Umbrella Infotech
  • Home
  • About
    • Service Area >
      • New Milford
  • Services
    • Managed Services
    • Technical Support
    • Backup and Disaster Recovery
    • Cyber Security
    • Voip Phones
  • Blog
  • Contact Us

Umbrella Blog

Windows 7 End Of Life: What You Need to Know

8/14/2019

0 Comments

 
0 Comments

Protecting Yourself From Phishing Scams

8/14/2019

0 Comments

 
0 Comments

Land Lines vs VOIP SYstems For Small business

8/9/2019

0 Comments

 
Picture
VOIP phones have been out for a while now. Many businesses haven’t made the jump to VOIP technology and have stuck with the older, but more reliable phone systems. Some owners are concerned about the reliability and cost of switching to a VOIP phone system. Others may not need the features that VOIP provides. Bother systems have pros and cons. Which one you should use for your business depends on your companies needs. Here are the pros and cons of each technology.
 
What is VOIP?
Land line phone technology has been around for a long time (over 100 years). The technology hasn’t changed much since it was first developed. You pick up the phone and dial a number. The call is transmitted over a copper wire. Calls are normally routed by the local phone company. With VOIP, your voice is converted into a digital signal which is sent over the internet. The call is transmitted to your VOIP provider who sends it along to the phone on the other end.
 
Land Line Pros
Low Price: Land lines can be very inexpensive if you don’t need any features. This may be okay for a small shop, but once you need features like an auto attendant or transferring calls, this price goes up significantly.

Reliability: Land lines are very reliable. They work even if the power goes out or the internet goes down.
 
Land Line Cons
Lack of Features: The technology hasn’t changed much in 100 years. Other than call waiting and caller id, not many features have been added to land lines.

Land Lines Don’t Scale: Let’s say your business is growing and you need to add five new phones. You need to call the phone company to add them. You may need to wait for them to come out to your location to set it up. This can take weeks to complete.

Business Class Phone systems are expensive: If you do want business class features like transfer and auto attendant, the cost of land lines go up. These features require a system called a PBX, which can be very expensive to purchase and install. They are expensive to maintain. If an issue occurs, you need to call a specialist. It is getting harder to find support for these systems, because they are not used as much.

Limited portability: Land line systems haven’t adapted to how mobile business is today. Forwarding calls and getting voice mail can be tedious when outside the office.
 
VOIP Pros
Low Setup Cost: VOIP systems don’t require onsite system to work. These systems are hosted in the cloud. Support for the system is part of the monthly bill. No extra support costs.

More features: Since the system is digital, VOIP can offer many more features that land lines can’t. Call forwarding, auto-attendant, voice to email, and integration with CRMs are just a few features that are built into VOIP systems. VOIP providers add regularly new features. The new features don’t require a new system to implement.

Scalability: Adding a new phone line can be completed by filling out a form online. Plug a new phone in and you are up and running.
Reliability: In the early days of VOIP, VOIP systems were not very reliable. The calls were choppy. Calls would drop frequently. The technology has matured and is much more reliable now. With most business internet speed over 100 Mbps now, there are few call issues anymore.

VOIP is portable: Many VOIP systems don’t care where the phone is physically located. You can take you work phone home and it will work on your home network. Everyone can call you direct number and still reach you. This is great for companies who have employees that work from. VOIP systems can easily forward calls to a cell number, so you don’t miss that important call from a client.
 
VOIP Cons
Outages: VOIP phones don’t work if there is a power or internet outage. If you are in a location where internet or power is not stable, VOIP phones are not a good choice.

Bandwidth: If you don’t have a fast internet connection, call quality can be bad. This goes for old networking equipment also. If you are using an old ethernet hub to connect computers and voice phones, VOIP calls might not work well. Equipment and internet speeds can be upgraded though.

Need an Ethernet cable: VOIP phones use the same wired connection that your desktop computer uses. This is great if your building with wired with Ethernet cable already. If you are in a spot where you can only connect wirelessly, you will need to run an Ethernet cable. This can be costly if a professional cabling company needs to be hired.

Does work with Wi-Fi: Most VOIP phone don’t work with Wi-Fi yet. And those that do and limited if the Wi-Fi network is poor. This makes setting up a phone is remote locations difficult.
 
VOIP through cable provider
Some people get VOIP through their cable company. This is a mix between land lines and VOIP. Normally, you can use your old land line system. The cable company converts the land line signal into a digital signal at your cable modem. Technically this is VOIP, but you don’t get all the features that a true VOIP systems does when the phones are digital also.


Who is the winner?
It depends really. If you only have a few phones and don’t need any features, land lines work great. Other VOIP is the way to go. VOIP costs less and the has more features than a land line system.
 
Umbrella Infotech provides IT services for companies in Litchfield and Fairfield County, Connecticut. Reach out to use to discuss how we can help you to replace your land line system with feature rich VOIP system. 
0 Comments

How Secure Is The Cloud?

12/12/2018

0 Comments

 
I was recently on site with a client. We were talking about changing their backups from using a server in their office to using a cloud backup service. I explained the pros and cons. Their major concern with moving their data to the cloud was security. They were hesitant to move data to the cloud because they are not sure how secure it was. The data is exposed on the internet where anyone can try to get to it. Concerns about cloud security are valid. The cloud is more secure in some ways and less secure in others.
 
What is the cloud?
Let’s discuss what the cloud is. The cloud is a network of remote computers around the world that are connected to act as one system. The cloud can store data, run applications, or deliver services like mail or office productivity software. These cloud systems can be accessed from any personal computer or device that has a connection to the internet. There are three types of cloud. Public cloud is available to anyone over the internet. Private cloud is hosted on a private network. The third type is hybrid cloud that uses a mixture of public and private clouds.
 
What is more secure about the cloud?
When cloud providers develop cloud solutions, they know that the service will be exposed to the internet and write the software to protect against that.  They know that hackers will be trying to get into the systems and develop the software and systems to protect against attacks. On-premise software isn’t always developed with security in mind. The security is not as strong, because the developers expect it to be used in a private network. But we aren’t always using the software in the private network. People take their laptops home and airports where networks aren’t as secure. Even work networks can be broken into and if the systems don’t have another layer of security, important data can be accessed or lost.

Cloud services are generally run on servers in large data centers. These data centers have strong security in place to protect the systems and the data. A barbed wire fence may be on the outside of the data center. There are security guards who patrol the building and check the access of people trying to get into the building. Cameras record people’s movement and actions. Servers are locked in cages to prevent unnecessary access. In an office, the only physical security of a server maybe a locked door.

Cloud security is audited. Periodically, the security of the cloud systems is checked by a third party. The third-party checks that processes are in place to protect the systems and data. If the auditor identifies security issues and other ways that security can be improved.  Auditing forces the cloud provider to be accountable for the security of the systems.

Cloud providers high security experts to develop their systems. Amazon and Microsoft hire the best engineers to create their systems. The engineers are experts in their fields and know how to develop systems that are safe. They are constantly looking for and security issues. They can quickly fix the issues and send out updates. These updates are sent out to all systems automatically. Security doesn’t depend on a user updating their system.
 
What is not secure about the Cloud?
Though there are number of ways that the cloud is more secure than on premise systems, it is vulnerable in other ways. If a user does not use strong credentials, systems can be hacked. Weak passwords can be guessed. Users can leave their username and passwords on a piece of paper on their desk. Accounts can be hijacked. Hackers use phishing emails to steal the credentials of users. They use these credentials to access their data that is stored in cloud.
​
One upside of cloud services is they are accessible if you are on the internet. This also gives anyone else on the internet a connection to the systems. Anyone from anywhere can attempt to attack a system. System on private networks don’t have this problem because it is much harder to access a computer inside a private network than one in cloud. The attackers can try to break into the system over and over since that access is always on. Sometimes systems are access by hackers and data is breached. A breach happens when sensitive, protected, or confidential data is released or viewed by someone who is not authorized. Some data breaches can expose client information, which is a big problem for small businesses.
 
Conclusion
While discussing moving a service or data to the cloud, the benefits and risks need to be assessed. Both onsite and cloud software can be compromised. Some questions to ask are:
  1. Is the technology being updated regularly against security threats?
  2. How is your data protected against physical threats? Could some walk out of the building with your data?
  3. What is the risk of having the data stolen? Credit card and customer data needs to be protected more than some other data. There can be damage to company reputation and monetary cost if a hack does occur. 
0 Comments

Why Every Small Business Should be Using A Firewall

10/24/2018

0 Comments

 
A firewall is the first line of defense against hackers for small businesses. The act as a barrier between computers and threats from the internet. Firewalls are a necessity to protect your and your client’s data.
 
What is a firewall?
A firewall is a security system that analyses and controls traffic that comes in or goes out of a network. A set of rules are defined in the firewall that allow or block traffic from traveling through a network. It also Firewalls can block virus and malware from entering your network, before they get to a user’s desktop. They can keep employees productive also. Sites can be blocked based on the types of content they provide (Media, adult content). Netflix can be blocked, but work-related sites are allowed.
 
Two Types of Firewalls

Software Firewalls
Software firewalls are installed on most modern desktop computers. Windows 10 has a built-in firewall. Some types anti-virus software come with a software firewall included. These firewalls may work well on a home PC, but they are costly to manage on a business network. Each computer needs to be configured and maintained separately. This can be time consuming and expensive. An employee may be able to disable the firewall on their computer also.  
 
Hardware Firewalls
A hardware firewall is a physical device that sits on your network. All traffic in or out of the network goes through the firewall. The firewall reads all traffic and determines if it safe for send along. If someone tries to download a virus, the firewall will block it. Hardware firewalls are easier to manage than software firewalls. Configuration changes that affect the entire network can be made in one place and not on each computer. If the firewall needs to be updated, only one device needs to updated, instead of every machine on network.
 
The Necessity of Firewalls

Threat protection
Firewalls protect against threats, like virus and malware. As traffic enters a network, the firewall scans the traffic. If it finds a threat, it is blocks and does not get forwarded to a user’s computer.
 
Network Monitoring
Firewalls can monitor network for breaches also. While the firewall is inspecting internet traffic, it is looking for suspicious activity. This activity could be someone from the outside trying to access a computer inside your network.  The activity will be blocked if it determines that it is not safe.

Control Internet Usage
Some small business would like to control what sites their employees are accessing while at work. Employees access streaming services, like Netflix, can slow down the entire network. Employees accessing can reduce productivity and allow threats into the network. Firewalls can block access specific sites. Entire types of sites can be blocked also, like media streaming sites or gaming sites.
​
PCI Compliance
If a small business accepts credit cards, they need to follow PCI compliance rules. One of the rules requires businesses to have a firewall on their network. A firewall protects customer data such as credit card information that hackers are looking for. A network breach where customer data is stolen can be expensive too. The average cost of a PCI breach is $36,000.
 
Price of Firewalls
Firewalls prices aren’t out of reach for small businesses. Prices range from $500-5000 depending on features and length of support.
 
Choosing the Right Firewall
Firewalls must be compatible with your current network. They need to be configured correctly and updated regularly to protect your business against the latest threats. It is important to contact your IT professional before purchasing a firewall.
Umbrella Infotech provides IT services in Litchfield and Fairfield Counties in Connecticut. We have helped many small businesses choose, install, configure and maintain firewalls. Contact us to discuss your company’s IT needs. 

    Contact Umbrella Infotech

Submit
0 Comments

Speeding Up A Slow Computer

10/17/2018

0 Comments

 
One complaint I hear over and over from clients is their computer is running slowly. Some clients are using older computers with older hardware.  Others complain that the brand-new computer is not running as fast they expect it should be. It isn’t necessary to replace a computer to speed it up. Here are some steps that can improve the speed of your computer without dishing out a bunch of cash. 

Uninstall unused programs
When you purchase a computer, programs come preinstalled on the computer. You may have never used these programs and they can be removed. These may be program you installed a long time ago, but don’t use anymore. To remove unnecessary programs, Click Start>Control Panel>Programs and Features>Uninstall a Program. Select the program that you want to uninstall and select Uninstall/Change. 
​
Programs and Features

Delete temporary files
Temporary files can take up space on your hard drive and slow down programs. Most of these files are no longer needed and can be deleted. Click Start and search for “Disk Cleanup”.  Select the drive you would like to clean up. Normally this will be the C: drive.  Select Temporary Internet Files and Temp Files. Other files types can be picked also, but make sure you know what you are deleting. Then click okay. If there are a lot of temporary files, the process may take a long time to complete. 
Disk Cleanup
Clean up the registry
The Windows registry is a database of configuration settings for your computer. When a program is installed, items are added to the registry. When a program is uninstalled, the registry items may not be removed. If there is a large amount of data in the registry, it may take longer for your computer to start or to open programs. Deleting unused registry item can speed up your computer. There are a few free programs that can be used to do the cleanup. My favorite it CCleaner Free.  Download and install the program. Select Registry. Click Scan for Issues. When it complete, click Fix Selected Issue.
CCleaner

Add RAM
RAM, also know as memory, is what your computer uses to load all the information that your programs and files use. If your computer is older, your computer may not have enough RAM to run the programs that your want. Programs that open large files, like AutoCAD, Publisher, or Photoshop, the large files maybe using a lot of your RAM also. Upgrading the RAM in your computer can be a cost effective way to speed up your computer. 

Add Drive Space
Your computer uses your hard drive as temporary memory also. If your hard drive is low of space, your computer may not have enough space for temporary memory. Upgrading the size of your hard drive or adding a secondary drive to your computer can fix this issue. 

Upgrade Your Drive to SSD
If you are upgrading your hard drive, you may want to replace the old drive with an SSD drive. SSD stands for Solid State Drive. These new types of drives don’t have moving parts like traditionally hard drives which have platters. The drives read and write data faster than traditional drive. SSDs can improve the speed of your computer over 50%. Boot time are faster also. The new drives are more expensive but the gains in speed are worth the cost.
​
Run a disk defragmentation
When your computer writes to the hard drive, the bytes of data are stored on your computer. The bytes are stored can be stored in random places on the drive. Parts of the same file can be on completely different parts of the drive. When your computer opens a file, it takes longer because to needs to look at two different places to get the information it needs. Defragmenting your computer reorganizes the bytes, so they are logically organized. To defragment your computer, click Start and search for Defragment and Organize Drives. Select your hard drive and click Analyze. The program will scan your drive and recommend if you drive needs to be defragmented. If it does, click optimize and the defrag will run. 

Picture

​If you are still having issues with your computer after completing these steps, there may be other issues with your computer. Contact Umbrella Infotech to schedule a time to review your computer. 

    Contact Umbrella Infotech

Submit
0 Comments

PROTECTING YOUR BUSINESS WITH TWO FACTOR AUTHENTICATION

10/6/2018

0 Comments

 
Imagine this; It’s 5PM, your employee is rushing to get home. An email pops up on their screen. The subject is “Urgent Big Order”.  He opens the email. It looks a little different than emails normally do from the client. The email says, “click the link to get the order details”. Without thinking, the employee clicks the link. The web page asks for a user name and password. He enters his information and clicks Login, but the page does go anywhere. He shrugs his shoulders and says to himself “I will take care of it in the morning” and goes home.

What the employee doesn’t know is that he was just the victim of a phishing attack. The web site was bogus, and now a hacker has his user name and password. While the employee is eating dinner with his family, the hacker is reading through company data or transferring money out of YOUR bank account. By the morning when the issue is discovered, it is too late to do anything. The data or money has been stolen.

The stolen data could have been prevented using a simple, new technology called two factor authentication or 2FA. Two factor authentication adds a second method of authentication when a user logs into a web site or company resource. After logging into a web site, you receive a text message with a code. The code is entered into the web site. If the code is correct, you get into the site. If you don’t have the code, you don’t get in. You may have encountered 2FA when logging into Facebook or Gmail on a new computer.
Two factor authentication requires you to have different types of identifying information, normally a password and code that is sent to a device you own. The code sent via text message or phone call. It can be sent through an app on your phone. Not having access to the phone makes it very hard for a hacker to get into your accounts.

Many small businesses in the New Milford/Danbury area are adding two factor authentication to protect their company resources. Unified Access Systems are can be implemented to protect systems like Office 365, Dropbox, and many other applications. Configuration is simple and can be completely cloud based. Pricing is affordable and billed on a per user basis.

Umbrella Infotech can help your business get started with two factor authentication. Click here to see how we can help you protect your company today.
0 Comments

3 SIMPLE WAYS TO PROTECT YOUR COMPANY FROM HACKERS

10/6/2018

0 Comments

 
All business owners know that a secure network is an important factor in keeping their business running. Getting hacked can cause loss of productivity and sales. Having up to date anti-virus software needs to be installed on every computer is important, but that is only part of keeping their organization secure. Many leaders aren’t sure of other ways to protect their business from cyberattacks.

Recently, the National Institute of Standards and Technology released the guidebook Cybersecurity is Everyone’s Job. It lists different ways organizations can protect their network. The guidebook is broken down into sections based on employee roles, like leadership, human resources, and sales. Here is the most important information that I found.
 
Leadership
Leadership needs to be actively involved in the organization’s cyber security. They need to understand cybersecurity to make sound decisions. Third parties should be engaged to explain cyber risks and how they can be stopped. Leadership should assist in developing and maintaining organizational security policies and standards. These polices should be developed from risk assessments, regulations, and best practices.
 
Sales, Marketing, and Communications
The Sales, Marketing, and Communications departments hold important roles in an organization’s cybersecurity strategy also. These teams need to communicate important cybersecurity matters within the company and to outside stakeholders. These communications could be an explanation of the security policy or making employees aware of new security risks. The communications team should be part of the incidence response team and assist in planning for the inevitable cyber incident.
 
Operations and Facilities
The operations and facilities teams should be involved in security planning and implementation also. They can identify physical security risks of systems and work with the IT to protect these systems. This could be securing a server room. Both teams should develop a physical safety plan. Operations should incorporate cybersecurity measures into their safety program. Employee training should include cybersecurity risks to the physical environment. They can partner with IT to develop systems for guests, which could include a restricted guest network and limiting physical access to systems.
 
Everyone
There are several things that every person in the organization can do to reduce cybersecurity risks:

  1. Social media should be used wisely. Don’t share personal information over business accounts. Also, apply strong privacy setting on social media accounts.
  2. When working from home, the home network should be strongly secured. Change the wireless key regularly. Strong encryption should be enabled on the wireless router. Use a VPN to access organization resources when possible.
  3. Be careful what networks you connect to when you are traveling. Data sent over an unsecured network, such as those available in airports, can be read by others. Use a VPN when connected to public WiFi networks. If you can’t connect to a secure network. Tether your computer to your cell phone.

The entire guide book, Cybersecurity is Everyone’s Job, can be read at the NIST web site.
​

Umbrella Infotech offers cyber security services and training to business. We can develop a cyber security plan for you company. We can monitor you network in real time to identify and act against security risks. Click here to see how we can help you protect your company today.
0 Comments

TYPES OF DATA BACKUPS

10/6/2018

0 Comments

 

Data backups should be a vital element in an organization’s IT strategy. It protects against the accidental or intentional loss of data which can cause down time and lowered productivity. Backups are made by copying important data from one device to another. If the data in the first device is lost, it could be restored from the backup copy.
 
Types of Backup Methods
 
Onsite backups copy data to a device located at the same physical location as the original data. There are several benefits to onsite backups. Access to the data is fast because it is close. Low cost media can be used. The main downside is if there is a disaster at your location that destroys both the original and backup copies, the data could be lost forever.
 
Remote backups copy data to a different physical site. The data can be copied over a network location to a secondary storage device. The secondary location could be a site you have physical access to, like another business location. Remote backups can be made to cloud storage also. Backups can be made locally, and the backup copy is physically moved to a remote location by a person. If the data at the main location is lost, it could be restored from the remote back up. Remote backups are good because if there is a disaster at your main site, the data is safe at the remote location. Restoring data from a remote back up can take a long time if the internet connection is slow. They can be costlier depending on the type of storage used, like cloud-based storage.
 
Backup Media
Data can be backed up to a variety of mediums. The most common is a hard drive. These can connect directly to a computer or over a network. CDs, DVDs, and tapes can be used also. Disc and tape backups are less popular than in the past. For small amounts of data, USB sticks can be used.
 
Cloud Backups
 
Backing up to the cloud has become more popular recently. Your data is copied over a network connection to server hosted in a remote data center. The provider of the server takes responsibility for the upkeep of the data at the remote location. You do not need to worry about the hard drive or the network connection. Cloud based storage is normally more expensive than other storage options.
 
Other Backup Considerations
 
Frequency of backups
 
How often data is backed up is important also. If data is only backed up once a day, changes or new files may be lost if a hard drive crashes before the data is backed up. Backing up data too often can cause issues also. The network connection can be overloaded with back up data. The backup device may slow down if it is receiving too many backup requests at one time. The risk of losing data needs to be weighed against the potential of system slowdowns.
 
File level vs image backups
 
When we think of backups, we normally think of a Word or Excel document on our computer. If your computer hard drive crashed, your files have been saved, but the operating system and programs need to be re-installed which can take a long time. All computer settings are lost also. An image can be taken of an entire computer, which it like taking of photograph of your computer at a point in time. Imaging software copies a computer, bit by bit, to a backup location. The image can be used to restore the entire computer using the image file. The restore takes a lot less time that re-installing all the programs. All the programs settings, Wi-Fi connections, and user settings are restored. Image backups take more space that file backups because all the files on computer are backed up, not just ones that you decide to back up.

​Click 
here to see how Umbrella Infotech can help you protect your company today.
0 Comments

    Archives

    August 2019
    December 2018
    October 2018

    Categories

    All

    RSS Feed

Our Services

Managed Services
Technical Support
Backup and Disaster Recovery
Cyber Security

Company

About Us
​Contact
Our Blog

Contact Us

118 Washington Ridge Rd
New Milford, CT 06776 

Phone: 203-837-1120
Email: info@umbrellainfotech.com

  • Home
  • About
    • Service Area >
      • New Milford
  • Services
    • Managed Services
    • Technical Support
    • Backup and Disaster Recovery
    • Cyber Security
    • Voip Phones
  • Blog
  • Contact Us