Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our...

8
“Insider Tips To Make Your Business Run Faster, Easier And More Profitably” Technology Times Get More Information About Our Services At: www.smarthostdesign.com A very common misconception is that Apple Mac products cannot get viruses. Not true! There is no such thing as a 100% safe computer. Devices running OS X, Windows, Linux, Android or any other operating system are all capable of being infected with a virus or other malware. However, the likelihood that an Apple Macintosh user gets a virus is much lower than for Windows users. In fact, many Apple users don’t even run any antivirus software on their computers. Whether that is a smart strategy is debated by many IT professionals. A few of the reasons why Macs don’t get as many viruses as PCs are: 1. Mac OS X is based on the Unix operating system, which is one of the oldest and most secure operating systems around. 2. Microsoft Windows is used by many more people, so it’s a bigger and better target. Plus the way that Windows is built makes it easier for viruses to spread across computer networks. 3. Many of the tools designed to create viruses or malware are written for the Windows operating system. Windows Threats Even For Macs Many Mac users find themselves having to use Parallels, BootCamp or other virtual software to run Windows only programs such as Microsoft Publisher. Because these Macs are now running a Windows operating system, they are now susceptible to Windows viruses. In addition, an Apple computer can certain become a “carrier” of a Windows-based virus. This virus would not infect the Apple machine, but could infect other Windows machines on your network if it were to send that virus via email or across the office computer network. And Even More Threats… Any software, plug-in or other 3rd party add-on that is installed onto any computer that connects to the internet can introduce its own security risks. One of the most common ways that the “bad guys” are able to attack a Mac is through browser applications and browser plug-ins such as Adobe Flash, Adobe Reader, Java and others. Just about every Mac user has all three of these plug-ins installed on their computers (and many more). These are a necessary part of business, but do introduce additional security risks for all computers. The Human Factor Although Apple Macs are less vulnerable to viruses, they are still operated by flawed humans who can still be the victim of Trojan Horses, phishing and other online fraud. Your best bet is to keep everyone informed about online security risks in your business, no matter the computer they’re using. “As a business owner, you don’t have time to waste on technical and operational issues. That’s where we shine! Call us and put an end to your IT problems finally and forever!” - Femi Dada, Smarthost Design Technologies, LLC Volume VI, Issue 5 May 2013 Lanham, MD Inside This Issue… Can Apple Macs Get Viruses?...........................................Page 1 Are You Still Using Outdated Tape Backups?……...…...........................Page 2 3 Things You Need To Know About E- mail Marketing Before You Press “Send”……………………..............Page 2 Shiny New Gadget Of The Month: Intel Ultrabook Convertible…...……...Page 3 I Need Your Help On This …………………………………......Page 3 What is Cloud Computing and Why Should You Care ……………… . Page 4 The Lighter Side: Philosophy Of Spring Cleaning..........................................Page 4 How to avoid budget busting mistake when you move your office ...… Page 5 Office move Check List ………...Page 5 Coach Ditka: You can’t motivate someone ……………...…………. Page 6 Dropbox: Is It Secure For Your Business? ........................................Page 7 What you must Do to Continue Delivering Extraordinary Result ……………………………………..Page 8 Top 4 Threats Attacking Your Network And What To Do About Them .. Page 8 Can Apple Macs Get Viruses?

Transcript of Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our...

Page 1: Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our Services At: ... phishing and other online fraud. Your best bet is to keep everyone informed

ldquoInsider Tips To Make Your Business Run Faster

Easier And More Profitablyrdquo

Technology Times

Get More Information About Our Services At wwwsmarthostdesigncom

A very common misconception is that Apple Mac products cannot get viruses Not true There is no such thing as a 100 safe computer Devices running OS X Windows Linux Android or any other operating system are all capable of being infected with a virus or other malware However the likelihood that an Apple Macintosh user gets a virus is much lower than for Windows users In fact many Apple users donrsquot even run any antivirus software on their computers Whether that is a smart strategy is debated by many IT professionals A few of the reasons why Macs donrsquot get as many viruses as PCs are

1 Mac OS X is based on the Unix operating system which is one of the oldest and most secure operating systems around

2 Microsoft Windows is used by many more people so itrsquos a bigger and better target Plus the way that Windows is built makes it easier for viruses to spread across computer networks

3 Many of the tools designed to create viruses or malware are written for the Windows operating system

Windows Threats Even For Macs

Many Mac users find themselves having to use Parallels BootCamp or other virtual software to run Windows only programs such as Microsoft Publisher Because these Macs are now running a Windows operating system they are now susceptible to Windows viruses In addition an Apple computer can certain become a ldquocarrierrdquo of a Windows-based virus This virus would not infect the Apple machine but could infect other Windows machines on your network if it were to send that virus via email or across the office computer network

And Even More Threatshellip

Any software plug-in or other 3rd party add-on that is installed onto any computer that connects to the internet can introduce its own security risks One of the most common ways that the ldquobad guysrdquo are able to attack a Mac is through browser applications and browser plug-ins such as Adobe Flash Adobe Reader Java and others Just about every Mac user has all three of these plug-ins installed on their computers (and many more) These are a necessary part of business but do introduce additional security risks for all computers

The Human Factor

Although Apple Macs are less vulnerable to viruses they are still operated by flawed humans who can still be the victim of Trojan Horses phishing and other online fraud Your best bet is to keep everyone informed about online security risks in your business no matter the computer theyrsquore using

ldquoAs a business owner you donrsquot have

time to waste on technical and

operational issues Thatrsquos where we

shine Call us and put an end to your IT

problems finally and foreverrdquo

- Femi Dada Smarthost Design

Technologies LLC

Volume VI Issue 5 May 2013

Lanham MD

Inside This Issuehellip

Can Apple Macs Get VirusesPage 1 Are You Still Using Outdated Tape BackupshelliphelliphellipPage 2 3 Things You Need To Know About E-mail Marketing Before You Press ldquoSendrdquohelliphelliphelliphelliphelliphelliphelliphellipPage 2 Shiny New Gadget Of The Month Intel Ultrabook ConvertiblehelliphelliphellipPage 3 I Need Your Help On This helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipPage 3 What is Cloud Computing and Why Should You Care helliphelliphelliphelliphelliphellip Page 4 The Lighter Side Philosophy Of Spring CleaningPage 4 How to avoid budget busting mistake when you move your office hellip Page 5 Office move Check List helliphelliphellipPage 5 Coach Ditka You canrsquot motivate someone helliphelliphelliphelliphelliphelliphelliphelliphellip Page 6 Dropbox Is It Secure For Your Business Page 7 What you must Do to Continue Delivering Extraordinary Result helliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphelliphellipPage 8 Top 4 Threats Attacking Your Network And What To Do About Them Page 8

Can Apple Macs Get Viruses

Page 2

3 Things You Need To Know About E-mail

Marketing Before You Press ldquoSendrdquo

Itrsquos everyonersquos favorite application Since

its introduction it has revolutionized the way

we communicate both personally and

professionally It has had a major impact on

how companies market themselves

communicate with vendors send out press

releases rally employees and alert clients to

their latest and greatest promotion The ease low-cost and speed of e-mail in

marketing is the biggest reason why our inboxes are overflowing with spam

In response to the ubiquitous outcry ldquoI hate spamrdquo governments have

crafted regulations surrounding the use of e-mail and if you are one of the

millions of companies using e-mail for marketing then itrsquos important that you

familiarize yourself with these laws But the danger doesnrsquot stop there

Even if you donrsquot get caught by the feds for violating the rules of e-mail

usage you can still end up on a blacklist with the major ISPs such as Yahoo

Gmail GoDaddy and Earthlink Once you get blacklisted you are considered

guilty until proven innocent and ALL the e-mail you send wonrsquot get through

even to people who want to receive itmdasha consequence that could end up

hurting your business more than a fine

What Are The Basic Guidelines Of E-mail Marketing

First and foremost make sure you are only sending e-mail campaigns to

people who have solicited (requested) to be on your distribution list This is

called ldquoopting-inrdquo or subscribing and e-mails sent to these folks are considered

ldquosolicited e-mailrdquo You are perfectly within your rights to send them messages

but if you got their e-mail address by any other means and they did NOT

specifically request to be on your list thatrsquos considered ldquounsolicited e-mailrdquo or

spam Sending promotional e-mails to people who have not requested them is

not only illegal but annoyingso donrsquot do it

Next make sure you provide directions on how a person can remove

themselves from your distribution list in EVERY e-mail The best place to put

this information is at the very bottom of your message You should also

include your full company name and contact information at the bottom so no

one can blame you for cloaking your identitymdashanother legal ldquono-nordquo of e-mail

marketing

Our 1 Recommendation

Lastly when sending e-mail out to your marketing list we recommend

using a service such as ConstantContact or InfusionSoft These web-based

applications will help you manage your e-mail distribution list with automatic

opt-out and opt-in tools and will keep your e-mail server off an ISPrsquos blacklist

Naturally you want to make sure the information you are sending is

interesting and relevant No one wants more junk filling up their inbox so the

better you are at marketing the better your results will be E-mail is not a

magic marketing bullet that will solve all your marketing problems but used

correctly it can certainly help you reach more customers and build stronger

relationships with the people you already do business with

Are You STILL Using

Outdated Tape Backups If your computer network and the data it holds got erased or corrupted because of a virus hard drive crash fire flood or some other random unforeseen disaster how confident are you RIGHT NOW that your business could be back up and running again FAST

If your answer to that is ldquoI donrsquot knowrdquo or ldquoIrsquom not surerdquo you are taking a HUGE risk with your companyrsquos most important assetmdashthe data on your network Just imagine what would happen to your business if you lost your entire client databasehellip

hellipLost all accounting documentation and historyhellipLost all the work files yoursquove spent YEARS developinghellipLost the work files and documentation you so desperately need to service your customershellip

Can you even put a price tag on it Probably notmdashyet so many business owners arenrsquot 100 certain that they could be back up and running after a disaster and are purely hoping that their current tape drive or backup is working and storing a usable copy of their data

Tape Drives Are The MOST Unreliable Unsecured Way To

Back Up Your Data All tape drives fail itrsquos only a matter of ldquowhenrdquo not ldquoifrdquo So if being able to get back up and running again in the event of a data-erasing disaster is important then you need to know about our Smart Managed Backup amp Disaster Recovery (SmartMnnagedBDR) solution would This Disaster-proof backup service does more than just keep a copy of your filesmdashit provides ldquocontinuous data protectionrdquo and enables near-instant disaster recovery because it takes a snapshot of your entire network throughout the day giving you the confidence we could have you back up and running again within HOURS not days or weeks Want to know if your data is REALLY secure and being backed up properly Call us for a FREE Data Backup and Disaster Recovery Audit Call us at 301-576-1122 or go online to

Get More Information About Our Services At wwwsmarthostdesigncom

Page 3

Shiny New Gadget Of The Month

Intel Ultrabook

Convertible

The Intel-based Ultrabook Convertible is one of the most cutting-edge on-the-go laptops to date Quite simply itrsquos a laptop when you need it and a tablet when you want it

Ultrabook with touch display using Windows 8 delivers stunning graphics and the ultimate in precision and control And unlike an iPad or Android tablet this convertible turns into a powerful laptop in an instant

Additionally models with Intel Smart Connect Technology continually update your email and social networks even when your Ultrabook is shut down Yoursquoll wake from sleep mode in less than 7 seconds and already be completely updated so that you can resume what you were doing in the blink of an eye

And with Intelrsquos Anti-Theft Technology if your Ultrabook is ever lost or stolen you can instantly disable the machine from anywhere ensuring that your data is safe and secure

Learn more today at wwwintelcomUltrabook

I Need Your Help On Thishellip

Dear Friend

I have a small favor to ask that in the end will benefit you But first let me

explain whats led up to this

Over the last year weve seen a dramatic increase in the number of clients

who are inquiring about how to access their desktop files email etc on a

mobile device - be it an iPad smartphone laptop tablet etc

Weve also seen an increase in the number of clients who allow employees to

bring their own devices to work andor access the company network from

home using their personal computer or phone If yoursquove been following along

in the last 2 issues of this newsletter yoursquove probably noticed

Naturally this raises a NUMBER of questions and concerns over security

Whats the best way to allow remote access to company data

What are the best policies for privacy and cloud computing

How can we ensure our compliance with data breech laws and

regulatory controls

Thats why weve decided to hold a series of educational webinarsseminar on

this topic in the coming months to answer important questions and to guide

clients to use safe best practices when introducing mobile devices onto their

network

However Im struggling to narrow down the topic and the questions we

should address during these sessions since mobile and cloud computing are

such big topics

So instead of just guessing I was hoping you could do me a favor by

answering the following 2 questions

What is the single most important question you would like us to address

on the topic of mobile and cloud computing

Second

Whats the single biggest CONCERN you have about cloud computing

and employees remotely accessing your network with mobile devices

If you would just take a moment to send me an email at

femidadasmarthostdesigncom and give me some direction in this I would

be grateful

Many thanks

Client Spotlight Fujitec America When Fujitec America in Lanham MD was relocating their office they needed a

Technology Company to help them plan co-ordinate access and install the new of-

fice technologies Fortunately Gorge Jonson was referred to Smarthost Design Tech-

nologies ldquoSmarthost Design Technologies took the ball and run with it giving me

peace of mindrdquo Gorge JohnsonmdashGM Fujitec America Would you like your

company highlighted here in our ldquoClient Spotlightrdquo Then give us a call today at 301-

576-1122

httpsmarthostdesigncomFujitec

Get More Information About Our Services At wwwsmarthostdesigncom

Page 4

Get More Information About Our Services At wwwsmarthostdesigncom

What Is Cloud Computing And Why Should

You Care

Therersquos a good chance that MOST of the software applications you use

every day are now SaaS applications or ldquosoftware as a servicerdquo In other

words you donrsquot have to install them on your server or PC ndash you simply access

it as a pay-as-you-go model for only the licenses space and features you use

This gives you the ability to access highly sophisticated software and

functionality at a fraction of the cost ndash or even for free ndash and without long-term

commitments

For example Google is a massive free cloud application ndash the power

required to search billions of web sites and content in seconds and deliver the

relevant results to your screen far exceeds the capacity of your PC Facebook is

another free cloud application that allows you to post pictures play games and

connect with your friends in real time without having to install those

applications on your computer Of course there are also the applications such

as Salesforce Constant Contact SurveyMonkey etc that you pay to use

With the recent introduction of cloud-based office applications like

Office 365 Google Apps and thousands of other SaaS applications itrsquos

becoming unnecessary for some businesses to purchase and maintain an onsite

server Now companies can host one or more of their applications data e-mail

and other functions ldquoin the cloudrdquo That simply means itrsquos stored offsite in a

highly secure high-availability ldquoutilityrdquo company that has far more power and

resources than you could ever logically have onsite as a small business And

with devices getting cheaper and Internet connectivity exploding cloud

computing is suddenly a very smart viable option for small business owners

What Are The Benefits Of Cloud Computing

1 Eliminates the need for expensive server upgrades and allows you to use

cheaper devices (PCs etc) to get the

same work done

2 Frees you to access applications

from any device and any location

All you need is an Internet

connection

3 Built-in disaster recovery and

business continuity

4 Only pay for what you need and use

(utility pricing)

Is Cloud Computing Right For You

While there are a ton of benefits

to cloud computing itrsquos NOT right for

every company Some applications

donrsquot play well in the cloud You need

commercial-grade Internet

connectivity and some functions like working with big graphics files are

better kept local or the slowness will make you crazy However in almost

every case parts of your computer network (functions) can easily be put in the

cloud to save you money and give you better service So before you donate

your server and sign up for Google Apps or Office 365 itrsquos important you talk

to someone who can honestly assess your unique situation and tell you the

pros and cons of making the switch to cloud computing

Is Your Phones System Costing Too Much

Your are in LUCK

NOW Get Security as a

Services

If you are interested in other services

and would like us to look it up send me

an email

at femidadasmarthostdesigncom

FREE Desk

Phone Promo

Free Cisco SPA

303G For each User

Requires 12ndash Months Agreement

Have you got A virus

hacked or worried your staff

are spending time on un-

related business websites -Managed Network Security could be

the solution plus meet key Gov

Health Marchant SOX HIPPA and

other gov compliances

- SmarthManged Network Security

gives you the peace of mind with

Includes Secure Firewall

Unlimited Monotoring

Unlimited support

Free Setup and Insatll

For a simple Monthly Flat Fee

Call 301-576-1122 ext 101

Page 5

Get More Information About Our Services At wwwsmarthostdesigncom

How To Avoid The Top 3 Budget Busting Stress

-Inducing Mistakes When Moving Your Office Moving is always a pain in the rump but it doesnrsquot have to be a horrific expensive experience The number one lament from someone whorsquos experienced a ldquobadrdquo move is ldquoI didnrsquot know I

needed tohelliprdquo followed closely by ldquoI completely forgot thathelliprdquo In other words itrsquos what you donrsquot do that makes the move a disaster To make your move easy and effortless here are the 5

most common mistakes you want to avoid

Mistake 1 mdash Trying To Save Money By Using Your Employees To Move Your Computer Network

Donrsquot ask your staff to disconnect move and reconnect computers phones and other devices just to save a few bucks Yoursquoll frustrate them and end up with phones ringing at the wrong extension lost cables and workstations that get dropped rendering them useless You donrsquot want to let the movers do this job either they may be great at moving furniture but a network is a lot more sophisticated and sensitive Be smart and hire an IT

pro to pack and move your network

Mistake 2 mdash Not Hiring The RIGHT IT Firm To Move Your Network

While wersquore on the topic make sure you know what to look for when outsourcing the move A few things to look for would include references from other clients proof of insurance (get them to fax you a copy) a service level guarantee limiting the amount of time you are down and a professional organized approach to quoting the move A real pro will insist on visiting your current location as well as your new location to conduct a detailed site survey NEVER hire anyone who wants to quote moving your network over the phone Additionally look for an IT company that will apply the charges for conducting your site survey against the total cost of the move if you choose them

Mistake 3 mdash Not Giving Your Phone Internet And Cable Vendors Enough Advance Warning

Eighty percent (80) of unexpected communications blackouts and cost overruns on network moves are caused by failure to properly plan voice data and electrical installation in advance Just because the prior tenant had computers and telephones is no guarantee that the cabling is suitable for your phones and your computer network Advance planning will help you avoid emergency rush fees or band aid fixes to make things work

Internet and telephone connections require as much as six weeks advance notice to be installed tested and ready the day you move in And if you are building a new office donrsquot leave it up to the builder to decide how many power outlets network and phone connections you will need With printers scanners faxes and other technologies

connecting directly to the network these days the rule of thumb of one electrical outlet one phone and one network connection per employee is woefully outdated Consult your IT provider in the early planning stages to ensure you have what you need before

the drywall goes up

Need an Office Move

Check List

As an IT Provider we have helped many of our clients move their office and in that process we have

developed a check list that will ensures that no stone is left un turned when it comes to moving your office If this type of checklist would make you office move easier or anyone that you know then go to

httpSmarthostdesigncomoffice

And download it Or give us a call at 301-576-1122

Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series

What the Heck is Google

Adwords and how can it help

your business Find out Date May 15th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

Website SEO SMO

Facebook LinkedIn Twitter

How can this help your

Business Find out Date June 12th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

BYOD Policies Security of

your Critical Intellectual

Property (IP) How can you

minimize your business risk

Find out Date July 17th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash

If you are interested in topic

and would like us to do a

webinar on that subject

send me an email

at femidadasmarthostdesigncom

Page 6

Here From Femi Corner

Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate

themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and

managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada

Get More Information About Our Services At wwwsmarthostdesigncom

The Lighter Side

PHILOSOPHY OF SPRING CLEANING

I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press

Page 7

DropBox ndash Is It Secure For Your Business

A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip

Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely

When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to

easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant

What To Use Instead If you need to transfer files outside of your network and need to do so

securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your

data

Who Else Wants To Win A $10 Gift Card

The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana

Buell of Shillina Gupta $ Associates PA in Columbia MD She was the

first person to correctly answer my quiz question from last month April

is named after the Greek goddess Aphrodite She is the goddess of

The correct answer was c) Love Now herersquos this monthrsquos trivia

question The winner will receive a gift card to Chic-Fil-A

RESTAURAN

Which May celebration was first observed in 1908

a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day

Email me right now you answer at

femidadasmarthostdesigncom or

Call 301-576-1122 ext 101

Get More Information About Our Services At wwwsmarthostdesigncom

What you must Do to Continue delivering Extraordinary Result

in your Business

Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business

That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource

Page 8

Top 4 Threats Attacking Your Network And What To Do About Them

1 Overconfidence User overconfidence in security products is the top threat to your

network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn

storms (unstoppable rapid fire pornographic pop-ups) and more subtle key

loggers that steal passwords Surveys promising free stuff result in theft of

information like your motherrsquos maiden name high school etc used to answer

common security questions leading to theft of otherwise secure data Think

before you click

2 Social Networking Sites Social networking sites like Facebook are exploding in popularity

Threats range from malware (eg viruses worms spyware) to scammers trying

to steal your identity information and money Many businesses and government

agencies are using these sites to communicate with clients and constituents so

simply blocking access is no longer reasonable Defending your company while

allowing employee access requires social network education for your employees

and the enforcement of strong acceptable use policies We can help you develop

a policy then monitor compliance using a Unified Threat Management device

that controls and reports on network access

3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once

limited to laptop computers mobile network devices now include PDAs

handheld computers and smart phones with new appliances appearing in the

stores every month Mobile devices often contain sensitive data yet they are

easily lost or stolen Be sure to password protect and encrypt data on all mobile

devices whenever possible Include mobile devices in your acceptable use

policy

4 Cloud Computing

ldquoThe Cloudrdquo in its most simple form involves using the Internet to

access and store your data When you access email using a web browser you are

working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly

gaining popularity and is just the beginning Companies like Microsoft IBM

and Google envision the day when we will use inexpensive terminals instead of

computers to run programs and access data located somewhere on the Internet

You need to be sure that any data you store and access across the Internet is

secure not just where it is stored but during the trip to and from the Internet

Monthly Spiritual Devotion

12 I know how to live on almost nothing or with everything I have learned the

secret of living in every situation whether it is with a full stomach or empty

with plenty or little 13 For I can do everything through Christ who gives me

strength Philippians 412-13 (NLT)

Get More Information About Our Services At wwwsmarthostdesigncom

Page 2: Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our Services At: ... phishing and other online fraud. Your best bet is to keep everyone informed

Page 2

3 Things You Need To Know About E-mail

Marketing Before You Press ldquoSendrdquo

Itrsquos everyonersquos favorite application Since

its introduction it has revolutionized the way

we communicate both personally and

professionally It has had a major impact on

how companies market themselves

communicate with vendors send out press

releases rally employees and alert clients to

their latest and greatest promotion The ease low-cost and speed of e-mail in

marketing is the biggest reason why our inboxes are overflowing with spam

In response to the ubiquitous outcry ldquoI hate spamrdquo governments have

crafted regulations surrounding the use of e-mail and if you are one of the

millions of companies using e-mail for marketing then itrsquos important that you

familiarize yourself with these laws But the danger doesnrsquot stop there

Even if you donrsquot get caught by the feds for violating the rules of e-mail

usage you can still end up on a blacklist with the major ISPs such as Yahoo

Gmail GoDaddy and Earthlink Once you get blacklisted you are considered

guilty until proven innocent and ALL the e-mail you send wonrsquot get through

even to people who want to receive itmdasha consequence that could end up

hurting your business more than a fine

What Are The Basic Guidelines Of E-mail Marketing

First and foremost make sure you are only sending e-mail campaigns to

people who have solicited (requested) to be on your distribution list This is

called ldquoopting-inrdquo or subscribing and e-mails sent to these folks are considered

ldquosolicited e-mailrdquo You are perfectly within your rights to send them messages

but if you got their e-mail address by any other means and they did NOT

specifically request to be on your list thatrsquos considered ldquounsolicited e-mailrdquo or

spam Sending promotional e-mails to people who have not requested them is

not only illegal but annoyingso donrsquot do it

Next make sure you provide directions on how a person can remove

themselves from your distribution list in EVERY e-mail The best place to put

this information is at the very bottom of your message You should also

include your full company name and contact information at the bottom so no

one can blame you for cloaking your identitymdashanother legal ldquono-nordquo of e-mail

marketing

Our 1 Recommendation

Lastly when sending e-mail out to your marketing list we recommend

using a service such as ConstantContact or InfusionSoft These web-based

applications will help you manage your e-mail distribution list with automatic

opt-out and opt-in tools and will keep your e-mail server off an ISPrsquos blacklist

Naturally you want to make sure the information you are sending is

interesting and relevant No one wants more junk filling up their inbox so the

better you are at marketing the better your results will be E-mail is not a

magic marketing bullet that will solve all your marketing problems but used

correctly it can certainly help you reach more customers and build stronger

relationships with the people you already do business with

Are You STILL Using

Outdated Tape Backups If your computer network and the data it holds got erased or corrupted because of a virus hard drive crash fire flood or some other random unforeseen disaster how confident are you RIGHT NOW that your business could be back up and running again FAST

If your answer to that is ldquoI donrsquot knowrdquo or ldquoIrsquom not surerdquo you are taking a HUGE risk with your companyrsquos most important assetmdashthe data on your network Just imagine what would happen to your business if you lost your entire client databasehellip

hellipLost all accounting documentation and historyhellipLost all the work files yoursquove spent YEARS developinghellipLost the work files and documentation you so desperately need to service your customershellip

Can you even put a price tag on it Probably notmdashyet so many business owners arenrsquot 100 certain that they could be back up and running after a disaster and are purely hoping that their current tape drive or backup is working and storing a usable copy of their data

Tape Drives Are The MOST Unreliable Unsecured Way To

Back Up Your Data All tape drives fail itrsquos only a matter of ldquowhenrdquo not ldquoifrdquo So if being able to get back up and running again in the event of a data-erasing disaster is important then you need to know about our Smart Managed Backup amp Disaster Recovery (SmartMnnagedBDR) solution would This Disaster-proof backup service does more than just keep a copy of your filesmdashit provides ldquocontinuous data protectionrdquo and enables near-instant disaster recovery because it takes a snapshot of your entire network throughout the day giving you the confidence we could have you back up and running again within HOURS not days or weeks Want to know if your data is REALLY secure and being backed up properly Call us for a FREE Data Backup and Disaster Recovery Audit Call us at 301-576-1122 or go online to

Get More Information About Our Services At wwwsmarthostdesigncom

Page 3

Shiny New Gadget Of The Month

Intel Ultrabook

Convertible

The Intel-based Ultrabook Convertible is one of the most cutting-edge on-the-go laptops to date Quite simply itrsquos a laptop when you need it and a tablet when you want it

Ultrabook with touch display using Windows 8 delivers stunning graphics and the ultimate in precision and control And unlike an iPad or Android tablet this convertible turns into a powerful laptop in an instant

Additionally models with Intel Smart Connect Technology continually update your email and social networks even when your Ultrabook is shut down Yoursquoll wake from sleep mode in less than 7 seconds and already be completely updated so that you can resume what you were doing in the blink of an eye

And with Intelrsquos Anti-Theft Technology if your Ultrabook is ever lost or stolen you can instantly disable the machine from anywhere ensuring that your data is safe and secure

Learn more today at wwwintelcomUltrabook

I Need Your Help On Thishellip

Dear Friend

I have a small favor to ask that in the end will benefit you But first let me

explain whats led up to this

Over the last year weve seen a dramatic increase in the number of clients

who are inquiring about how to access their desktop files email etc on a

mobile device - be it an iPad smartphone laptop tablet etc

Weve also seen an increase in the number of clients who allow employees to

bring their own devices to work andor access the company network from

home using their personal computer or phone If yoursquove been following along

in the last 2 issues of this newsletter yoursquove probably noticed

Naturally this raises a NUMBER of questions and concerns over security

Whats the best way to allow remote access to company data

What are the best policies for privacy and cloud computing

How can we ensure our compliance with data breech laws and

regulatory controls

Thats why weve decided to hold a series of educational webinarsseminar on

this topic in the coming months to answer important questions and to guide

clients to use safe best practices when introducing mobile devices onto their

network

However Im struggling to narrow down the topic and the questions we

should address during these sessions since mobile and cloud computing are

such big topics

So instead of just guessing I was hoping you could do me a favor by

answering the following 2 questions

What is the single most important question you would like us to address

on the topic of mobile and cloud computing

Second

Whats the single biggest CONCERN you have about cloud computing

and employees remotely accessing your network with mobile devices

If you would just take a moment to send me an email at

femidadasmarthostdesigncom and give me some direction in this I would

be grateful

Many thanks

Client Spotlight Fujitec America When Fujitec America in Lanham MD was relocating their office they needed a

Technology Company to help them plan co-ordinate access and install the new of-

fice technologies Fortunately Gorge Jonson was referred to Smarthost Design Tech-

nologies ldquoSmarthost Design Technologies took the ball and run with it giving me

peace of mindrdquo Gorge JohnsonmdashGM Fujitec America Would you like your

company highlighted here in our ldquoClient Spotlightrdquo Then give us a call today at 301-

576-1122

httpsmarthostdesigncomFujitec

Get More Information About Our Services At wwwsmarthostdesigncom

Page 4

Get More Information About Our Services At wwwsmarthostdesigncom

What Is Cloud Computing And Why Should

You Care

Therersquos a good chance that MOST of the software applications you use

every day are now SaaS applications or ldquosoftware as a servicerdquo In other

words you donrsquot have to install them on your server or PC ndash you simply access

it as a pay-as-you-go model for only the licenses space and features you use

This gives you the ability to access highly sophisticated software and

functionality at a fraction of the cost ndash or even for free ndash and without long-term

commitments

For example Google is a massive free cloud application ndash the power

required to search billions of web sites and content in seconds and deliver the

relevant results to your screen far exceeds the capacity of your PC Facebook is

another free cloud application that allows you to post pictures play games and

connect with your friends in real time without having to install those

applications on your computer Of course there are also the applications such

as Salesforce Constant Contact SurveyMonkey etc that you pay to use

With the recent introduction of cloud-based office applications like

Office 365 Google Apps and thousands of other SaaS applications itrsquos

becoming unnecessary for some businesses to purchase and maintain an onsite

server Now companies can host one or more of their applications data e-mail

and other functions ldquoin the cloudrdquo That simply means itrsquos stored offsite in a

highly secure high-availability ldquoutilityrdquo company that has far more power and

resources than you could ever logically have onsite as a small business And

with devices getting cheaper and Internet connectivity exploding cloud

computing is suddenly a very smart viable option for small business owners

What Are The Benefits Of Cloud Computing

1 Eliminates the need for expensive server upgrades and allows you to use

cheaper devices (PCs etc) to get the

same work done

2 Frees you to access applications

from any device and any location

All you need is an Internet

connection

3 Built-in disaster recovery and

business continuity

4 Only pay for what you need and use

(utility pricing)

Is Cloud Computing Right For You

While there are a ton of benefits

to cloud computing itrsquos NOT right for

every company Some applications

donrsquot play well in the cloud You need

commercial-grade Internet

connectivity and some functions like working with big graphics files are

better kept local or the slowness will make you crazy However in almost

every case parts of your computer network (functions) can easily be put in the

cloud to save you money and give you better service So before you donate

your server and sign up for Google Apps or Office 365 itrsquos important you talk

to someone who can honestly assess your unique situation and tell you the

pros and cons of making the switch to cloud computing

Is Your Phones System Costing Too Much

Your are in LUCK

NOW Get Security as a

Services

If you are interested in other services

and would like us to look it up send me

an email

at femidadasmarthostdesigncom

FREE Desk

Phone Promo

Free Cisco SPA

303G For each User

Requires 12ndash Months Agreement

Have you got A virus

hacked or worried your staff

are spending time on un-

related business websites -Managed Network Security could be

the solution plus meet key Gov

Health Marchant SOX HIPPA and

other gov compliances

- SmarthManged Network Security

gives you the peace of mind with

Includes Secure Firewall

Unlimited Monotoring

Unlimited support

Free Setup and Insatll

For a simple Monthly Flat Fee

Call 301-576-1122 ext 101

Page 5

Get More Information About Our Services At wwwsmarthostdesigncom

How To Avoid The Top 3 Budget Busting Stress

-Inducing Mistakes When Moving Your Office Moving is always a pain in the rump but it doesnrsquot have to be a horrific expensive experience The number one lament from someone whorsquos experienced a ldquobadrdquo move is ldquoI didnrsquot know I

needed tohelliprdquo followed closely by ldquoI completely forgot thathelliprdquo In other words itrsquos what you donrsquot do that makes the move a disaster To make your move easy and effortless here are the 5

most common mistakes you want to avoid

Mistake 1 mdash Trying To Save Money By Using Your Employees To Move Your Computer Network

Donrsquot ask your staff to disconnect move and reconnect computers phones and other devices just to save a few bucks Yoursquoll frustrate them and end up with phones ringing at the wrong extension lost cables and workstations that get dropped rendering them useless You donrsquot want to let the movers do this job either they may be great at moving furniture but a network is a lot more sophisticated and sensitive Be smart and hire an IT

pro to pack and move your network

Mistake 2 mdash Not Hiring The RIGHT IT Firm To Move Your Network

While wersquore on the topic make sure you know what to look for when outsourcing the move A few things to look for would include references from other clients proof of insurance (get them to fax you a copy) a service level guarantee limiting the amount of time you are down and a professional organized approach to quoting the move A real pro will insist on visiting your current location as well as your new location to conduct a detailed site survey NEVER hire anyone who wants to quote moving your network over the phone Additionally look for an IT company that will apply the charges for conducting your site survey against the total cost of the move if you choose them

Mistake 3 mdash Not Giving Your Phone Internet And Cable Vendors Enough Advance Warning

Eighty percent (80) of unexpected communications blackouts and cost overruns on network moves are caused by failure to properly plan voice data and electrical installation in advance Just because the prior tenant had computers and telephones is no guarantee that the cabling is suitable for your phones and your computer network Advance planning will help you avoid emergency rush fees or band aid fixes to make things work

Internet and telephone connections require as much as six weeks advance notice to be installed tested and ready the day you move in And if you are building a new office donrsquot leave it up to the builder to decide how many power outlets network and phone connections you will need With printers scanners faxes and other technologies

connecting directly to the network these days the rule of thumb of one electrical outlet one phone and one network connection per employee is woefully outdated Consult your IT provider in the early planning stages to ensure you have what you need before

the drywall goes up

Need an Office Move

Check List

As an IT Provider we have helped many of our clients move their office and in that process we have

developed a check list that will ensures that no stone is left un turned when it comes to moving your office If this type of checklist would make you office move easier or anyone that you know then go to

httpSmarthostdesigncomoffice

And download it Or give us a call at 301-576-1122

Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series

What the Heck is Google

Adwords and how can it help

your business Find out Date May 15th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

Website SEO SMO

Facebook LinkedIn Twitter

How can this help your

Business Find out Date June 12th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

BYOD Policies Security of

your Critical Intellectual

Property (IP) How can you

minimize your business risk

Find out Date July 17th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash

If you are interested in topic

and would like us to do a

webinar on that subject

send me an email

at femidadasmarthostdesigncom

Page 6

Here From Femi Corner

Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate

themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and

managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada

Get More Information About Our Services At wwwsmarthostdesigncom

The Lighter Side

PHILOSOPHY OF SPRING CLEANING

I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press

Page 7

DropBox ndash Is It Secure For Your Business

A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip

Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely

When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to

easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant

What To Use Instead If you need to transfer files outside of your network and need to do so

securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your

data

Who Else Wants To Win A $10 Gift Card

The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana

Buell of Shillina Gupta $ Associates PA in Columbia MD She was the

first person to correctly answer my quiz question from last month April

is named after the Greek goddess Aphrodite She is the goddess of

The correct answer was c) Love Now herersquos this monthrsquos trivia

question The winner will receive a gift card to Chic-Fil-A

RESTAURAN

Which May celebration was first observed in 1908

a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day

Email me right now you answer at

femidadasmarthostdesigncom or

Call 301-576-1122 ext 101

Get More Information About Our Services At wwwsmarthostdesigncom

What you must Do to Continue delivering Extraordinary Result

in your Business

Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business

That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource

Page 8

Top 4 Threats Attacking Your Network And What To Do About Them

1 Overconfidence User overconfidence in security products is the top threat to your

network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn

storms (unstoppable rapid fire pornographic pop-ups) and more subtle key

loggers that steal passwords Surveys promising free stuff result in theft of

information like your motherrsquos maiden name high school etc used to answer

common security questions leading to theft of otherwise secure data Think

before you click

2 Social Networking Sites Social networking sites like Facebook are exploding in popularity

Threats range from malware (eg viruses worms spyware) to scammers trying

to steal your identity information and money Many businesses and government

agencies are using these sites to communicate with clients and constituents so

simply blocking access is no longer reasonable Defending your company while

allowing employee access requires social network education for your employees

and the enforcement of strong acceptable use policies We can help you develop

a policy then monitor compliance using a Unified Threat Management device

that controls and reports on network access

3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once

limited to laptop computers mobile network devices now include PDAs

handheld computers and smart phones with new appliances appearing in the

stores every month Mobile devices often contain sensitive data yet they are

easily lost or stolen Be sure to password protect and encrypt data on all mobile

devices whenever possible Include mobile devices in your acceptable use

policy

4 Cloud Computing

ldquoThe Cloudrdquo in its most simple form involves using the Internet to

access and store your data When you access email using a web browser you are

working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly

gaining popularity and is just the beginning Companies like Microsoft IBM

and Google envision the day when we will use inexpensive terminals instead of

computers to run programs and access data located somewhere on the Internet

You need to be sure that any data you store and access across the Internet is

secure not just where it is stored but during the trip to and from the Internet

Monthly Spiritual Devotion

12 I know how to live on almost nothing or with everything I have learned the

secret of living in every situation whether it is with a full stomach or empty

with plenty or little 13 For I can do everything through Christ who gives me

strength Philippians 412-13 (NLT)

Get More Information About Our Services At wwwsmarthostdesigncom

Page 3: Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our Services At: ... phishing and other online fraud. Your best bet is to keep everyone informed

Page 3

Shiny New Gadget Of The Month

Intel Ultrabook

Convertible

The Intel-based Ultrabook Convertible is one of the most cutting-edge on-the-go laptops to date Quite simply itrsquos a laptop when you need it and a tablet when you want it

Ultrabook with touch display using Windows 8 delivers stunning graphics and the ultimate in precision and control And unlike an iPad or Android tablet this convertible turns into a powerful laptop in an instant

Additionally models with Intel Smart Connect Technology continually update your email and social networks even when your Ultrabook is shut down Yoursquoll wake from sleep mode in less than 7 seconds and already be completely updated so that you can resume what you were doing in the blink of an eye

And with Intelrsquos Anti-Theft Technology if your Ultrabook is ever lost or stolen you can instantly disable the machine from anywhere ensuring that your data is safe and secure

Learn more today at wwwintelcomUltrabook

I Need Your Help On Thishellip

Dear Friend

I have a small favor to ask that in the end will benefit you But first let me

explain whats led up to this

Over the last year weve seen a dramatic increase in the number of clients

who are inquiring about how to access their desktop files email etc on a

mobile device - be it an iPad smartphone laptop tablet etc

Weve also seen an increase in the number of clients who allow employees to

bring their own devices to work andor access the company network from

home using their personal computer or phone If yoursquove been following along

in the last 2 issues of this newsletter yoursquove probably noticed

Naturally this raises a NUMBER of questions and concerns over security

Whats the best way to allow remote access to company data

What are the best policies for privacy and cloud computing

How can we ensure our compliance with data breech laws and

regulatory controls

Thats why weve decided to hold a series of educational webinarsseminar on

this topic in the coming months to answer important questions and to guide

clients to use safe best practices when introducing mobile devices onto their

network

However Im struggling to narrow down the topic and the questions we

should address during these sessions since mobile and cloud computing are

such big topics

So instead of just guessing I was hoping you could do me a favor by

answering the following 2 questions

What is the single most important question you would like us to address

on the topic of mobile and cloud computing

Second

Whats the single biggest CONCERN you have about cloud computing

and employees remotely accessing your network with mobile devices

If you would just take a moment to send me an email at

femidadasmarthostdesigncom and give me some direction in this I would

be grateful

Many thanks

Client Spotlight Fujitec America When Fujitec America in Lanham MD was relocating their office they needed a

Technology Company to help them plan co-ordinate access and install the new of-

fice technologies Fortunately Gorge Jonson was referred to Smarthost Design Tech-

nologies ldquoSmarthost Design Technologies took the ball and run with it giving me

peace of mindrdquo Gorge JohnsonmdashGM Fujitec America Would you like your

company highlighted here in our ldquoClient Spotlightrdquo Then give us a call today at 301-

576-1122

httpsmarthostdesigncomFujitec

Get More Information About Our Services At wwwsmarthostdesigncom

Page 4

Get More Information About Our Services At wwwsmarthostdesigncom

What Is Cloud Computing And Why Should

You Care

Therersquos a good chance that MOST of the software applications you use

every day are now SaaS applications or ldquosoftware as a servicerdquo In other

words you donrsquot have to install them on your server or PC ndash you simply access

it as a pay-as-you-go model for only the licenses space and features you use

This gives you the ability to access highly sophisticated software and

functionality at a fraction of the cost ndash or even for free ndash and without long-term

commitments

For example Google is a massive free cloud application ndash the power

required to search billions of web sites and content in seconds and deliver the

relevant results to your screen far exceeds the capacity of your PC Facebook is

another free cloud application that allows you to post pictures play games and

connect with your friends in real time without having to install those

applications on your computer Of course there are also the applications such

as Salesforce Constant Contact SurveyMonkey etc that you pay to use

With the recent introduction of cloud-based office applications like

Office 365 Google Apps and thousands of other SaaS applications itrsquos

becoming unnecessary for some businesses to purchase and maintain an onsite

server Now companies can host one or more of their applications data e-mail

and other functions ldquoin the cloudrdquo That simply means itrsquos stored offsite in a

highly secure high-availability ldquoutilityrdquo company that has far more power and

resources than you could ever logically have onsite as a small business And

with devices getting cheaper and Internet connectivity exploding cloud

computing is suddenly a very smart viable option for small business owners

What Are The Benefits Of Cloud Computing

1 Eliminates the need for expensive server upgrades and allows you to use

cheaper devices (PCs etc) to get the

same work done

2 Frees you to access applications

from any device and any location

All you need is an Internet

connection

3 Built-in disaster recovery and

business continuity

4 Only pay for what you need and use

(utility pricing)

Is Cloud Computing Right For You

While there are a ton of benefits

to cloud computing itrsquos NOT right for

every company Some applications

donrsquot play well in the cloud You need

commercial-grade Internet

connectivity and some functions like working with big graphics files are

better kept local or the slowness will make you crazy However in almost

every case parts of your computer network (functions) can easily be put in the

cloud to save you money and give you better service So before you donate

your server and sign up for Google Apps or Office 365 itrsquos important you talk

to someone who can honestly assess your unique situation and tell you the

pros and cons of making the switch to cloud computing

Is Your Phones System Costing Too Much

Your are in LUCK

NOW Get Security as a

Services

If you are interested in other services

and would like us to look it up send me

an email

at femidadasmarthostdesigncom

FREE Desk

Phone Promo

Free Cisco SPA

303G For each User

Requires 12ndash Months Agreement

Have you got A virus

hacked or worried your staff

are spending time on un-

related business websites -Managed Network Security could be

the solution plus meet key Gov

Health Marchant SOX HIPPA and

other gov compliances

- SmarthManged Network Security

gives you the peace of mind with

Includes Secure Firewall

Unlimited Monotoring

Unlimited support

Free Setup and Insatll

For a simple Monthly Flat Fee

Call 301-576-1122 ext 101

Page 5

Get More Information About Our Services At wwwsmarthostdesigncom

How To Avoid The Top 3 Budget Busting Stress

-Inducing Mistakes When Moving Your Office Moving is always a pain in the rump but it doesnrsquot have to be a horrific expensive experience The number one lament from someone whorsquos experienced a ldquobadrdquo move is ldquoI didnrsquot know I

needed tohelliprdquo followed closely by ldquoI completely forgot thathelliprdquo In other words itrsquos what you donrsquot do that makes the move a disaster To make your move easy and effortless here are the 5

most common mistakes you want to avoid

Mistake 1 mdash Trying To Save Money By Using Your Employees To Move Your Computer Network

Donrsquot ask your staff to disconnect move and reconnect computers phones and other devices just to save a few bucks Yoursquoll frustrate them and end up with phones ringing at the wrong extension lost cables and workstations that get dropped rendering them useless You donrsquot want to let the movers do this job either they may be great at moving furniture but a network is a lot more sophisticated and sensitive Be smart and hire an IT

pro to pack and move your network

Mistake 2 mdash Not Hiring The RIGHT IT Firm To Move Your Network

While wersquore on the topic make sure you know what to look for when outsourcing the move A few things to look for would include references from other clients proof of insurance (get them to fax you a copy) a service level guarantee limiting the amount of time you are down and a professional organized approach to quoting the move A real pro will insist on visiting your current location as well as your new location to conduct a detailed site survey NEVER hire anyone who wants to quote moving your network over the phone Additionally look for an IT company that will apply the charges for conducting your site survey against the total cost of the move if you choose them

Mistake 3 mdash Not Giving Your Phone Internet And Cable Vendors Enough Advance Warning

Eighty percent (80) of unexpected communications blackouts and cost overruns on network moves are caused by failure to properly plan voice data and electrical installation in advance Just because the prior tenant had computers and telephones is no guarantee that the cabling is suitable for your phones and your computer network Advance planning will help you avoid emergency rush fees or band aid fixes to make things work

Internet and telephone connections require as much as six weeks advance notice to be installed tested and ready the day you move in And if you are building a new office donrsquot leave it up to the builder to decide how many power outlets network and phone connections you will need With printers scanners faxes and other technologies

connecting directly to the network these days the rule of thumb of one electrical outlet one phone and one network connection per employee is woefully outdated Consult your IT provider in the early planning stages to ensure you have what you need before

the drywall goes up

Need an Office Move

Check List

As an IT Provider we have helped many of our clients move their office and in that process we have

developed a check list that will ensures that no stone is left un turned when it comes to moving your office If this type of checklist would make you office move easier or anyone that you know then go to

httpSmarthostdesigncomoffice

And download it Or give us a call at 301-576-1122

Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series

What the Heck is Google

Adwords and how can it help

your business Find out Date May 15th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

Website SEO SMO

Facebook LinkedIn Twitter

How can this help your

Business Find out Date June 12th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

BYOD Policies Security of

your Critical Intellectual

Property (IP) How can you

minimize your business risk

Find out Date July 17th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash

If you are interested in topic

and would like us to do a

webinar on that subject

send me an email

at femidadasmarthostdesigncom

Page 6

Here From Femi Corner

Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate

themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and

managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada

Get More Information About Our Services At wwwsmarthostdesigncom

The Lighter Side

PHILOSOPHY OF SPRING CLEANING

I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press

Page 7

DropBox ndash Is It Secure For Your Business

A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip

Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely

When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to

easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant

What To Use Instead If you need to transfer files outside of your network and need to do so

securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your

data

Who Else Wants To Win A $10 Gift Card

The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana

Buell of Shillina Gupta $ Associates PA in Columbia MD She was the

first person to correctly answer my quiz question from last month April

is named after the Greek goddess Aphrodite She is the goddess of

The correct answer was c) Love Now herersquos this monthrsquos trivia

question The winner will receive a gift card to Chic-Fil-A

RESTAURAN

Which May celebration was first observed in 1908

a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day

Email me right now you answer at

femidadasmarthostdesigncom or

Call 301-576-1122 ext 101

Get More Information About Our Services At wwwsmarthostdesigncom

What you must Do to Continue delivering Extraordinary Result

in your Business

Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business

That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource

Page 8

Top 4 Threats Attacking Your Network And What To Do About Them

1 Overconfidence User overconfidence in security products is the top threat to your

network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn

storms (unstoppable rapid fire pornographic pop-ups) and more subtle key

loggers that steal passwords Surveys promising free stuff result in theft of

information like your motherrsquos maiden name high school etc used to answer

common security questions leading to theft of otherwise secure data Think

before you click

2 Social Networking Sites Social networking sites like Facebook are exploding in popularity

Threats range from malware (eg viruses worms spyware) to scammers trying

to steal your identity information and money Many businesses and government

agencies are using these sites to communicate with clients and constituents so

simply blocking access is no longer reasonable Defending your company while

allowing employee access requires social network education for your employees

and the enforcement of strong acceptable use policies We can help you develop

a policy then monitor compliance using a Unified Threat Management device

that controls and reports on network access

3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once

limited to laptop computers mobile network devices now include PDAs

handheld computers and smart phones with new appliances appearing in the

stores every month Mobile devices often contain sensitive data yet they are

easily lost or stolen Be sure to password protect and encrypt data on all mobile

devices whenever possible Include mobile devices in your acceptable use

policy

4 Cloud Computing

ldquoThe Cloudrdquo in its most simple form involves using the Internet to

access and store your data When you access email using a web browser you are

working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly

gaining popularity and is just the beginning Companies like Microsoft IBM

and Google envision the day when we will use inexpensive terminals instead of

computers to run programs and access data located somewhere on the Internet

You need to be sure that any data you store and access across the Internet is

secure not just where it is stored but during the trip to and from the Internet

Monthly Spiritual Devotion

12 I know how to live on almost nothing or with everything I have learned the

secret of living in every situation whether it is with a full stomach or empty

with plenty or little 13 For I can do everything through Christ who gives me

strength Philippians 412-13 (NLT)

Get More Information About Our Services At wwwsmarthostdesigncom

Page 4: Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our Services At: ... phishing and other online fraud. Your best bet is to keep everyone informed

Page 4

Get More Information About Our Services At wwwsmarthostdesigncom

What Is Cloud Computing And Why Should

You Care

Therersquos a good chance that MOST of the software applications you use

every day are now SaaS applications or ldquosoftware as a servicerdquo In other

words you donrsquot have to install them on your server or PC ndash you simply access

it as a pay-as-you-go model for only the licenses space and features you use

This gives you the ability to access highly sophisticated software and

functionality at a fraction of the cost ndash or even for free ndash and without long-term

commitments

For example Google is a massive free cloud application ndash the power

required to search billions of web sites and content in seconds and deliver the

relevant results to your screen far exceeds the capacity of your PC Facebook is

another free cloud application that allows you to post pictures play games and

connect with your friends in real time without having to install those

applications on your computer Of course there are also the applications such

as Salesforce Constant Contact SurveyMonkey etc that you pay to use

With the recent introduction of cloud-based office applications like

Office 365 Google Apps and thousands of other SaaS applications itrsquos

becoming unnecessary for some businesses to purchase and maintain an onsite

server Now companies can host one or more of their applications data e-mail

and other functions ldquoin the cloudrdquo That simply means itrsquos stored offsite in a

highly secure high-availability ldquoutilityrdquo company that has far more power and

resources than you could ever logically have onsite as a small business And

with devices getting cheaper and Internet connectivity exploding cloud

computing is suddenly a very smart viable option for small business owners

What Are The Benefits Of Cloud Computing

1 Eliminates the need for expensive server upgrades and allows you to use

cheaper devices (PCs etc) to get the

same work done

2 Frees you to access applications

from any device and any location

All you need is an Internet

connection

3 Built-in disaster recovery and

business continuity

4 Only pay for what you need and use

(utility pricing)

Is Cloud Computing Right For You

While there are a ton of benefits

to cloud computing itrsquos NOT right for

every company Some applications

donrsquot play well in the cloud You need

commercial-grade Internet

connectivity and some functions like working with big graphics files are

better kept local or the slowness will make you crazy However in almost

every case parts of your computer network (functions) can easily be put in the

cloud to save you money and give you better service So before you donate

your server and sign up for Google Apps or Office 365 itrsquos important you talk

to someone who can honestly assess your unique situation and tell you the

pros and cons of making the switch to cloud computing

Is Your Phones System Costing Too Much

Your are in LUCK

NOW Get Security as a

Services

If you are interested in other services

and would like us to look it up send me

an email

at femidadasmarthostdesigncom

FREE Desk

Phone Promo

Free Cisco SPA

303G For each User

Requires 12ndash Months Agreement

Have you got A virus

hacked or worried your staff

are spending time on un-

related business websites -Managed Network Security could be

the solution plus meet key Gov

Health Marchant SOX HIPPA and

other gov compliances

- SmarthManged Network Security

gives you the peace of mind with

Includes Secure Firewall

Unlimited Monotoring

Unlimited support

Free Setup and Insatll

For a simple Monthly Flat Fee

Call 301-576-1122 ext 101

Page 5

Get More Information About Our Services At wwwsmarthostdesigncom

How To Avoid The Top 3 Budget Busting Stress

-Inducing Mistakes When Moving Your Office Moving is always a pain in the rump but it doesnrsquot have to be a horrific expensive experience The number one lament from someone whorsquos experienced a ldquobadrdquo move is ldquoI didnrsquot know I

needed tohelliprdquo followed closely by ldquoI completely forgot thathelliprdquo In other words itrsquos what you donrsquot do that makes the move a disaster To make your move easy and effortless here are the 5

most common mistakes you want to avoid

Mistake 1 mdash Trying To Save Money By Using Your Employees To Move Your Computer Network

Donrsquot ask your staff to disconnect move and reconnect computers phones and other devices just to save a few bucks Yoursquoll frustrate them and end up with phones ringing at the wrong extension lost cables and workstations that get dropped rendering them useless You donrsquot want to let the movers do this job either they may be great at moving furniture but a network is a lot more sophisticated and sensitive Be smart and hire an IT

pro to pack and move your network

Mistake 2 mdash Not Hiring The RIGHT IT Firm To Move Your Network

While wersquore on the topic make sure you know what to look for when outsourcing the move A few things to look for would include references from other clients proof of insurance (get them to fax you a copy) a service level guarantee limiting the amount of time you are down and a professional organized approach to quoting the move A real pro will insist on visiting your current location as well as your new location to conduct a detailed site survey NEVER hire anyone who wants to quote moving your network over the phone Additionally look for an IT company that will apply the charges for conducting your site survey against the total cost of the move if you choose them

Mistake 3 mdash Not Giving Your Phone Internet And Cable Vendors Enough Advance Warning

Eighty percent (80) of unexpected communications blackouts and cost overruns on network moves are caused by failure to properly plan voice data and electrical installation in advance Just because the prior tenant had computers and telephones is no guarantee that the cabling is suitable for your phones and your computer network Advance planning will help you avoid emergency rush fees or band aid fixes to make things work

Internet and telephone connections require as much as six weeks advance notice to be installed tested and ready the day you move in And if you are building a new office donrsquot leave it up to the builder to decide how many power outlets network and phone connections you will need With printers scanners faxes and other technologies

connecting directly to the network these days the rule of thumb of one electrical outlet one phone and one network connection per employee is woefully outdated Consult your IT provider in the early planning stages to ensure you have what you need before

the drywall goes up

Need an Office Move

Check List

As an IT Provider we have helped many of our clients move their office and in that process we have

developed a check list that will ensures that no stone is left un turned when it comes to moving your office If this type of checklist would make you office move easier or anyone that you know then go to

httpSmarthostdesigncomoffice

And download it Or give us a call at 301-576-1122

Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series

What the Heck is Google

Adwords and how can it help

your business Find out Date May 15th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

Website SEO SMO

Facebook LinkedIn Twitter

How can this help your

Business Find out Date June 12th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

BYOD Policies Security of

your Critical Intellectual

Property (IP) How can you

minimize your business risk

Find out Date July 17th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash

If you are interested in topic

and would like us to do a

webinar on that subject

send me an email

at femidadasmarthostdesigncom

Page 6

Here From Femi Corner

Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate

themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and

managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada

Get More Information About Our Services At wwwsmarthostdesigncom

The Lighter Side

PHILOSOPHY OF SPRING CLEANING

I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press

Page 7

DropBox ndash Is It Secure For Your Business

A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip

Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely

When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to

easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant

What To Use Instead If you need to transfer files outside of your network and need to do so

securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your

data

Who Else Wants To Win A $10 Gift Card

The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana

Buell of Shillina Gupta $ Associates PA in Columbia MD She was the

first person to correctly answer my quiz question from last month April

is named after the Greek goddess Aphrodite She is the goddess of

The correct answer was c) Love Now herersquos this monthrsquos trivia

question The winner will receive a gift card to Chic-Fil-A

RESTAURAN

Which May celebration was first observed in 1908

a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day

Email me right now you answer at

femidadasmarthostdesigncom or

Call 301-576-1122 ext 101

Get More Information About Our Services At wwwsmarthostdesigncom

What you must Do to Continue delivering Extraordinary Result

in your Business

Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business

That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource

Page 8

Top 4 Threats Attacking Your Network And What To Do About Them

1 Overconfidence User overconfidence in security products is the top threat to your

network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn

storms (unstoppable rapid fire pornographic pop-ups) and more subtle key

loggers that steal passwords Surveys promising free stuff result in theft of

information like your motherrsquos maiden name high school etc used to answer

common security questions leading to theft of otherwise secure data Think

before you click

2 Social Networking Sites Social networking sites like Facebook are exploding in popularity

Threats range from malware (eg viruses worms spyware) to scammers trying

to steal your identity information and money Many businesses and government

agencies are using these sites to communicate with clients and constituents so

simply blocking access is no longer reasonable Defending your company while

allowing employee access requires social network education for your employees

and the enforcement of strong acceptable use policies We can help you develop

a policy then monitor compliance using a Unified Threat Management device

that controls and reports on network access

3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once

limited to laptop computers mobile network devices now include PDAs

handheld computers and smart phones with new appliances appearing in the

stores every month Mobile devices often contain sensitive data yet they are

easily lost or stolen Be sure to password protect and encrypt data on all mobile

devices whenever possible Include mobile devices in your acceptable use

policy

4 Cloud Computing

ldquoThe Cloudrdquo in its most simple form involves using the Internet to

access and store your data When you access email using a web browser you are

working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly

gaining popularity and is just the beginning Companies like Microsoft IBM

and Google envision the day when we will use inexpensive terminals instead of

computers to run programs and access data located somewhere on the Internet

You need to be sure that any data you store and access across the Internet is

secure not just where it is stored but during the trip to and from the Internet

Monthly Spiritual Devotion

12 I know how to live on almost nothing or with everything I have learned the

secret of living in every situation whether it is with a full stomach or empty

with plenty or little 13 For I can do everything through Christ who gives me

strength Philippians 412-13 (NLT)

Get More Information About Our Services At wwwsmarthostdesigncom

Page 5: Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our Services At: ... phishing and other online fraud. Your best bet is to keep everyone informed

Page 5

Get More Information About Our Services At wwwsmarthostdesigncom

How To Avoid The Top 3 Budget Busting Stress

-Inducing Mistakes When Moving Your Office Moving is always a pain in the rump but it doesnrsquot have to be a horrific expensive experience The number one lament from someone whorsquos experienced a ldquobadrdquo move is ldquoI didnrsquot know I

needed tohelliprdquo followed closely by ldquoI completely forgot thathelliprdquo In other words itrsquos what you donrsquot do that makes the move a disaster To make your move easy and effortless here are the 5

most common mistakes you want to avoid

Mistake 1 mdash Trying To Save Money By Using Your Employees To Move Your Computer Network

Donrsquot ask your staff to disconnect move and reconnect computers phones and other devices just to save a few bucks Yoursquoll frustrate them and end up with phones ringing at the wrong extension lost cables and workstations that get dropped rendering them useless You donrsquot want to let the movers do this job either they may be great at moving furniture but a network is a lot more sophisticated and sensitive Be smart and hire an IT

pro to pack and move your network

Mistake 2 mdash Not Hiring The RIGHT IT Firm To Move Your Network

While wersquore on the topic make sure you know what to look for when outsourcing the move A few things to look for would include references from other clients proof of insurance (get them to fax you a copy) a service level guarantee limiting the amount of time you are down and a professional organized approach to quoting the move A real pro will insist on visiting your current location as well as your new location to conduct a detailed site survey NEVER hire anyone who wants to quote moving your network over the phone Additionally look for an IT company that will apply the charges for conducting your site survey against the total cost of the move if you choose them

Mistake 3 mdash Not Giving Your Phone Internet And Cable Vendors Enough Advance Warning

Eighty percent (80) of unexpected communications blackouts and cost overruns on network moves are caused by failure to properly plan voice data and electrical installation in advance Just because the prior tenant had computers and telephones is no guarantee that the cabling is suitable for your phones and your computer network Advance planning will help you avoid emergency rush fees or band aid fixes to make things work

Internet and telephone connections require as much as six weeks advance notice to be installed tested and ready the day you move in And if you are building a new office donrsquot leave it up to the builder to decide how many power outlets network and phone connections you will need With printers scanners faxes and other technologies

connecting directly to the network these days the rule of thumb of one electrical outlet one phone and one network connection per employee is woefully outdated Consult your IT provider in the early planning stages to ensure you have what you need before

the drywall goes up

Need an Office Move

Check List

As an IT Provider we have helped many of our clients move their office and in that process we have

developed a check list that will ensures that no stone is left un turned when it comes to moving your office If this type of checklist would make you office move easier or anyone that you know then go to

httpSmarthostdesigncomoffice

And download it Or give us a call at 301-576-1122

Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series

What the Heck is Google

Adwords and how can it help

your business Find out Date May 15th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

Website SEO SMO

Facebook LinkedIn Twitter

How can this help your

Business Find out Date June 12th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

BYOD Policies Security of

your Critical Intellectual

Property (IP) How can you

minimize your business risk

Find out Date July 17th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash

If you are interested in topic

and would like us to do a

webinar on that subject

send me an email

at femidadasmarthostdesigncom

Page 6

Here From Femi Corner

Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate

themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and

managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada

Get More Information About Our Services At wwwsmarthostdesigncom

The Lighter Side

PHILOSOPHY OF SPRING CLEANING

I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press

Page 7

DropBox ndash Is It Secure For Your Business

A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip

Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely

When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to

easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant

What To Use Instead If you need to transfer files outside of your network and need to do so

securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your

data

Who Else Wants To Win A $10 Gift Card

The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana

Buell of Shillina Gupta $ Associates PA in Columbia MD She was the

first person to correctly answer my quiz question from last month April

is named after the Greek goddess Aphrodite She is the goddess of

The correct answer was c) Love Now herersquos this monthrsquos trivia

question The winner will receive a gift card to Chic-Fil-A

RESTAURAN

Which May celebration was first observed in 1908

a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day

Email me right now you answer at

femidadasmarthostdesigncom or

Call 301-576-1122 ext 101

Get More Information About Our Services At wwwsmarthostdesigncom

What you must Do to Continue delivering Extraordinary Result

in your Business

Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business

That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource

Page 8

Top 4 Threats Attacking Your Network And What To Do About Them

1 Overconfidence User overconfidence in security products is the top threat to your

network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn

storms (unstoppable rapid fire pornographic pop-ups) and more subtle key

loggers that steal passwords Surveys promising free stuff result in theft of

information like your motherrsquos maiden name high school etc used to answer

common security questions leading to theft of otherwise secure data Think

before you click

2 Social Networking Sites Social networking sites like Facebook are exploding in popularity

Threats range from malware (eg viruses worms spyware) to scammers trying

to steal your identity information and money Many businesses and government

agencies are using these sites to communicate with clients and constituents so

simply blocking access is no longer reasonable Defending your company while

allowing employee access requires social network education for your employees

and the enforcement of strong acceptable use policies We can help you develop

a policy then monitor compliance using a Unified Threat Management device

that controls and reports on network access

3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once

limited to laptop computers mobile network devices now include PDAs

handheld computers and smart phones with new appliances appearing in the

stores every month Mobile devices often contain sensitive data yet they are

easily lost or stolen Be sure to password protect and encrypt data on all mobile

devices whenever possible Include mobile devices in your acceptable use

policy

4 Cloud Computing

ldquoThe Cloudrdquo in its most simple form involves using the Internet to

access and store your data When you access email using a web browser you are

working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly

gaining popularity and is just the beginning Companies like Microsoft IBM

and Google envision the day when we will use inexpensive terminals instead of

computers to run programs and access data located somewhere on the Internet

You need to be sure that any data you store and access across the Internet is

secure not just where it is stored but during the trip to and from the Internet

Monthly Spiritual Devotion

12 I know how to live on almost nothing or with everything I have learned the

secret of living in every situation whether it is with a full stomach or empty

with plenty or little 13 For I can do everything through Christ who gives me

strength Philippians 412-13 (NLT)

Get More Information About Our Services At wwwsmarthostdesigncom

Page 6: Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our Services At: ... phishing and other online fraud. Your best bet is to keep everyone informed

Donrsquot Miss the Our ldquoFIND OUTrdquo FREE Business Building Webinars Series

What the Heck is Google

Adwords and how can it help

your business Find out Date May 15th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

Website SEO SMO

Facebook LinkedIn Twitter

How can this help your

Business Find out Date June 12th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashndash

BYOD Policies Security of

your Critical Intellectual

Property (IP) How can you

minimize your business risk

Find out Date July 17th 2013

Time 1200 PMmdash100 PM

Register at httpsmarthostdesigncomevent

mdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdashmdash

If you are interested in topic

and would like us to do a

webinar on that subject

send me an email

at femidadasmarthostdesigncom

Page 6

Here From Femi Corner

Coach Ditka said to us ldquo you cant motivate someone they have to be able to motivate

themselvesrdquo Few weeks ago I was at an annual conference to sharpen my skills at the Technology Marketing boot camp In this conference business leaders from across the nation and aboard in our industry come to find out what is the latest trend and how we can use that the help our clients achieve greater result from their technology VCIO account managers Anyhow I wanted to share what the legendary Coach Ditka said to me we asked this question Coach How do you keep you teaman individual motivated His answer was blunt and direct I personally could felt how razor sharp it was He answered ldquo I dont you canrsquot motivate someone They have to come motivated and ready to workrdquo So what does this mean Do we as business leaders have to just hire people and hope that they are the motivated type After thinking about this and looking for itrsquos application in my growing business as we seek to hire good engineers sales and marketing people I began to wonder how do I get and keep them motivated daily and based on the Coachrsquos answer I shouldnt I believe what the Coach is saying here is that as business leaders and

managers we have to be able to discern people who are naturally motivated people who come ready to work to achieve their lives goal (reaching their God given potentials) people who set goals and work towards achieving that goal whether s small or big So he is not saying we donrsquot have to encourage our staff or build them up or that a motivational speech is unnecessary all that he is saying is the same old adage of getting the right people on your team bus train company etc I have more from the other Speakers stay tuned in and make today a great day and hire the right people the ones who come already motivated -Femi Dada

Get More Information About Our Services At wwwsmarthostdesigncom

The Lighter Side

PHILOSOPHY OF SPRING CLEANING

I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press

Page 7

DropBox ndash Is It Secure For Your Business

A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip

Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely

When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to

easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant

What To Use Instead If you need to transfer files outside of your network and need to do so

securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your

data

Who Else Wants To Win A $10 Gift Card

The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana

Buell of Shillina Gupta $ Associates PA in Columbia MD She was the

first person to correctly answer my quiz question from last month April

is named after the Greek goddess Aphrodite She is the goddess of

The correct answer was c) Love Now herersquos this monthrsquos trivia

question The winner will receive a gift card to Chic-Fil-A

RESTAURAN

Which May celebration was first observed in 1908

a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day

Email me right now you answer at

femidadasmarthostdesigncom or

Call 301-576-1122 ext 101

Get More Information About Our Services At wwwsmarthostdesigncom

What you must Do to Continue delivering Extraordinary Result

in your Business

Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business

That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource

Page 8

Top 4 Threats Attacking Your Network And What To Do About Them

1 Overconfidence User overconfidence in security products is the top threat to your

network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn

storms (unstoppable rapid fire pornographic pop-ups) and more subtle key

loggers that steal passwords Surveys promising free stuff result in theft of

information like your motherrsquos maiden name high school etc used to answer

common security questions leading to theft of otherwise secure data Think

before you click

2 Social Networking Sites Social networking sites like Facebook are exploding in popularity

Threats range from malware (eg viruses worms spyware) to scammers trying

to steal your identity information and money Many businesses and government

agencies are using these sites to communicate with clients and constituents so

simply blocking access is no longer reasonable Defending your company while

allowing employee access requires social network education for your employees

and the enforcement of strong acceptable use policies We can help you develop

a policy then monitor compliance using a Unified Threat Management device

that controls and reports on network access

3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once

limited to laptop computers mobile network devices now include PDAs

handheld computers and smart phones with new appliances appearing in the

stores every month Mobile devices often contain sensitive data yet they are

easily lost or stolen Be sure to password protect and encrypt data on all mobile

devices whenever possible Include mobile devices in your acceptable use

policy

4 Cloud Computing

ldquoThe Cloudrdquo in its most simple form involves using the Internet to

access and store your data When you access email using a web browser you are

working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly

gaining popularity and is just the beginning Companies like Microsoft IBM

and Google envision the day when we will use inexpensive terminals instead of

computers to run programs and access data located somewhere on the Internet

You need to be sure that any data you store and access across the Internet is

secure not just where it is stored but during the trip to and from the Internet

Monthly Spiritual Devotion

12 I know how to live on almost nothing or with everything I have learned the

secret of living in every situation whether it is with a full stomach or empty

with plenty or little 13 For I can do everything through Christ who gives me

strength Philippians 412-13 (NLT)

Get More Information About Our Services At wwwsmarthostdesigncom

Page 7: Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our Services At: ... phishing and other online fraud. Your best bet is to keep everyone informed

The Lighter Side

PHILOSOPHY OF SPRING CLEANING

I dont do windows becauseI love birds and dont want one to run into a clean window and get hurt I dont wax floors becauseI am terrified a guest will slip and get hurt then Ill feel terrible (plus they may sue me) I dont mind the dust bunnies becauseThey are very good company I have named most of them and they agree with everything I say I dont disturb cobwebs because I want every creature to have a home of their own I dont Spring Clean becausehellipI love all the seasons and dont want the others to get jealous I dont pull weeds in the garden becausehellipI dont want to get in Gods way HE is an excellent designer I dont put things away becausehellipMy husband will never be able to find them again I dont iron becauseI choose to believe them when they say Permanent Press

Page 7

DropBox ndash Is It Secure For Your Business

A question that we often get around here is whether or not file-sharing services such as DropBox YouSendIt and Google Docs are secure enough for business If you use any of these services for your business herersquos the scoophellip

Treat DropBox As A Public Shared Environment DropBox (and the others mentioned above) is designed to easily share very large files ndash ones that are not optimal for e-mail because theyrsquore so huge Examples include videos audio files large PDFs and graphics files These services are typically free (or very cheap) and you shouldnrsquot have the expectation of great security for this price But an increasing use of these tools even for legitimate reasons such as collaboration is putting a lot of private information at risk According to a recent Ponemon study 60 of organizations have employees that frequently put confidential files on services like DropBox without permission In fact companies such as IBM have banned the use of these services completely

When Does Or Doesnrsquot It Make Sense When you have a file that doesnrsquot need to be secure and simply needs to

easily and quickly get from point A to point B then DropBox can be a viable solution On the other hand you would not send or store any sensitive files such as contracts or financial statements on DropBox These services are also not safe for any files subject to government compliance regulations such as PCI HIPAA SOX Sarbanes-Oxley or HITECH These file-sharing solutions are NOT compliant

What To Use Instead If you need to transfer files outside of your network and need to do so

securely some options to consider are Creating a secure FTP site Use 2-factor authentication rules Be sure to have audit logs involved to monitor the security of your

data

Who Else Wants To Win A $10 Gift Card

The Grand Prize Winner of last monthrsquos Trivia Challenge Quiz is Deana

Buell of Shillina Gupta $ Associates PA in Columbia MD She was the

first person to correctly answer my quiz question from last month April

is named after the Greek goddess Aphrodite She is the goddess of

The correct answer was c) Love Now herersquos this monthrsquos trivia

question The winner will receive a gift card to Chic-Fil-A

RESTAURAN

Which May celebration was first observed in 1908

a) Kentucky Derby b) Motherrsquos Day c) Cinco De Mayo d) Memorial Day

Email me right now you answer at

femidadasmarthostdesigncom or

Call 301-576-1122 ext 101

Get More Information About Our Services At wwwsmarthostdesigncom

What you must Do to Continue delivering Extraordinary Result

in your Business

Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business

That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource

Page 8

Top 4 Threats Attacking Your Network And What To Do About Them

1 Overconfidence User overconfidence in security products is the top threat to your

network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn

storms (unstoppable rapid fire pornographic pop-ups) and more subtle key

loggers that steal passwords Surveys promising free stuff result in theft of

information like your motherrsquos maiden name high school etc used to answer

common security questions leading to theft of otherwise secure data Think

before you click

2 Social Networking Sites Social networking sites like Facebook are exploding in popularity

Threats range from malware (eg viruses worms spyware) to scammers trying

to steal your identity information and money Many businesses and government

agencies are using these sites to communicate with clients and constituents so

simply blocking access is no longer reasonable Defending your company while

allowing employee access requires social network education for your employees

and the enforcement of strong acceptable use policies We can help you develop

a policy then monitor compliance using a Unified Threat Management device

that controls and reports on network access

3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once

limited to laptop computers mobile network devices now include PDAs

handheld computers and smart phones with new appliances appearing in the

stores every month Mobile devices often contain sensitive data yet they are

easily lost or stolen Be sure to password protect and encrypt data on all mobile

devices whenever possible Include mobile devices in your acceptable use

policy

4 Cloud Computing

ldquoThe Cloudrdquo in its most simple form involves using the Internet to

access and store your data When you access email using a web browser you are

working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly

gaining popularity and is just the beginning Companies like Microsoft IBM

and Google envision the day when we will use inexpensive terminals instead of

computers to run programs and access data located somewhere on the Internet

You need to be sure that any data you store and access across the Internet is

secure not just where it is stored but during the trip to and from the Internet

Monthly Spiritual Devotion

12 I know how to live on almost nothing or with everything I have learned the

secret of living in every situation whether it is with a full stomach or empty

with plenty or little 13 For I can do everything through Christ who gives me

strength Philippians 412-13 (NLT)

Get More Information About Our Services At wwwsmarthostdesigncom

Page 8: Technology Times - Pronto Marketing€¦ · Technology Times Get More Information About Our Services At: ... phishing and other online fraud. Your best bet is to keep everyone informed

What you must Do to Continue delivering Extraordinary Result

in your Business

Most IT Consultants focuses exclusively on the technology and forget that their customers are trying to grow their business

That is where we are different Beyond making the computer network just work and planning technology road may for our clients we share ideas books and resources to help you grow your business What Irsquove discovered over the year is that our fast growing clients are constantly reading business books looking for ideas to delivering greater result for their clients investing in training and peer groups to discover new ideas I just recently meet and read Mark Sanborn book rdquoFred 20rdquo and fuel my thinking on ideas on how to deliver extraordinary result I bet it might help YOU too as you seek to expand and grow your company Therefore I want to give you a complimentary copy No string attached Just enjoy it Just email me at femidadasmarthostdesigncom or call me at 301-576-1122 ext 101 to request your free copy Of course if you have any question or need assistance with anything technical or IT related please consider me as a resource

Page 8

Top 4 Threats Attacking Your Network And What To Do About Them

1 Overconfidence User overconfidence in security products is the top threat to your

network Failure to ldquopractice safe softwarerdquo results in nuisance attacks like porn

storms (unstoppable rapid fire pornographic pop-ups) and more subtle key

loggers that steal passwords Surveys promising free stuff result in theft of

information like your motherrsquos maiden name high school etc used to answer

common security questions leading to theft of otherwise secure data Think

before you click

2 Social Networking Sites Social networking sites like Facebook are exploding in popularity

Threats range from malware (eg viruses worms spyware) to scammers trying

to steal your identity information and money Many businesses and government

agencies are using these sites to communicate with clients and constituents so

simply blocking access is no longer reasonable Defending your company while

allowing employee access requires social network education for your employees

and the enforcement of strong acceptable use policies We can help you develop

a policy then monitor compliance using a Unified Threat Management device

that controls and reports on network access

3 Attacks On Mobile Devices Everyone is going mobile these days not just the ldquoroad warriorsrdquo Once

limited to laptop computers mobile network devices now include PDAs

handheld computers and smart phones with new appliances appearing in the

stores every month Mobile devices often contain sensitive data yet they are

easily lost or stolen Be sure to password protect and encrypt data on all mobile

devices whenever possible Include mobile devices in your acceptable use

policy

4 Cloud Computing

ldquoThe Cloudrdquo in its most simple form involves using the Internet to

access and store your data When you access email using a web browser you are

working in ldquothe cloudrdquo Using the cloud for automated off site backup is rapidly

gaining popularity and is just the beginning Companies like Microsoft IBM

and Google envision the day when we will use inexpensive terminals instead of

computers to run programs and access data located somewhere on the Internet

You need to be sure that any data you store and access across the Internet is

secure not just where it is stored but during the trip to and from the Internet

Monthly Spiritual Devotion

12 I know how to live on almost nothing or with everything I have learned the

secret of living in every situation whether it is with a full stomach or empty

with plenty or little 13 For I can do everything through Christ who gives me

strength Philippians 412-13 (NLT)

Get More Information About Our Services At wwwsmarthostdesigncom