me
strength Philippians 412-13 (NLT)
Get More Information About Our Services At wwwsmarthostdesigncom
Page 2
3 Things You Need To Know About E-mail
Marketing Before You Press ldquoSendrdquo
Itrsquos everyonersquos favorite application Since
its introduction it has revolutionized the way
we communicate both personally and
professionally It has had a major impact on
how companies market themselves
communicate with vendors send out press
releases rally employees and alert clients to
their latest and greatest promotion The ease low-cost and speed of e-mail in
marketing is the biggest reason why our inboxes are overflowing with spam
In response to the ubiquitous outcry ldquoI hate spamrdquo governments have
crafted regulations surrounding the use of e-mail and if you are one of the
millions of companies using e-mail for marketing then itrsquos important that you
familiarize yourself with these laws But the danger doesnrsquot stop there
Even if you donrsquot get caught by the feds for violating the rules of e-mail
usage you can still end up on a blacklist with the major ISPs such as Yahoo
Gmail GoDaddy and Earthlink Once you get blacklisted you are considered
guilty until proven innocent and ALL the e-mail you send wonrsquot get through
even to people who want to receive itmdasha consequence that could end up
hurting your business more than a fine
What Are The Basic Guidelines Of E-mail Marketing
First and foremost make sure you are only sending e-mail campaigns to
people who have solicited (requested) to be on your distribution list This is
called ldquoopting-inrdquo or subscribing and e-mails sent to these folks are considered
ldquosolicited e-mailrdquo You are perfectly within your rights to send them messages
but if you got their e-mail address by any other means and they did NOT
specifically request to be on your list thatrsquos considered ldquounsolicited e-mailrdquo or
spam Sending promotional e-mails to people who have not requested them is
not only illegal but annoyingso donrsquot do it
Next make sure you provide directions on how a person can remove
themselves from your distribution list in EVERY e-mail The best place to put
this information is at the very bottom of your message You should also
include your full company name and contact information at the bottom so no
one can blame you for cloaking your identitymdashanother legal ldquono-nordquo of e-mail
marketing
Our 1 Recommendation
Lastly when sending e-mail out to your marketing list we recommend
using a service such as ConstantContact or InfusionSoft These web-based
applications will help you manage your e-mail distribution list with automatic
opt-out and opt-in tools and will keep your e-mail server off an ISPrsquos blacklist
Naturally you want to make sure the information you are sending is
interesting and relevant No one wants more junk filling up their inbox so the
better you are at marketing the better your results will be E-mail is not a
magic marketing bullet that will solve all your marketing problems but used
correctly it can certainly help you reach more customers and build stronger
relationships with the people you already do business with
Are You STILL Using
Outdated Tape Backups If your computer network and the data it holds got erased or corrupted because of a virus hard drive crash fire flood or some other random unforeseen disaster how confident are you RIGHT NOW that your business could be back up and running again FAST
If your answer to that is ldquoI donrsquot knowrdquo or ldquoIrsquom not surerdquo you are taking a HUGE risk with your companyrsquos most important assetmdashthe data on your network Just imagine what would happen to your business if you lost your entire client databasehellip
hellipLost all accounting documentation and historyhellipLost all the work files yoursquove spent YEARS developinghellipLost the work files and documentation you so desperately need to service your customershellip
Can you even put a price tag on it Probably notmdashyet so many business owners arenrsquot 100 certain that they could be back up and running after a disaster and are purely hoping that their current tape drive or backup is working and storing a usable copy of their data
Tape Drives Are The MOST Unreliable Unsecured Way To
Back Up Your Data All tape drives fail itrsquos only a matter of ldquowhenrdquo not ldquoifrdquo So if being able to get back up and running again in the event of a data-erasing disaster is important then you need to know about our Smart Managed Backup amp Disaster Recovery (SmartMnnagedBDR) solution would This Disaster-proof backup service does more than just keep a copy of your filesmdashit provides ldquocontinuous data protectionrdquo and enables near-instant disaster recovery because it takes a snapshot of your entire network throughout the day giving you the confidence we could have you back up and running again within HOURS not days or weeks Want to know if your data is REALLY secure and being backed up properly Call us for a FREE Data Backup and Disaster Recovery Audit Call us at 301-576-1122 or go online to
Get More Information About Our Services At wwwsmarthostdesigncom
Page 3
Shiny New Gadget Of The Month
Intel Ultrabook
Convertible
The Intel-based Ultrabook Convertible is one of the most cutting-edge on-the-go laptops to date Quite simply itrsquos a laptop when you need it and a tablet when you want it
Ultrabook with touch display using Windows 8 delivers stunning graphics and the ultimate in precision and control And unlike an iPad or Android tablet this convertible turns into a powerful laptop in an instant
Additionally models with Intel Smart Connect Technology continually update your email and social networks even when your Ultrabook is shut down Yoursquoll wake from sleep mode in less than 7 seconds and already be completely updated so that you can resume what you were doing in the blink of an eye
And with Intelrsquos Anti-Theft Technology if your Ultrabook is ever lost or stolen you can instantly disable the machine from anywhere ensuring that your data is safe and secure
Learn more today at wwwintelcomUltrabook
I Need Your Help On Thishellip
Dear Friend
I have a small favor to ask that in the end will benefit you But first let me
explain whats led up to this
Over the last year weve seen a dramatic increase in the number of clients
who are inquiring about how to access their desktop files email etc on a
mobile device - be it an iPad smartphone laptop tablet etc
Weve also seen an increase in the number of clients who allow employees to
bring their own devices to work andor access the company network from
home using their personal computer or phone If yoursquove been following along
in the last 2 issues of this newsletter yoursquove probably noticed
Naturally this raises a NUMBER of questions and concerns over security
Whats the best way to allow remote access to company data
What are the best policies for privacy and cloud computing
How can we ensure our compliance with data breech laws and
regulatory controls
Thats why weve decided to hold a series of educational webinarsseminar on
this topic in the coming months to answer important questions and to guide
clients to use safe best practices when introducing mobile devices onto their
network
However Im struggling to narrow down the topic and the questions we
should address during these sessions since mobile and cloud computing are
such big topics
So instead of just guessing I was hoping you could do me a favor by
answering the following 2 questions
What is the single most important question you would like us to address
on the topic of mobile and cloud computing
Second
Whats the single biggest CONCERN you have about cloud computing
and employees remotely accessing your network with mobile devices
If you would just take a moment to send me an email at
femidadasmarthostdesigncom and give me some direction in this I would
be grateful
Many thanks
Client Spotlight Fujitec America When Fujitec America in Lanham MD was relocating their office they needed a
Technology Company to help them plan co-ordinate access and install the new of-
fice technologies Fortunately Gorge Jonson was referred to Smarthost Design Tech-
nologies ldquoSmarthost Design Technologies took the ball and run with it giving me
peace of mindrdquo Gorge JohnsonmdashGM Fujitec America Would you like your
company highlighted here in our ldquoClient Spotlightrdquo Then give us a call today at 301-
576-1122
httpsmarthostdesigncomFujitec
Get More Information About Our Services At wwwsmarthostdesigncom
Page 4
Get More Information About Our Services At wwwsmarthostdesigncom
What Is Cloud Computing And Why Should
You Care
Therersquos a good chance that MOST of the software applications you use
every day are now SaaS applications or ldquosoftware as a servicerdquo In other
words you donrsquot have to install them on your server or PC ndash you simply access
it as a pay-as-you-go model for only the licenses space and features you use
This gives you the ability to access highly sophisticated software and
functionality at a fraction of the cost ndash or even for free ndash and without long-term
commitments
For example Google is a massive free cloud application ndash the power
required to search billions of web sites and content in seconds and deliver the
relevant results to your screen far exceeds the capacity of your PC Facebook is
another free cloud application that allows you to post pictures play games and
connect with your friends in real time without having to install those
applications on your computer Of course there are also the applications such
as Salesforce Constant Contact SurveyMonkey etc that you pay to use
With the recent introduction of cloud-based office applications like
Office 365 Google Apps and thousands of other SaaS applications itrsquos
becoming unnecessary for some businesses to purchase and maintain an onsite
server Now companies can host one or more of their applications data e-mail
and other functions ldquoin the cloudrdquo That simply means itrsquos stored offsite in a
highly secure high-availability ldquoutilityrdquo company that has far more power and
resources than you could ever logically have onsite as a small business And
with devices getting cheaper and Internet connectivity exploding cloud
computing is suddenly a very smart viable option for small business owners
What Are The Benefits Of Cloud Computing
1 Eliminates the need for expensive server upgrades and allows you to use
cheaper devices (PCs etc) to get the
same work done
2 Frees you to access applications
from any device and any location
All you need is an Internet
connection
3 Built-in disaster recovery and
business continuity
4 Only pay for what you need and use
(utility pricing)
Is Cloud Computing Right For You
While there are a ton of benefits
to cloud computing itrsquos NOT right for
every company Some applications
donrsquot play well in the cloud You need
commercial-grade Internet
connectivity and some functions like working with big graphics files are
better kept local or the slowness will make you crazy However in almost
every case parts of your computer network (functions) can easily be put in the
cloud to save you money and give you better service So before you donate
your server and sign up for Google Apps or Office 365 itrsquos important you talk
to someone who can honestly assess your unique situation and tell you the
pros and cons of making the switch to cloud computing
Is Your Phones System Costing Too Much
Your are in LUCK
NOW Get Security as a
Services
If you are interested in other services
and would like us to look it up send me
an email
at femidadasmarthostdesigncom
FREE Desk
Phone Promo
Free Cisco SPA
303G For each User
Requires 12ndash Months Agreement
Have you got A virus
hacked or worried your staff
are spending time on un-
related business websites -Managed Network Security could be
the solution plus meet key Gov
Health Marchant SOX HIPPA and
other gov compliances
- SmarthManged Network Security
gives you the peace of mind with
Includes Secure Firewall
Unlimited Monotoring
Unlimited support
Free Setup and Insatll
For a simple Monthly Flat Fee
Call 301-576-1122 ext 101
Page 5
Get More Information About Our Services At wwwsmarthostdesigncom
How To Avoid The Top 3 Budget Busting Stress
-Inducing Mistakes When Moving Your Office Moving is always a pain in the rump but it doesnrsquot have to be a horrific expensive experience The number one lament from someone whorsquos experienced a ldquobadrdquo move is ldquoI didnrsquot know I
needed tohelliprdquo followed closely by ldquoI completely forgot thathelliprdquo In other words itrsquos what you donrsquot do that makes the move a disaster To make your move easy and effortless here are the 5
most common mistakes you want to avoid
Mistake 1 mdash Trying To Save Money By Using Your Employees To Move Your Computer Network
Donrsquot ask your staff to disconnect move and reconnect computers phones and other devices just to save a few bucks Yoursquoll frustrate them and end up with phones ringing at the wrong extension lost cables and workstations that get dropped rendering them useless You donrsquot want to let the movers do this job either they may be great at moving furniture but a network is a lot more sophisticated and sensitive Be smart and hire an IT
pro to pack and move your network
Mistake 2 mdash Not Hiring The RIGHT IT Firm To Move Your Network
While wersquore on the topic make sure you know what to look for when outsourcing the move A few things to look for would include references from other clients proof of insurance (get them to fax you a copy) a service level guarantee limiting the amount of time you are down and a professional organized approach to quoting the move A real pro will insist on visiting your current location as well as your new location to conduct a detailed site survey NEVER hire anyone who wants to quote moving your network over the phone Additionally look for an IT company that will apply the charges for conducting your site survey against the total cost of the move if you choose them
Mistake 3 mdash Not Giving Your Phone Internet And Cable Vendors Enough Advance Warning
Eighty percent (80) of unexpected communications blackouts and cost overruns on network moves are caused by failure to properly plan voice data and electrical installation in advance Just because the prior tenant had computers and telephones is no guarantee that the cabling is suitable for your phones and your computer network Advance planning will help you avoid emergency rush fees or band aid fixes to make things work
Internet and telephone connections require as much as six weeks advance notice to be installed tested and ready the day you move in And if you are building a new office donrsquot leave it up to the builder to decide how many power outlets network and phone connections you will need With printers scanners faxes and other technologies
connecting directly to the network these days the rule of thumb of one electrical outlet one phone and one network connection per employee is woefully outdated Consult your IT provider in the early planning stages to ensure you have what you need before
the drywall goes up
Need an Office Move
Check List
As an IT Provider we have helped many of our clients move their office and in that process we have
developed a check list that will ensures that no stone is left un turned when it comes to moving your office If this type of checklist would make you office move easier or anyone that you know then go to
httpSmarthostdesigncomoffice
And download it Or give us a call at 301-576-1122
Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series
What the Heck is Google
Adwords and how can it help
your business Find out Date May 15th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
Website SEO SMO
Facebook LinkedIn Twitter
How can this help your
Business Find out Date June 12th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
BYOD Policies Security of
your Critical Intellectual
Property (IP) How can you
minimize your business risk
Find out Date July 17th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash
If you are interested in topic
and would like us to do a
webinar on that subject
send me an email
at femidadasmarthostdesigncom
Page 6
Here From Femi Corner
Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate
themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and
managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada
Get More Information About Our Services At wwwsmarthostdesigncom
The Lighter Side
PHILOSOPHY OF SPRING CLEANING
I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press
Page 7
DropBox ndash Is It Secure For Your Business
A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip
Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely
When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to
easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant
What To Use Instead If you need to transfer files outside of your network and need to do so
securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your
data
Who Else Wants To Win A $10 Gift Card
The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana
Buell of Shillina Gupta $ Associates PA in Columbia MD She was the
first person to correctly answer my quiz question from last month April
is named after the Greek goddess Aphrodite She is the goddess of
The correct answer was c) Love Now herersquos this monthrsquos trivia
question The winner will receive a gift card to Chic-Fil-A
RESTAURAN
Which May celebration was first observed in 1908
a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day
Email me right now you answer at
femidadasmarthostdesigncom or
Call 301-576-1122 ext 101
Get More Information About Our Services At wwwsmarthostdesigncom
What you must Do to Continue delivering Extraordinary Result
in your Business
Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business
That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource
Page 8
Top 4 Threats Attacking Your Network And What To Do About Them
1 Overconfidence User overconfidence in security products is the top threat to your
network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn
storms (unstoppable rapid fire pornographic pop-ups) and more subtle key
loggers that steal passwords Surveys promising free stuff result in theft of
information like your motherrsquos maiden name high school etc used to answer
common security questions leading to theft of otherwise secure data Think
before you click
2 Social Networking Sites Social networking sites like Facebook are exploding in popularity
Threats range from malware (eg viruses worms spyware) to scammers trying
to steal your identity information and money Many businesses and government
agencies are using these sites to communicate with clients and constituents so
simply blocking access is no longer reasonable Defending your company while
allowing employee access requires social network education for your employees
and the enforcement of strong acceptable use policies We can help you develop
a policy then monitor compliance using a Unified Threat Management device
that controls and reports on network access
3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once
limited to laptop computers mobile network devices now include PDAs
handheld computers and smart phones with new appliances appearing in the
stores every month Mobile devices often contain sensitive data yet they are
easily lost or stolen Be sure to password protect and encrypt data on all mobile
devices whenever possible Include mobile devices in your acceptable use
policy
4 Cloud Computing
ldquoThe Cloudrdquo in its most simple form involves using the Internet to
access and store your data When you access email using a web browser you are
working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly
gaining popularity and is just the beginning Companies like Microsoft IBM
and Google envision the day when we will use inexpensive terminals instead of
computers to run programs and access data located somewhere on the Internet
You need to be sure that any data you store and access across the Internet is
secure not just where it is stored but during the trip to and from the Internet
Monthly Spiritual Devotion
12 I know how to live on almost nothing or with everything I have learned the
secret of living in every situation whether it is with a full stomach or empty
with plenty or little 13 For I can do everything through Christ who gives me
strength Philippians 412-13 (NLT)
Get More Information About Our Services At wwwsmarthostdesigncom
Page 3
Shiny New Gadget Of The Month
Intel Ultrabook
Convertible
The Intel-based Ultrabook Convertible is one of the most cutting-edge on-the-go laptops to date Quite simply itrsquos a laptop when you need it and a tablet when you want it
Ultrabook with touch display using Windows 8 delivers stunning graphics and the ultimate in precision and control And unlike an iPad or Android tablet this convertible turns into a powerful laptop in an instant
Additionally models with Intel Smart Connect Technology continually update your email and social networks even when your Ultrabook is shut down Yoursquoll wake from sleep mode in less than 7 seconds and already be completely updated so that you can resume what you were doing in the blink of an eye
And with Intelrsquos Anti-Theft Technology if your Ultrabook is ever lost or stolen you can instantly disable the machine from anywhere ensuring that your data is safe and secure
Learn more today at wwwintelcomUltrabook
I Need Your Help On Thishellip
Dear Friend
I have a small favor to ask that in the end will benefit you But first let me
explain whats led up to this
Over the last year weve seen a dramatic increase in the number of clients
who are inquiring about how to access their desktop files email etc on a
mobile device - be it an iPad smartphone laptop tablet etc
Weve also seen an increase in the number of clients who allow employees to
bring their own devices to work andor access the company network from
home using their personal computer or phone If yoursquove been following along
in the last 2 issues of this newsletter yoursquove probably noticed
Naturally this raises a NUMBER of questions and concerns over security
Whats the best way to allow remote access to company data
What are the best policies for privacy and cloud computing
How can we ensure our compliance with data breech laws and
regulatory controls
Thats why weve decided to hold a series of educational webinarsseminar on
this topic in the coming months to answer important questions and to guide
clients to use safe best practices when introducing mobile devices onto their
network
However Im struggling to narrow down the topic and the questions we
should address during these sessions since mobile and cloud computing are
such big topics
So instead of just guessing I was hoping you could do me a favor by
answering the following 2 questions
What is the single most important question you would like us to address
on the topic of mobile and cloud computing
Second
Whats the single biggest CONCERN you have about cloud computing
and employees remotely accessing your network with mobile devices
If you would just take a moment to send me an email at
femidadasmarthostdesigncom and give me some direction in this I would
be grateful
Many thanks
Client Spotlight Fujitec America When Fujitec America in Lanham MD was relocating their office they needed a
Technology Company to help them plan co-ordinate access and install the new of-
fice technologies Fortunately Gorge Jonson was referred to Smarthost Design Tech-
nologies ldquoSmarthost Design Technologies took the ball and run with it giving me
peace of mindrdquo Gorge JohnsonmdashGM Fujitec America Would you like your
company highlighted here in our ldquoClient Spotlightrdquo Then give us a call today at 301-
576-1122
httpsmarthostdesigncomFujitec
Get More Information About Our Services At wwwsmarthostdesigncom
Page 4
Get More Information About Our Services At wwwsmarthostdesigncom
What Is Cloud Computing And Why Should
You Care
Therersquos a good chance that MOST of the software applications you use
every day are now SaaS applications or ldquosoftware as a servicerdquo In other
words you donrsquot have to install them on your server or PC ndash you simply access
it as a pay-as-you-go model for only the licenses space and features you use
This gives you the ability to access highly sophisticated software and
functionality at a fraction of the cost ndash or even for free ndash and without long-term
commitments
For example Google is a massive free cloud application ndash the power
required to search billions of web sites and content in seconds and deliver the
relevant results to your screen far exceeds the capacity of your PC Facebook is
another free cloud application that allows you to post pictures play games and
connect with your friends in real time without having to install those
applications on your computer Of course there are also the applications such
as Salesforce Constant Contact SurveyMonkey etc that you pay to use
With the recent introduction of cloud-based office applications like
Office 365 Google Apps and thousands of other SaaS applications itrsquos
becoming unnecessary for some businesses to purchase and maintain an onsite
server Now companies can host one or more of their applications data e-mail
and other functions ldquoin the cloudrdquo That simply means itrsquos stored offsite in a
highly secure high-availability ldquoutilityrdquo company that has far more power and
resources than you could ever logically have onsite as a small business And
with devices getting cheaper and Internet connectivity exploding cloud
computing is suddenly a very smart viable option for small business owners
What Are The Benefits Of Cloud Computing
1 Eliminates the need for expensive server upgrades and allows you to use
cheaper devices (PCs etc) to get the
same work done
2 Frees you to access applications
from any device and any location
All you need is an Internet
connection
3 Built-in disaster recovery and
business continuity
4 Only pay for what you need and use
(utility pricing)
Is Cloud Computing Right For You
While there are a ton of benefits
to cloud computing itrsquos NOT right for
every company Some applications
donrsquot play well in the cloud You need
commercial-grade Internet
connectivity and some functions like working with big graphics files are
better kept local or the slowness will make you crazy However in almost
every case parts of your computer network (functions) can easily be put in the
cloud to save you money and give you better service So before you donate
your server and sign up for Google Apps or Office 365 itrsquos important you talk
to someone who can honestly assess your unique situation and tell you the
pros and cons of making the switch to cloud computing
Is Your Phones System Costing Too Much
Your are in LUCK
NOW Get Security as a
Services
If you are interested in other services
and would like us to look it up send me
an email
at femidadasmarthostdesigncom
FREE Desk
Phone Promo
Free Cisco SPA
303G For each User
Requires 12ndash Months Agreement
Have you got A virus
hacked or worried your staff
are spending time on un-
related business websites -Managed Network Security could be
the solution plus meet key Gov
Health Marchant SOX HIPPA and
other gov compliances
- SmarthManged Network Security
gives you the peace of mind with
Includes Secure Firewall
Unlimited Monotoring
Unlimited support
Free Setup and Insatll
For a simple Monthly Flat Fee
Call 301-576-1122 ext 101
Page 5
Get More Information About Our Services At wwwsmarthostdesigncom
How To Avoid The Top 3 Budget Busting Stress
-Inducing Mistakes When Moving Your Office Moving is always a pain in the rump but it doesnrsquot have to be a horrific expensive experience The number one lament from someone whorsquos experienced a ldquobadrdquo move is ldquoI didnrsquot know I
needed tohelliprdquo followed closely by ldquoI completely forgot thathelliprdquo In other words itrsquos what you donrsquot do that makes the move a disaster To make your move easy and effortless here are the 5
most common mistakes you want to avoid
Mistake 1 mdash Trying To Save Money By Using Your Employees To Move Your Computer Network
Donrsquot ask your staff to disconnect move and reconnect computers phones and other devices just to save a few bucks Yoursquoll frustrate them and end up with phones ringing at the wrong extension lost cables and workstations that get dropped rendering them useless You donrsquot want to let the movers do this job either they may be great at moving furniture but a network is a lot more sophisticated and sensitive Be smart and hire an IT
pro to pack and move your network
Mistake 2 mdash Not Hiring The RIGHT IT Firm To Move Your Network
While wersquore on the topic make sure you know what to look for when outsourcing the move A few things to look for would include references from other clients proof of insurance (get them to fax you a copy) a service level guarantee limiting the amount of time you are down and a professional organized approach to quoting the move A real pro will insist on visiting your current location as well as your new location to conduct a detailed site survey NEVER hire anyone who wants to quote moving your network over the phone Additionally look for an IT company that will apply the charges for conducting your site survey against the total cost of the move if you choose them
Mistake 3 mdash Not Giving Your Phone Internet And Cable Vendors Enough Advance Warning
Eighty percent (80) of unexpected communications blackouts and cost overruns on network moves are caused by failure to properly plan voice data and electrical installation in advance Just because the prior tenant had computers and telephones is no guarantee that the cabling is suitable for your phones and your computer network Advance planning will help you avoid emergency rush fees or band aid fixes to make things work
Internet and telephone connections require as much as six weeks advance notice to be installed tested and ready the day you move in And if you are building a new office donrsquot leave it up to the builder to decide how many power outlets network and phone connections you will need With printers scanners faxes and other technologies
connecting directly to the network these days the rule of thumb of one electrical outlet one phone and one network connection per employee is woefully outdated Consult your IT provider in the early planning stages to ensure you have what you need before
the drywall goes up
Need an Office Move
Check List
As an IT Provider we have helped many of our clients move their office and in that process we have
developed a check list that will ensures that no stone is left un turned when it comes to moving your office If this type of checklist would make you office move easier or anyone that you know then go to
httpSmarthostdesigncomoffice
And download it Or give us a call at 301-576-1122
Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series
What the Heck is Google
Adwords and how can it help
your business Find out Date May 15th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
Website SEO SMO
Facebook LinkedIn Twitter
How can this help your
Business Find out Date June 12th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
BYOD Policies Security of
your Critical Intellectual
Property (IP) How can you
minimize your business risk
Find out Date July 17th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash
If you are interested in topic
and would like us to do a
webinar on that subject
send me an email
at femidadasmarthostdesigncom
Page 6
Here From Femi Corner
Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate
themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and
managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada
Get More Information About Our Services At wwwsmarthostdesigncom
The Lighter Side
PHILOSOPHY OF SPRING CLEANING
I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press
Page 7
DropBox ndash Is It Secure For Your Business
A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip
Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely
When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to
easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant
What To Use Instead If you need to transfer files outside of your network and need to do so
securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your
data
Who Else Wants To Win A $10 Gift Card
The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana
Buell of Shillina Gupta $ Associates PA in Columbia MD She was the
first person to correctly answer my quiz question from last month April
is named after the Greek goddess Aphrodite She is the goddess of
The correct answer was c) Love Now herersquos this monthrsquos trivia
question The winner will receive a gift card to Chic-Fil-A
RESTAURAN
Which May celebration was first observed in 1908
a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day
Email me right now you answer at
femidadasmarthostdesigncom or
Call 301-576-1122 ext 101
Get More Information About Our Services At wwwsmarthostdesigncom
What you must Do to Continue delivering Extraordinary Result
in your Business
Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business
That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource
Page 8
Top 4 Threats Attacking Your Network And What To Do About Them
1 Overconfidence User overconfidence in security products is the top threat to your
network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn
storms (unstoppable rapid fire pornographic pop-ups) and more subtle key
loggers that steal passwords Surveys promising free stuff result in theft of
information like your motherrsquos maiden name high school etc used to answer
common security questions leading to theft of otherwise secure data Think
before you click
2 Social Networking Sites Social networking sites like Facebook are exploding in popularity
Threats range from malware (eg viruses worms spyware) to scammers trying
to steal your identity information and money Many businesses and government
agencies are using these sites to communicate with clients and constituents so
simply blocking access is no longer reasonable Defending your company while
allowing employee access requires social network education for your employees
and the enforcement of strong acceptable use policies We can help you develop
a policy then monitor compliance using a Unified Threat Management device
that controls and reports on network access
3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once
limited to laptop computers mobile network devices now include PDAs
handheld computers and smart phones with new appliances appearing in the
stores every month Mobile devices often contain sensitive data yet they are
easily lost or stolen Be sure to password protect and encrypt data on all mobile
devices whenever possible Include mobile devices in your acceptable use
policy
4 Cloud Computing
ldquoThe Cloudrdquo in its most simple form involves using the Internet to
access and store your data When you access email using a web browser you are
working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly
gaining popularity and is just the beginning Companies like Microsoft IBM
and Google envision the day when we will use inexpensive terminals instead of
computers to run programs and access data located somewhere on the Internet
You need to be sure that any data you store and access across the Internet is
secure not just where it is stored but during the trip to and from the Internet
Monthly Spiritual Devotion
12 I know how to live on almost nothing or with everything I have learned the
secret of living in every situation whether it is with a full stomach or empty
with plenty or little 13 For I can do everything through Christ who gives me
strength Philippians 412-13 (NLT)
Get More Information About Our Services At wwwsmarthostdesigncom
Page 4
Get More Information About Our Services At wwwsmarthostdesigncom
What Is Cloud Computing And Why Should
You Care
Therersquos a good chance that MOST of the software applications you use
every day are now SaaS applications or ldquosoftware as a servicerdquo In other
words you donrsquot have to install them on your server or PC ndash you simply access
it as a pay-as-you-go model for only the licenses space and features you use
This gives you the ability to access highly sophisticated software and
functionality at a fraction of the cost ndash or even for free ndash and without long-term
commitments
For example Google is a massive free cloud application ndash the power
required to search billions of web sites and content in seconds and deliver the
relevant results to your screen far exceeds the capacity of your PC Facebook is
another free cloud application that allows you to post pictures play games and
connect with your friends in real time without having to install those
applications on your computer Of course there are also the applications such
as Salesforce Constant Contact SurveyMonkey etc that you pay to use
With the recent introduction of cloud-based office applications like
Office 365 Google Apps and thousands of other SaaS applications itrsquos
becoming unnecessary for some businesses to purchase and maintain an onsite
server Now companies can host one or more of their applications data e-mail
and other functions ldquoin the cloudrdquo That simply means itrsquos stored offsite in a
highly secure high-availability ldquoutilityrdquo company that has far more power and
resources than you could ever logically have onsite as a small business And
with devices getting cheaper and Internet connectivity exploding cloud
computing is suddenly a very smart viable option for small business owners
What Are The Benefits Of Cloud Computing
1 Eliminates the need for expensive server upgrades and allows you to use
cheaper devices (PCs etc) to get the
same work done
2 Frees you to access applications
from any device and any location
All you need is an Internet
connection
3 Built-in disaster recovery and
business continuity
4 Only pay for what you need and use
(utility pricing)
Is Cloud Computing Right For You
While there are a ton of benefits
to cloud computing itrsquos NOT right for
every company Some applications
donrsquot play well in the cloud You need
commercial-grade Internet
connectivity and some functions like working with big graphics files are
better kept local or the slowness will make you crazy However in almost
every case parts of your computer network (functions) can easily be put in the
cloud to save you money and give you better service So before you donate
your server and sign up for Google Apps or Office 365 itrsquos important you talk
to someone who can honestly assess your unique situation and tell you the
pros and cons of making the switch to cloud computing
Is Your Phones System Costing Too Much
Your are in LUCK
NOW Get Security as a
Services
If you are interested in other services
and would like us to look it up send me
an email
at femidadasmarthostdesigncom
FREE Desk
Phone Promo
Free Cisco SPA
303G For each User
Requires 12ndash Months Agreement
Have you got A virus
hacked or worried your staff
are spending time on un-
related business websites -Managed Network Security could be
the solution plus meet key Gov
Health Marchant SOX HIPPA and
other gov compliances
- SmarthManged Network Security
gives you the peace of mind with
Includes Secure Firewall
Unlimited Monotoring
Unlimited support
Free Setup and Insatll
For a simple Monthly Flat Fee
Call 301-576-1122 ext 101
Page 5
Get More Information About Our Services At wwwsmarthostdesigncom
How To Avoid The Top 3 Budget Busting Stress
-Inducing Mistakes When Moving Your Office Moving is always a pain in the rump but it doesnrsquot have to be a horrific expensive experience The number one lament from someone whorsquos experienced a ldquobadrdquo move is ldquoI didnrsquot know I
needed tohelliprdquo followed closely by ldquoI completely forgot thathelliprdquo In other words itrsquos what you donrsquot do that makes the move a disaster To make your move easy and effortless here are the 5
most common mistakes you want to avoid
Mistake 1 mdash Trying To Save Money By Using Your Employees To Move Your Computer Network
Donrsquot ask your staff to disconnect move and reconnect computers phones and other devices just to save a few bucks Yoursquoll frustrate them and end up with phones ringing at the wrong extension lost cables and workstations that get dropped rendering them useless You donrsquot want to let the movers do this job either they may be great at moving furniture but a network is a lot more sophisticated and sensitive Be smart and hire an IT
pro to pack and move your network
Mistake 2 mdash Not Hiring The RIGHT IT Firm To Move Your Network
While wersquore on the topic make sure you know what to look for when outsourcing the move A few things to look for would include references from other clients proof of insurance (get them to fax you a copy) a service level guarantee limiting the amount of time you are down and a professional organized approach to quoting the move A real pro will insist on visiting your current location as well as your new location to conduct a detailed site survey NEVER hire anyone who wants to quote moving your network over the phone Additionally look for an IT company that will apply the charges for conducting your site survey against the total cost of the move if you choose them
Mistake 3 mdash Not Giving Your Phone Internet And Cable Vendors Enough Advance Warning
Eighty percent (80) of unexpected communications blackouts and cost overruns on network moves are caused by failure to properly plan voice data and electrical installation in advance Just because the prior tenant had computers and telephones is no guarantee that the cabling is suitable for your phones and your computer network Advance planning will help you avoid emergency rush fees or band aid fixes to make things work
Internet and telephone connections require as much as six weeks advance notice to be installed tested and ready the day you move in And if you are building a new office donrsquot leave it up to the builder to decide how many power outlets network and phone connections you will need With printers scanners faxes and other technologies
connecting directly to the network these days the rule of thumb of one electrical outlet one phone and one network connection per employee is woefully outdated Consult your IT provider in the early planning stages to ensure you have what you need before
the drywall goes up
Need an Office Move
Check List
As an IT Provider we have helped many of our clients move their office and in that process we have
developed a check list that will ensures that no stone is left un turned when it comes to moving your office If this type of checklist would make you office move easier or anyone that you know then go to
httpSmarthostdesigncomoffice
And download it Or give us a call at 301-576-1122
Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series
What the Heck is Google
Adwords and how can it help
your business Find out Date May 15th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
Website SEO SMO
Facebook LinkedIn Twitter
How can this help your
Business Find out Date June 12th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
BYOD Policies Security of
your Critical Intellectual
Property (IP) How can you
minimize your business risk
Find out Date July 17th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash
If you are interested in topic
and would like us to do a
webinar on that subject
send me an email
at femidadasmarthostdesigncom
Page 6
Here From Femi Corner
Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate
themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and
managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada
Get More Information About Our Services At wwwsmarthostdesigncom
The Lighter Side
PHILOSOPHY OF SPRING CLEANING
I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press
Page 7
DropBox ndash Is It Secure For Your Business
A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip
Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely
When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to
easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant
What To Use Instead If you need to transfer files outside of your network and need to do so
securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your
data
Who Else Wants To Win A $10 Gift Card
The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana
Buell of Shillina Gupta $ Associates PA in Columbia MD She was the
first person to correctly answer my quiz question from last month April
is named after the Greek goddess Aphrodite She is the goddess of
The correct answer was c) Love Now herersquos this monthrsquos trivia
question The winner will receive a gift card to Chic-Fil-A
RESTAURAN
Which May celebration was first observed in 1908
a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day
Email me right now you answer at
femidadasmarthostdesigncom or
Call 301-576-1122 ext 101
Get More Information About Our Services At wwwsmarthostdesigncom
What you must Do to Continue delivering Extraordinary Result
in your Business
Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business
That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource
Page 8
Top 4 Threats Attacking Your Network And What To Do About Them
1 Overconfidence User overconfidence in security products is the top threat to your
network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn
storms (unstoppable rapid fire pornographic pop-ups) and more subtle key
loggers that steal passwords Surveys promising free stuff result in theft of
information like your motherrsquos maiden name high school etc used to answer
common security questions leading to theft of otherwise secure data Think
before you click
2 Social Networking Sites Social networking sites like Facebook are exploding in popularity
Threats range from malware (eg viruses worms spyware) to scammers trying
to steal your identity information and money Many businesses and government
agencies are using these sites to communicate with clients and constituents so
simply blocking access is no longer reasonable Defending your company while
allowing employee access requires social network education for your employees
and the enforcement of strong acceptable use policies We can help you develop
a policy then monitor compliance using a Unified Threat Management device
that controls and reports on network access
3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once
limited to laptop computers mobile network devices now include PDAs
handheld computers and smart phones with new appliances appearing in the
stores every month Mobile devices often contain sensitive data yet they are
easily lost or stolen Be sure to password protect and encrypt data on all mobile
devices whenever possible Include mobile devices in your acceptable use
policy
4 Cloud Computing
ldquoThe Cloudrdquo in its most simple form involves using the Internet to
access and store your data When you access email using a web browser you are
working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly
gaining popularity and is just the beginning Companies like Microsoft IBM
and Google envision the day when we will use inexpensive terminals instead of
computers to run programs and access data located somewhere on the Internet
You need to be sure that any data you store and access across the Internet is
secure not just where it is stored but during the trip to and from the Internet
Monthly Spiritual Devotion
12 I know how to live on almost nothing or with everything I have learned the
secret of living in every situation whether it is with a full stomach or empty
with plenty or little 13 For I can do everything through Christ who gives me
strength Philippians 412-13 (NLT)
Get More Information About Our Services At wwwsmarthostdesigncom
Page 5
Get More Information About Our Services At wwwsmarthostdesigncom
How To Avoid The Top 3 Budget Busting Stress
-Inducing Mistakes When Moving Your Office Moving is always a pain in the rump but it doesnrsquot have to be a horrific expensive experience The number one lament from someone whorsquos experienced a ldquobadrdquo move is ldquoI didnrsquot know I
needed tohelliprdquo followed closely by ldquoI completely forgot thathelliprdquo In other words itrsquos what you donrsquot do that makes the move a disaster To make your move easy and effortless here are the 5
most common mistakes you want to avoid
Mistake 1 mdash Trying To Save Money By Using Your Employees To Move Your Computer Network
Donrsquot ask your staff to disconnect move and reconnect computers phones and other devices just to save a few bucks Yoursquoll frustrate them and end up with phones ringing at the wrong extension lost cables and workstations that get dropped rendering them useless You donrsquot want to let the movers do this job either they may be great at moving furniture but a network is a lot more sophisticated and sensitive Be smart and hire an IT
pro to pack and move your network
Mistake 2 mdash Not Hiring The RIGHT IT Firm To Move Your Network
While wersquore on the topic make sure you know what to look for when outsourcing the move A few things to look for would include references from other clients proof of insurance (get them to fax you a copy) a service level guarantee limiting the amount of time you are down and a professional organized approach to quoting the move A real pro will insist on visiting your current location as well as your new location to conduct a detailed site survey NEVER hire anyone who wants to quote moving your network over the phone Additionally look for an IT company that will apply the charges for conducting your site survey against the total cost of the move if you choose them
Mistake 3 mdash Not Giving Your Phone Internet And Cable Vendors Enough Advance Warning
Eighty percent (80) of unexpected communications blackouts and cost overruns on network moves are caused by failure to properly plan voice data and electrical installation in advance Just because the prior tenant had computers and telephones is no guarantee that the cabling is suitable for your phones and your computer network Advance planning will help you avoid emergency rush fees or band aid fixes to make things work
Internet and telephone connections require as much as six weeks advance notice to be installed tested and ready the day you move in And if you are building a new office donrsquot leave it up to the builder to decide how many power outlets network and phone connections you will need With printers scanners faxes and other technologies
connecting directly to the network these days the rule of thumb of one electrical outlet one phone and one network connection per employee is woefully outdated Consult your IT provider in the early planning stages to ensure you have what you need before
the drywall goes up
Need an Office Move
Check List
As an IT Provider we have helped many of our clients move their office and in that process we have
developed a check list that will ensures that no stone is left un turned when it comes to moving your office If this type of checklist would make you office move easier or anyone that you know then go to
httpSmarthostdesigncomoffice
And download it Or give us a call at 301-576-1122
Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series
What the Heck is Google
Adwords and how can it help
your business Find out Date May 15th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
Website SEO SMO
Facebook LinkedIn Twitter
How can this help your
Business Find out Date June 12th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
BYOD Policies Security of
your Critical Intellectual
Property (IP) How can you
minimize your business risk
Find out Date July 17th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash
If you are interested in topic
and would like us to do a
webinar on that subject
send me an email
at femidadasmarthostdesigncom
Page 6
Here From Femi Corner
Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate
themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and
managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada
Get More Information About Our Services At wwwsmarthostdesigncom
The Lighter Side
PHILOSOPHY OF SPRING CLEANING
I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press
Page 7
DropBox ndash Is It Secure For Your Business
A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip
Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely
When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to
easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant
What To Use Instead If you need to transfer files outside of your network and need to do so
securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your
data
Who Else Wants To Win A $10 Gift Card
The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana
Buell of Shillina Gupta $ Associates PA in Columbia MD She was the
first person to correctly answer my quiz question from last month April
is named after the Greek goddess Aphrodite She is the goddess of
The correct answer was c) Love Now herersquos this monthrsquos trivia
question The winner will receive a gift card to Chic-Fil-A
RESTAURAN
Which May celebration was first observed in 1908
a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day
Email me right now you answer at
femidadasmarthostdesigncom or
Call 301-576-1122 ext 101
Get More Information About Our Services At wwwsmarthostdesigncom
What you must Do to Continue delivering Extraordinary Result
in your Business
Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business
That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource
Page 8
Top 4 Threats Attacking Your Network And What To Do About Them
1 Overconfidence User overconfidence in security products is the top threat to your
network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn
storms (unstoppable rapid fire pornographic pop-ups) and more subtle key
loggers that steal passwords Surveys promising free stuff result in theft of
information like your motherrsquos maiden name high school etc used to answer
common security questions leading to theft of otherwise secure data Think
before you click
2 Social Networking Sites Social networking sites like Facebook are exploding in popularity
Threats range from malware (eg viruses worms spyware) to scammers trying
to steal your identity information and money Many businesses and government
agencies are using these sites to communicate with clients and constituents so
simply blocking access is no longer reasonable Defending your company while
allowing employee access requires social network education for your employees
and the enforcement of strong acceptable use policies We can help you develop
a policy then monitor compliance using a Unified Threat Management device
that controls and reports on network access
3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once
limited to laptop computers mobile network devices now include PDAs
handheld computers and smart phones with new appliances appearing in the
stores every month Mobile devices often contain sensitive data yet they are
easily lost or stolen Be sure to password protect and encrypt data on all mobile
devices whenever possible Include mobile devices in your acceptable use
policy
4 Cloud Computing
ldquoThe Cloudrdquo in its most simple form involves using the Internet to
access and store your data When you access email using a web browser you are
working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly
gaining popularity and is just the beginning Companies like Microsoft IBM
and Google envision the day when we will use inexpensive terminals instead of
computers to run programs and access data located somewhere on the Internet
You need to be sure that any data you store and access across the Internet is
secure not just where it is stored but during the trip to and from the Internet
Monthly Spiritual Devotion
12 I know how to live on almost nothing or with everything I have learned the
secret of living in every situation whether it is with a full stomach or empty
with plenty or little 13 For I can do everything through Christ who gives me
strength Philippians 412-13 (NLT)
Get More Information About Our Services At wwwsmarthostdesigncom
Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series
What the Heck is Google
Adwords and how can it help
your business Find out Date May 15th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
Website SEO SMO
Facebook LinkedIn Twitter
How can this help your
Business Find out Date June 12th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash
BYOD Policies Security of
your Critical Intellectual
Property (IP) How can you
minimize your business risk
Find out Date July 17th 2013
Time 1200 PMmdash100 PM
Register at httpsmarthostdesigncomevent
mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash
If you are interested in topic
and would like us to do a
webinar on that subject
send me an email
at femidadasmarthostdesigncom
Page 6
Here From Femi Corner
Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate
themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and
managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada
Get More Information About Our Services At wwwsmarthostdesigncom
The Lighter Side
PHILOSOPHY OF SPRING CLEANING
I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press
Page 7
DropBox ndash Is It Secure For Your Business
A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip
Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely
When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to
easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant
What To Use Instead If you need to transfer files outside of your network and need to do so
securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your
data
Who Else Wants To Win A $10 Gift Card
The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana
Buell of Shillina Gupta $ Associates PA in Columbia MD She was the
first person to correctly answer my quiz question from last month April
is named after the Greek goddess Aphrodite She is the goddess of
The correct answer was c) Love Now herersquos this monthrsquos trivia
question The winner will receive a gift card to Chic-Fil-A
RESTAURAN
Which May celebration was first observed in 1908
a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day
Email me right now you answer at
femidadasmarthostdesigncom or
Call 301-576-1122 ext 101
Get More Information About Our Services At wwwsmarthostdesigncom
What you must Do to Continue delivering Extraordinary Result
in your Business
Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business
That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource
Page 8
Top 4 Threats Attacking Your Network And What To Do About Them
1 Overconfidence User overconfidence in security products is the top threat to your
network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn
storms (unstoppable rapid fire pornographic pop-ups) and more subtle key
loggers that steal passwords Surveys promising free stuff result in theft of
information like your motherrsquos maiden name high school etc used to answer
common security questions leading to theft of otherwise secure data Think
before you click
2 Social Networking Sites Social networking sites like Facebook are exploding in popularity
Threats range from malware (eg viruses worms spyware) to scammers trying
to steal your identity information and money Many businesses and government
agencies are using these sites to communicate with clients and constituents so
simply blocking access is no longer reasonable Defending your company while
allowing employee access requires social network education for your employees
and the enforcement of strong acceptable use policies We can help you develop
a policy then monitor compliance using a Unified Threat Management device
that controls and reports on network access
3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once
limited to laptop computers mobile network devices now include PDAs
handheld computers and smart phones with new appliances appearing in the
stores every month Mobile devices often contain sensitive data yet they are
easily lost or stolen Be sure to password protect and encrypt data on all mobile
devices whenever possible Include mobile devices in your acceptable use
policy
4 Cloud Computing
ldquoThe Cloudrdquo in its most simple form involves using the Internet to
access and store your data When you access email using a web browser you are
working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly
gaining popularity and is just the beginning Companies like Microsoft IBM
and Google envision the day when we will use inexpensive terminals instead of
computers to run programs and access data located somewhere on the Internet
You need to be sure that any data you store and access across the Internet is
secure not just where it is stored but during the trip to and from the Internet
Monthly Spiritual Devotion
12 I know how to live on almost nothing or with everything I have learned the
secret of living in every situation whether it is with a full stomach or empty
with plenty or little 13 For I can do everything through Christ who gives me
strength Philippians 412-13 (NLT)
Get More Information About Our Services At wwwsmarthostdesigncom
The Lighter Side
PHILOSOPHY OF SPRING CLEANING
I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press
Page 7
DropBox ndash Is It Secure For Your Business
A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip
Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely
When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to
easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant
What To Use Instead If you need to transfer files outside of your network and need to do so
securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your
data
Who Else Wants To Win A $10 Gift Card
The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana
Buell of Shillina Gupta $ Associates PA in Columbia MD She was the
first person to correctly answer my quiz question from last month April
is named after the Greek goddess Aphrodite She is the goddess of
The correct answer was c) Love Now herersquos this monthrsquos trivia
question The winner will receive a gift card to Chic-Fil-A
RESTAURAN
Which May celebration was first observed in 1908
a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day
Email me right now you answer at
femidadasmarthostdesigncom or
Call 301-576-1122 ext 101
Get More Information About Our Services At wwwsmarthostdesigncom
What you must Do to Continue delivering Extraordinary Result
in your Business
Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business
That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource
Page 8
Top 4 Threats Attacking Your Network And What To Do About Them
1 Overconfidence User overconfidence in security products is the top threat to your
network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn
storms (unstoppable rapid fire pornographic pop-ups) and more subtle key
loggers that steal passwords Surveys promising free stuff result in theft of
information like your motherrsquos maiden name high school etc used to answer
common security questions leading to theft of otherwise secure data Think
before you click
2 Social Networking Sites Social networking sites like Facebook are exploding in popularity
Threats range from malware (eg viruses worms spyware) to scammers trying
to steal your identity information and money Many businesses and government
agencies are using these sites to communicate with clients and constituents so
simply blocking access is no longer reasonable Defending your company while
allowing employee access requires social network education for your employees
and the enforcement of strong acceptable use policies We can help you develop
a policy then monitor compliance using a Unified Threat Management device
that controls and reports on network access
3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once
limited to laptop computers mobile network devices now include PDAs
handheld computers and smart phones with new appliances appearing in the
stores every month Mobile devices often contain sensitive data yet they are
easily lost or stolen Be sure to password protect and encrypt data on all mobile
devices whenever possible Include mobile devices in your acceptable use
policy
4 Cloud Computing
ldquoThe Cloudrdquo in its most simple form involves using the Internet to
access and store your data When you access email using a web browser you are
working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly
gaining popularity and is just the beginning Companies like Microsoft IBM
and Google envision the day when we will use inexpensive terminals instead of
computers to run programs and access data located somewhere on the Internet
You need to be sure that any data you store and access across the Internet is
secure not just where it is stored but during the trip to and from the Internet
Monthly Spiritual Devotion
12 I know how to live on almost nothing or with everything I have learned the
secret of living in every situation whether it is with a full stomach or empty
with plenty or little 13 For I can do everything through Christ who gives me
strength Philippians 412-13 (NLT)
Get More Information About Our Services At wwwsmarthostdesigncom
What you must Do to Continue delivering Extraordinary Result
in your Business
Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business
That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource
Page 8
Top 4 Threats Attacking Your Network And What To Do About Them
1 Overconfidence User overconfidence in security products is the top threat to your
network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn
storms (unstoppable rapid fire pornographic pop-ups) and more subtle key
loggers that steal passwords Surveys promising free stuff result in theft of
information like your motherrsquos maiden name high school etc used to answer
common security questions leading to theft of otherwise secure data Think
before you click
2 Social Networking Sites Social networking sites like Facebook are exploding in popularity
Threats range from malware (eg viruses worms spyware) to scammers trying
to steal your identity information and money Many businesses and government
agencies are using these sites to communicate with clients and constituents so
simply blocking access is no longer reasonable Defending your company while
allowing employee access requires social network education for your employees
and the enforcement of strong acceptable use policies We can help you develop
a policy then monitor compliance using a Unified Threat Management device
that controls and reports on network access
3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once
limited to laptop computers mobile network devices now include PDAs
handheld computers and smart phones with new appliances appearing in the
stores every month Mobile devices often contain sensitive data yet they are
easily lost or stolen Be sure to password protect and encrypt data on all mobile
devices whenever possible Include mobile devices in your acceptable use
policy
4 Cloud Computing
ldquoThe Cloudrdquo in its most simple form involves using the Internet to
access and store your data When you access email using a web browser you are
working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly
gaining popularity and is just the beginning Companies like Microsoft IBM
and Google envision the day when we will use inexpensive terminals instead of
computers to run programs and access data located somewhere on the Internet
You need to be sure that any data you store and access across the Internet is
secure not just where it is stored but during the trip to and from the Internet
Monthly Spiritual Devotion
12 I know how to live on almost nothing or with everything I have learned the
secret of living in every situation whether it is with a full stomach or empty
with plenty or little 13 For I can do everything through Christ who gives me
strength Philippians 412-13 (NLT)
Get More Information About Our Services At wwwsmarthostdesigncom