img not found!

Is Your Data Safe in the Cloud?

MBM Ltd has launched a new service which offers businesses further protection of data they store in the Cloud.

Wombourne based MBM has launched a new Cloud-to-Cloud Backup service for businesses who currently store their data in Office 365 and Google’s G Suite Cloud services.

Jason Mills, technical director, at MBM explained: “The Cloud remains a safe way to store and access your data. However, if a member of staff accidentally deletes a document, if a file is encrypted by a hacker, if data is overwritten by third party software or if there are issues with data syncing, you need to be able to quickly and easily retrieve the corrupt or lost file.

He continues: “Users think they can easily access their data when it’s in the Cloud. Whilst Microsoft, for example, guarantee 99.9 per cent up-time, they also state there is no guarantee that they can recover all or any of the files and if they can, it may take some time. We therefore recommend it is good business practice to take an independent backup of your critical Cloud-based company data.

MBM has seen first-hand the frustration experienced by businesses when they can’t retrieve their data from the Cloud. MBM’s new Cloud-to-Cloud Backup service provides a separate encrypted backup of your Cloud data on Amazon S3 SAS 70-certified data centres providing peace of mind for business owners should they need to quickly and easily retrieve a file from the Cloud.

For more information or to book a demo of MBM’s Cloud-to-Cloud Backup service, call 01902 32 44 94 or email sales@mbmltd.co.uk

Why is Malware written?

Carrying on from last weeks Blog the answer to the “what is malware?” question cannot be complete without exploring the ‘why’ of its creation. By now, you should have a pretty clear idea of what type of damage can be done as a result of malware, but you might be wondering – why do programmers create malware in the first place?
Student Hackers and Cyber-crooks

MBM_42Emails_Blog_smallIn the early days of software, programmers wrote malware mostly to prank one another, or to show off their technical skills. These programmers, who were usually students had a great sense of humour but did not have much business sense. These students eventually graduated and got jobs. Their new motivation was now money, and how to make more of it using their skills. Some of these programmers learned that they can make thousands a day if they successfully exploit malware to their advantage.

These people went on to become cyber-crooks, defrauding individuals and organizations for financial gain. These criminals steal personal banking information to transfer money out of users’ bank accounts and into their own. They also launch distributed denial of service attacks against corporations and ask for money in exchange for an end to the attack.

Worms, zombies and distributed denial of service attacks are a good way to inflict mass damage on a global scale and are therefore very appealing to cyber-activists. These people want to get a message across and are ready to do so by utilizing any means necessary and this includes writing malware that causes damage, gets them noticed, and enables them to announce their messages and beliefs to a large audience.

Governments are also part of the game. A cyber-war between countries is raging. Some countries such as China, Syria, and America are rumoured to be state-sponsoring cyber-gangs whose only purpose is to research and develop new malware techniques capable of infiltrating government agencies and infrastructures. Malware has recently been spotted in the wild that was designed to infect SCADA systems with the scope of shutting down nuclear reactors. Some reports suggest that this worm, which might have been created by the Americans, was successful in shutting down several Iranian nuclear power plant coolers.

The malware problem is huge and is growing fast. By the end of 2010 the counter for unique malware programs stood at 14 million, with a staggering 60,000 pieces of new malicious code detected every day. Recently a worm called Koobface — which targeted people on social networks — netted its creators over 2 million dollars in just 12 months. Another worm, the Mariposa is said to have created the biggest network of zombie machines in the world. Experts could never determine its exact size, but estimated that over 12 million computers were infected. This worm dropped spyware capable of stealing sensitive information from victims, such as bank account numbers and credit card details. All this was created by a single hacker in Spain who fortunately made a mistake which exposed him and got him arrested.

The industry is fighting back. Numerous security solutions are available from many vendors that help stop malware infections. The threat however is a moving target. Hackers keep finding new ways to write bigger and better malware, the incentives are all there and the waging war is showing no signs of slowing down.

Worried that you might be exposed ? Speak to MBM

What are Trojans ?

Looking at common terms within the IT world we look today at Trojans.

Trojans are malicious programs that perform actions that have not been authorised by the user. These actions can include:

Blocking data deleting data modifying data copying data disrupting the performance of computers or computer networks

Unlike computer viruses and worms, Trojans are not able to self-replicate.

How Trojans can impact you

Trojans are classified according to the type of actions that they can perform on your computer:

  • Backdoor
    A backdoor Trojan gives malicious users remote control over the infected computer. They enable the author to do anything they wish on the infected computer – including sending, receiving, launching and deleting files, displaying data and rebooting the computer. Backdoor Trojans are often used to unite a group of victim computers to form a botnet or zombie network that can be used for criminal purposes.
  • Exploit
    Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.
  • Rootkit
    Rootkits are designed to conceal certain objects or activities in your system. Often their main purpose is to prevent malicious programs being detected – in order to extend the period in which programs can run on an infected computer.
  • Trojan-Banker
    Trojan-Banker programs are designed to steal your account data for online banking systems, e-payment systems and credit or debit cards.
  • Trojan-DDoS
    These programs conduct DoS (Denial of Service) attacks against a targeted web address. By sending multiple requests – from your computer and several other infected computers – the attack can overwhelm the target address… leading to a denial of service.
  • Trojan-Downloader
    Trojan-Downloaders can download and install new versions of malicious programs onto your computer – including Trojans and adware.
  • Trojan-Dropper
    These programs are used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.
  • Trojan-FakeAV
    Trojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from you – in return for the detection and removal of threats… even though the threats that they report are actually non-existent.
  • Trojan-GameThief
    This type of program steals user account information from online gamers.
  • Trojan-IM
    Trojan-IM programs steal your logins and passwords for instant messaging programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager, Skype and many more.
  • Trojan-Ransom
    This type of Trojan can modify data on your computer – so that your computer doesn’t run correctly or you can no longer use specific data. The criminal will only restore your computer’s performance or unblock your data, after you have paid them the ransom money that they demand.
  • Trojan-SMS
    These programs can cost you money – by sending text messages from your mobile device to premium rate phone numbers.
  • Trojan-Spy
    Trojan-Spy programs can spy on how you’re using your computer – for example, by tracking the data you enter via your keyboard, taking screen shots or getting a list of running applications.
  • Trojan-Mailfinder
    These programs can harvest email addresses from your computer.
  • Other types of Trojans include:
    • Trojan-ArcBomb
    • Trojan-Clicker
    • Trojan-Notifier
    • Trojan-Proxy
    • Trojan-PSW

How to protect yourself against Trojans

SOSBy installing effective anti-malware software, you can defend your devices – including PCs, laptops, Macs, tablets and smartphones – against Trojans. A rigorous anti-malware solution will detect and prevent Trojan attacks on your PC anti-malware products that defend the following devices against Trojans:

  • Windows PCs
  • Linux computers
  • Apple Macs
  • Smartphones
  • Tablets

We can advise on and install anti-malware products at MBM

Why your business shouldnt wait any longer for 365 migration

Still companies are waiting before migrating to Office 365 – We can only deduce that they are crossing their fingers that their systems will cope following the withdrawal of support for Windows XP next month. At MBM we can offer you a managed cloud solution on Windows 365 and will support you through the migration process.

As well as being a replacement for XP there are several benefits for your business in upgrading.

office

Top Benefits of Microsoft Office 365 for Small Businesses

  • Saves time and money.
  • Anytime, Anywhere Access.
  • Professional Face for Your Business.
  • Easily Communicate and Collaborate Inside and Outside Your Organization.
  • Simple to Learn, Straightforward to Use.
  • Email, Collaboration, and Online Meeting Solutions.
  • Safety and Security.
  • 99.9-Percent Availability, Money-Back Guarantee
  • Flexibility for Your Business.

Need help ? Call for a no obligation chat – our friendly team are always happy to talk you through your future IT  plans

 

Three Reasons why you should use an IT Support Company

As a small business, your resources are undoubtedly limited. Many small businesses attempt to make due with an in-house IT person, however, this arrangement rarely works out for long. There are many reasons businesses have begun opting for IT support services instead of keeping an IT person on staff.

1: Managing costs

Payroll is probably one of your biggest expenses, if not the biggest. Keeping an IT professional on staff may not be cost-effective because that person’s salary is most likely much higher than the salaries of your other employees. Even larger corporations have discovered the value of outsourcing their IT needs to save money in this area. You’ll find that you’re able to save a great deal of money in your budget by only paying for IT support when you need it, as opposed to keeping someone on staff strictly for that purpose.

2: Freeing up your resources

Once you make the switch to outsourcing, you’re going to find that a great deal of your financial resources are freed up, and able to be utilised in other areas of your business. This money can be used to expand your business, offer a new product, or even build upon your current facility. Regardless of where you redirect those funds, you can find ways of better using them to help grow your business.

3: Focus on your business

In addition to the money you’ll save by outsourcing your IT support needs, you’ll also find that you’re able to focus on your business even more. Even with an IT professional on staff, when you’re handling your own IT in-house, it takes up a great deal of your time and energy.

SOSAccording to Heidi Murphy, a blogger for the Huffington Post, “When you’re handling all of your IT support internally, your focus is often divided by a bunch of different technical priorities to keep your site, product and/or application up and running. Outsourcing IT lets you focus on what matters: growing and supporting your business – not troubleshooting software, hardware and user issues.”

Above all, managing your own IT in-house is a lot of hard work and expenses that you don’t have to have. If you’re looking for an IT solution that will allow you to save money and grow your business, we can help. Contact us for more information.

Like to take it a stage further ? Speak to Micro Business Machines without obligation

Top SME technical trends 2014

As we look ahead to 2014 – We are endebted to mybusiness.singtel.com for highlighting top trends in the year to come many of which MBM have highlighted recently. Our two big tips are the big push on Windows 365 and adoption of more cloud based solutions. We are here to discuss any query you may have in these areas.

disksChange is the only constant. In the tech world, there is constant evolution as digtal technology and communication goes faster, better and smarter, all at a rapid pace. The best way to stay ahead of the curve is to anticipate what’s coming, and then to act accordingly.

Here we outline the top six technological trends that may be relevant for SMEs come 2014.

1. Digital is A Must-Have

According to Forrester, “A great digital experience is no longer a nice-to-have; it’s a make-or-break point for your business as we more fully enter the digital age.” Simply translated, SMEs will have to go digital if they are to remain competitive as customers interact more with businesses through digital engagement. This also puts emphasis on user experience (UX), focusing on the way users feel and behave as they interact with online platforms.

2. The Internet of Everything

At the recent Gartner Symposium/ITxpo 2013, where analysts highlighted the top tech industry trends going forward, there was an emphasis on the Internet expanding beyond just computers and mobile devices.

Instead, the Internet is expanding to everything—cars, televisions, etc. As technology moves towards this, Gartner has identified four basic usage models (Manage, Monetise, Operate and Extend) that can be applied to things, information, places and people, therefore being dubbed the “Internet of Everything”. This is inevitable, and SMEs are in a position to remain flexible so as to learn and adapt to advances quickly and effectively in order to harness the Internet in new ways.

3. Wearable Devices Are Everywhere

Google Glass and Samsung’s Smartwatch are just the tip of the iceberg as tech companies debut an increasing number of wearable technology devices in 2014, according to Juniper Research firm.

As technology becomes more pervasive in the lives of consumers, SMEs must study how the market changes as a result, before changing their own marketing strategies. SMEs must also be on the lookout for marketing opportunities related to wearable technology and innovate for this new-found technology trend.

4. The Cloud Gets Huge

Cloud services will be huge in 2014, resulting in an increase in data storage. In fact, according to the International Data Corporation (IDC), cloud services will grow by 25% to surpass $100 billion. The reason for the huge growth is that Cloud services offers SMEs a chance to have more efficient and cost-effective ways of running your businesses. SMEs should consider moving infrastructure and/or software to the cost- and data-effective cloud. SMEs should consider Software as a Service (SaaS) cloud solutions: for example, myBusiness offers a range of cloud-hosted software apps in areas such as HR and office communications. Using a SaaS service saves on traditional outlay costs such as servers and having a dedicated IT team for software and hardware deployment.

NIgel_Mills_MBM5. Security, Trust & Identity

“Consumerisation” of technology is taking place at an increasing pace, as the internet – and the way technology is used – sees new and advanced ways of permeating our lives and changing the way we live. Internet banking is becoming the norm and there are constantly new e-commerce ventures such as using NFC for payments. Digital wallets will be more prevalent in 2014. As such there will therefore be a need for all business to rethink security, trust and identity to ensure that both business and customer data are kept safe.

6. 3D Printing Takes Off In a Big Way

3D printing is expected to see a big jump, with 3D printers expected to grow exponentially worldwide from 2014 through to 2015. As more companies look to 3D printers a tool in manufacturing design and solutions, SMEs too can leverage this opportunity by working on better product designs and rapid protoyping with the aid of 3D printing.

How Legal is your Software?

More than half of small businesses in the UK have either bought or downloaded illegal software – according to research conducted by the leading global advocate for the software industry.

According to Business Matters Website and Magazine – The BSA research, carried out by Vanson Bourne, polled decision makers with responsibility for purchasing software in 250 small businesses in the UK.

NIgel_Mills_MBMFor a sizeable proportion of these businesses, the way they bought or downloaded illegal software appeared to be pre-meditated. More than one in five admitted to using a software key generator for business purposes – a small programme that will generate an unauthorised but working registration key or serial number for a piece of software. It is typically used to create an illegal version of a software application.

And 70 per cent of those who have purchased OEM software not accompanied by the hardware did so more than once. The same applies to repeat downloads of normally-paid-for-software for free from torrent sites and warez sites, as well as normally paid-for software for free from other sites.

For others, the buying and downloading of illegal software appeared to be accidental. A significant amount took action to remedy the situation once they discovered they’d been duped into buying fraudulent software.

More than half of small businesses replaced the software with a legitimate copy whilst 10 per cent uninstalled the software and did not replace it. However, these actions suggest that in many cases these businesses had to pay twice; making illegal software a false economy; particularly for those downloading illegal software multiple times.

Michala Wardell, UK committee chair of BSA | The Software Alliance, comments: “The practice of downloading illegal software amongst small businesses is clearly widespread. The research suggests that a large number of UK businesses have an unclear understanding of what constitutes illegal software use, at best; and a blatant disrespect for copyright law and business ethics, at worse. It’s encouraging to see that many of these businesses have taken action to address the error, often at their own expense. But to avoid undue costs and security risks, businesses need to be more vigilant about where they buy their software from in the future. As things stand, too many small businesses are exposing themselves to unnecessary hazards.”

The study reveals an irresponsible attitude to software management. Fifty four per cent of small businesses don’t have procurement records for all of the software their organisation uses. And yet the average cost for software is approximately £17,000 per business, to perform vital tasks.

disksHandley Brustad, Trading Standards Institute Joint Lead Officer Intellectual Property said: “The BSA research confirms our suspicions that while some small businesses are knowingly and opportunistically downloading illegal goods, a significant proportion of companies are being fooled into buying illegal software. It’s easy to assume that if a website is easily searchable online, the software is genuine. In many cases, it might seem easier to just press download, than ask too many questions. Unfortunately, the opposite is the case. Small businesses are leaving themselves open to security threats, liability claims and more. While we strive to bring down dishonest traders, we rely upon businesses to take proper precautions when purchasing their software. “

Can you afford to be using unlicenced or illegal software?  Talk to us about a software audit – it could just save your business in more ways than one. Why not consider Cloud computing and ensure all your software is legitimate?

Why you should work in the Cloud

You may have heard about using cloud technology but why should you use it ? – The main advantage is flexibility and cost. A cloud service is pay as you go so you don’t have to make capital investments into your own IT set-up. For example, rather than pay NIgel_Mills_MBMthousands of pounds  purchasing the hardware, software and expertise to set up your own Exchange Server you can pay a per user per month fee to purchase it as a cloud service. There is also flexibility to increase and decrease the number of users when required.

There are drawbacks – Sure Cloud computing is an option for your IT but certainly not the be all and end all. Firstly, if you have a cloud service then you are very reliant of your internet connection. If you lose internet connection you lose access to your service. Secondly, cost needs to be closely monitored. You are effectively renting someone else’s IT infrastructure and it isn’t always cheaper in the long run. Make sure you do the maths. We are happy to work with you on that.

In summary – Cloud computing is a welcome addition to the IT landscape. It gives another option with a “pay as you go” payment plan. Its quick to implement, flexible and can lower IT costs but make sure you do your homework We at MBM are happy to help and can put a cost-effective solution in place. Give us a call for a no Obligation chat.

Busy time as local company upgrades and when did you last back-up?

Its been a busy week or so at Micro Business Machines but we wouldn’t have it any other way !

Microsoft as ever moves on and a local company has taken the step to upgrade 33 machines to Windows 7 from Windows XP Pro. This has involved our engineers being on site at every stage of the process. Migration from XP pro was vital to our client as support for the product ends in April 2014. That date will soon come around – if you are still running XP please contact us to discuss the options available to you. Don’t leave it too late to plan your IT future!

MBM_42Emails_Blog_smallOn the other end of the scale we have cleaned up two Laptops  heavily infected  with viruses and successfully restored the data on those machines. The biggest issue that these problems highlighted was the lack of data backup. Had we not have been able to save the data then much of the work if not all would have been lost.

So what options do you have on Data back-up ?

The very least you should have in place is a copy of you files on some separate source – typically a hard drive stored separately from your laptop but that relies on you remembering to adhere to a strict back-up routine and removing the back-up source to a safe place. There are many options when it comes to cloud options – storing your work securely on the internet. A back-up solution can be put in place to automatically so no need to remember ! This solution will work from one to hundreds of machines and is available now.

And if you do nothing ?

So, please take a minute to think about how long your backup would take to restore and then consider if you can afford to be down for that long.

If you want an IT continuity solution that will get you working again in hours rather than days, please call us on 01902 324494 to discuss your requirements.

Our Office Hours

contact

Do you have any questions?