tag:blogger.com,1999:blog-76173863399551680262024-03-04T23:30:53.226-06:00Blueline Network Solutions Computer NewsShop Blueline Network Solutionshttp://www.blogger.com/profile/14807736692740066555noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-7617386339955168026.post-89770204087660648732012-03-25T07:53:00.000-05:002012-03-25T07:53:45.254-05:00<h4>
<span style="color: #3d85c6;">How do you know if you can trust a website?</span></h4>
<div>
<br /></div>
<div style="text-align: justify;">
We use anti virus software, firewalls and spyware blocking software to keep our computers safe but it may not be enough. The truth is, if you continue to go to "bad websites" eventually something is going to get through and you'll be calling a company like ours for virus removal. So how can you avoid sites that may be "untrustworthy?"</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<a href="http://www.mywot.com/" target="_blank">Web of Trust</a> is a free browser plugin that you should really look into. This great little utility ranks websites in a number of ways including trustworthiness, privacy, vendor reliability and child safety. It uses a simple, easy to recognize "traffic light" method of green, yellow and red color to inform you of the site's rating in any particular category. Based on the rating, you determine if you want to visit the site or not. It's simple, easy to use and gives you one more line of defense in the battle to keep your computer safe!</div>
<div style="text-align: justify;">
<br /></div>
<h4>
<span style="color: #3d85c6;">Is Web of Trust Perfect?</span></h4>
<div>
<br /></div>
<div style="text-align: justify;">
Of course it isn't perfect and it can't prevent you from going to bad sites if you choose to ignore the warning. We installed this on a customer's computer that was recently infected and cleaned up. After getting their computer back the customer called to explain that Web of Trust was giving a red light on a particular page that they liked to visit. It was a trustworthiness and privacy warning but the customer insisted that they wanted to visit that page. A few days later the computer was back in for a virus!</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Web of Trust is not a replacement for an anti virus software, it's simply one more layer of security. If you've been using an anti virus software and find yourself getting infected perhaps you might want to consider a <a href="http://bluelinenetworksolutions.com/images/managed-av.pdf" target="_blank">smarter anti virus solution</a>, one that is actually monitored by professionals to make sure it's working! We also highly suggest that our customers consider backing up their data on a regular basis. A great solution is a <a href="http://bluelinenetworksolutions.com/blueline-services/online-cloud-based-data-backup" target="_blank">cloud based backup</a> that simply operates in the background so you don't have to worry about it. This way, if you do get a virus you can be sure that your music, movies, pictures and documents are safe and sound.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<span style="font-size: x-small;">Blueline Network Solutions is a computer sales, service and repair facility providing service to consumers, businesses and educational institutions. We can be contacted at (888) 748-2583 or by visiting our <a href="http://bluelinenetworksolutions.com/" target="_blank">website</a>.</span></div>Shop Blueline Network Solutionshttp://www.blogger.com/profile/14807736692740066555noreply@blogger.com0tag:blogger.com,1999:blog-7617386339955168026.post-15410449397509747482012-03-14T07:07:00.000-05:002012-03-14T07:07:50.083-05:00<span style="color: #3d85c6; font-size: large;">Your own personal cloud...</span><br />
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Over the past few years we've heard more and more about "the cloud". At first it seemed to be some sort of mythical, magical wonderland but the truth is that the cloud is just the internet. I say "just the internet" as if it means nothing but the internet is of course much bigger than that. <a href="http://mbaonline.com/" target="_blank">Mbaonline</a> recently posted an Infographic detailing a <a href="http://www.mbaonline.com/a-day-in-the-internet/" target="_blank">day in the life of the internet</a> that demonstrates just how much we use the web! It's a pretty amazing graphic with some interesting statistics (daily iPhone sales outpace daily birth rates!).</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Looking at the article got me thinking about the internet, the cloud and about how we access our personal data. Whether we realize it or not, many of us are developing our own personal cloud. Each day the use of web connected smart phones and tablet devices is growing as people are recognizing the value in staying connected. Companies like <a href="http://www.evernote.com/" target="_blank">Evernote</a> have developed great applications that let us share notes between devices and access them anywhere we like. Apple and Google both give users the ability to store music on the web instead of their home computer and access it from anywhere we like.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
For our company, we use an application to provide a cloud based backup of our critical files and data (if you aren't backing your info up to the cloud you really should consider it). This particular product also gives us the ability to provide our staff and customers with a "Cloud Drive" on their computers. The Cloud Drive acts like any storage device (hard drive, USB flash drive, etc...) and lets you drag and drop files to it for storage. No matter where you are, as long as you have an internet connection you can access the files from any device including smart phones, tablets and traditional computers. I often use it for storing information I may need for a meeting. That way, I have it available to me at any time! One of our customers uses it to allow their marketing team to save information to it so that the sales team can access the information anytime, anywhere on their tablets.</div>
<br />
So just how are you using the cloud and what does your personal cloud contain? Music, photos, video, what else? If you give it some thought you might be surprised at how much you use "the cloud".Shop Blueline Network Solutionshttp://www.blogger.com/profile/14807736692740066555noreply@blogger.com0tag:blogger.com,1999:blog-7617386339955168026.post-52632876910926263592012-03-10T09:25:00.001-06:002012-03-10T09:26:37.636-06:00Gone Phishin'<div style="text-align: justify;"><span style="font-family: 'Helvetica Neue', Helvetica, sans-serif; line-height: 19px;"><span style="color: #999999;"><span style="font-size: 14px;">Sadly, that's not a "typo" in the title, but a reference to a nasty little practice that some folks have of trying to get you to visit a malicious site and give up your personal information. According to Wikipedia, "<a href="http://en.wikipedia.org/wiki/Phishing">Phising</a> is a way of attempting to acquire information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication." </span></span></span></div><div style="text-align: justify;"><span style="font-family: 'Helvetica Neue', Helvetica, sans-serif; line-height: 19px;"><span style="color: #999999;"><span style="font-size: 14px;"><br />
</span></span></span></div><div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 19px; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><div style="text-align: justify;"><span style="color: #999999;">Most often, your e-mail is the primary target for phishing scams although various social networking sites are sometimes utilized by scammers to make posts with links to the offending site. You can't really blame your e-mail client, ISP or favorite social networking site, these</span><span style="color: #999999;"> messages arrive with professional-looking logos and legitimate looking documentation that’s extremely convincing. All that's required to spring the trap is for you to follow the link they provide!</span></div></div><div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 19px; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><div style="text-align: justify;"><span style="color: #999999;">Clicking the link may take you to a very legitimate looking site that asks you to confirm your login information, social security numbers, passwords, etc... In fact, some phishing attempts have become so sophisticated that they can send you to a legitimate site (a bank for example) and then generate a pop-up window that asks you to confirm your information. In this case, the main page underneath the pop-up is a legitimate site, the pop-up is the actual scam!</span></div></div><div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: 'Helvetica Neue', Helvetica, sans-serif; line-height: 19px; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span style="color: #3d85c6; font-size: large;">So how can you avoid phishing scams?</span><br />
<div style="font-size: 14px;"><span style="color: #999999;"><br />
</span></div><div style="font-size: 14px;"><span style="color: #999999;">If you receive an e-mail asking you to visit a Web site, you can find out who’s behind the message by checking the sender’s e-mail through WHOIS, before you click anything! Here’s how to do it:</span></div></div><ol style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 19px; margin-bottom: 10px; margin-left: 40px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><li style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span style="color: #999999;">DO NOT CLICK THAT LINK!</span></li>
<li style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span style="color: #999999;">Hover your mouse over the link and copy the domain for the address that your e-mail client (Outlook for example) displays. If you can't click inside the address box and highlight it, copy it down on a piece of paper. The <em style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;">domain</em> is the component that is in front of dot com. For instance, the domain for http://bluelinenetworksolutions.com/ is bluelinenetworksolutions .</span></li>
<li style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span style="color: #999999;">Point your Web browser to http://www.whois.net.</span></li>
<li style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span style="color: #999999;">Enter the domain from the e-mail’s link in the WHOIS Lookup control and click Go.</span></li>
<li style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span style="color: #999999;">WHOIS will display details about the site, including the company or person who registered it.</span></li>
</ol><div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 19px; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><span style="color: #999999;">If your e-mail’s supposedly from a bank or legitimate institution but is registered to some company you never heard of, or even an individual out of the country, chances are this is a phishing attempt! Do yourself a favor and don't take the bait!</span></div><div style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;"><div style="font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><span style="color: #999999;">It's possible that the info you receive from WHOIS still doesn't provide you with the answer that you need. In that case, try to track down the phone number or actual website address for the company and see if things are legitimate. I remember a recent e-mail I received where all of the information was credible except for a phone number that was provided in the e-mail. When I tracked the legitimate company down I found out that they were aware of the scam being perpetrated in their name and an investigation was underway!</span></div><div style="font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 19px;"><span style="color: #999999;"><br />
</span></div><div style="font-family: 'Helvetica Neue', Helvetica, sans-serif; line-height: 19px;"><span style="color: #3d85c6; font-size: large;">A few tips for avoiding phishing scams are:</span></div><br />
<ul><li><span style="color: #999999; font-family: 'Helvetica Neue', Helvetica, sans-serif;"><span style="font-size: 14px; line-height: 19px;">If you receive an e-mail asking you to confirm information for your bank, credit card company, etc.. and it contains a link, don't follow the link. Close the e-mail and visit your bank's site the way you normally would.</span></span></li>
<li><span style="color: #999999; font-family: 'Helvetica Neue', Helvetica, sans-serif;"><span style="font-size: 14px; line-height: 19px;">Always make sure you are entering private information in on a secure website. These sites start with "https://" and a small "lock" icon will appear to confirm that the site is secure. If you click the lock icon the site's security information will come up and you can see who it is registered to.</span></span></li>
<li><span style="color: #999999; font-family: 'Helvetica Neue', Helvetica, sans-serif;"><span style="font-size: 14px; line-height: 19px;">Keep a close watch on the actual url of the site that you are at. For example, the text may say one thing but the link may lead you someplace else. In otherwords, if the link is supposed to go to "www.myfavoritebank.com" but the address in the toolbar says "www.yougotphished.com" then you need to get out fast!</span></span></li>
</ul><span style="color: #999999; font-family: 'Helvetica Neue', Helvetica, sans-serif;"></span><br />
<div style="text-align: justify;"><span style="color: #999999; font-family: 'Helvetica Neue', Helvetica, sans-serif;"><span style="color: #999999; font-family: 'Helvetica Neue', Helvetica, sans-serif;"><span style="font-size: 14px; line-height: 19px;">If you'd like more information on how you can avoid phishing attacks, the FTC has published an article that can be found <a href="http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.shtm">HERE</a>. If you'd like more information on Blueline Network Solutions please feel free to visit our website at <a href="http://bluelinenetworksolutions.com/">http://bluelinenetworksolutions.com</a> or check us out on Facebook at </span></span><a href="https://www.facebook.com/Shopblueline">https://www.facebook.com/Shopblueline</a>.</span></div></div>Shop Blueline Network Solutionshttp://www.blogger.com/profile/14807736692740066555noreply@blogger.com1tag:blogger.com,1999:blog-7617386339955168026.post-31634430173477814522012-02-23T15:06:00.000-06:002012-03-14T05:44:45.621-05:00<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEib4lNavBFqv2YTo_DNLi23mzm68berWe-8hi5yZyYlLVnzF0eovYWMBJC74TN-SBfaff-JZCtbhcrfwUCHkwCHEMYcCjNVUNbC2RCOLbTgXaFvOH3VAh763QhrZEIYE0rZGj-2mM5ke61i/s1600/binocular-guy3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEib4lNavBFqv2YTo_DNLi23mzm68berWe-8hi5yZyYlLVnzF0eovYWMBJC74TN-SBfaff-JZCtbhcrfwUCHkwCHEMYcCjNVUNbC2RCOLbTgXaFvOH3VAh763QhrZEIYE0rZGj-2mM5ke61i/s1600/binocular-guy3.jpg" /></a></div>
<br />
<span style="color: #3d85c6; font-family: inherit; font-size: large;"><b>Why Should You Consider a Managed Anti-Virus Solution.</b></span><br />
<span style="font-family: inherit;"><br />
</span><br />
<div class="MsoNormal" style="margin-left: 4.5pt; mso-pagination: none;">
<span style="color: #cccccc; font-family: inherit; text-align: justify;">Technorati Blog Claim: </span><span style="font-family: Calibri, sans-serif; font-size: 11pt;">WVZ37KR2VK6G </span><br />
<span style="font-family: Calibri, sans-serif; font-size: 11pt;"><br /></span><br />
<span style="color: #cccccc; font-family: inherit; text-align: justify;">Every minute counts in today’s business. Stop wasting your valuable and scarce IT resource time and energy on the selection, testing, planning, deployment, updating and reporting of your Anti-virus software. </span><span style="color: #cccccc; font-family: inherit; text-align: justify;">Managed Anti Virus service provides the skilled IT resources, domain expertise, centralized monitoring and </span><span style="color: #cccccc; font-family: inherit; text-align: justify;">management facilities and proactive approach to ensuring the protection of your desktops and laptops against the ever present</span><span style="color: #cccccc; font-family: inherit; text-align: justify;"> </span><span style="color: #cccccc; font-family: inherit; text-align: justify;">threat of viruses, spam and malware attacks.</span></div>
<div class="MsoNormal" style="margin-left: 4.5pt; text-align: justify;">
<span style="color: #cccccc; font-family: inherit;"><br />
</span></div>
<div class="MsoNormal" style="margin-left: 4.5pt; text-align: justify;">
<span style="color: #cccccc; font-family: inherit;">A managed Anti-virus solution can provide you with the peace of mind of knowing that your system is up to date, that scans are being run when they are supposed to be, and that a trained IT expert is looking out for your security. You no longer have to worry that someone may have disabled their Anti-virus software because it was "scanning while they were working" or wonder if they latest security updates have been downloaded and properly installed.</span><br />
<span style="color: #cccccc; font-family: inherit; font-size: 11px;"><br />
</span></div>
<div class="MsoNormal" style="margin-left: 4.5pt; text-align: justify;">
<span style="color: #3d85c6; font-family: inherit;"><b>Advantages of a Managed Anti-Virus</b></span></div>
<div class="MsoNormal" style="margin-left: 4.5pt; text-align: justify;">
<span style="font-family: inherit;"></span><br />
<div style="color: #cccccc;">
<span style="font-family: inherit;">• Provides proactive & comprehensive security, monitoring and management</span></div>
<div style="color: #cccccc;">
<span style="font-family: inherit;">• Centralizes the deployment and updating of software to ensure coverage and consistency</span></div>
<div style="color: #cccccc;">
<span style="font-family: inherit;">• Automates management processes to avoid errors and reduce costs</span></div>
<div style="color: #cccccc;">
<span style="font-family: inherit;">• Leverages expert IT skills</span></div>
<div style="color: #cccccc;">
<span style="font-family: inherit;"><br />
</span></div>
<div style="color: #cccccc;">
<span style="font-family: inherit;">The truth is that having a better anti-virus solution is really just the tip of the iceberg in terms of the benefits that you receive. A fully managed anti-virus solution also delivers advanced business solutions such as:</span></div>
<br />
<ul>
<li><span style="font-family: inherit;"><b><span style="color: #6fa8dc;">Enterprise Class Solution</span></b><span style="color: #cccccc;"> - Encompassing more than just anti-virus, this solution supports full endpoint security, providing you with an enterprise class method to combat viruses, malware, trojans and other malicious software.</span></span></li>
<li><span style="font-family: inherit;"><b><span style="color: #6fa8dc;">Comprehensive Reporting</span></b><span style="color: #cccccc;"> - A wide range of detailed reports are provided to ensure you have visibility into what is happening and assurance that you are protected.</span></span></li>
<li><span style="font-family: inherit;"><b><span style="color: #6fa8dc;">Fully Monitored System</span></b><span style="color: #cccccc;"> - We monitor the software to ensure it is working, has the latest virus definitions and we'll act immediately if there is an issue, potentially saving you from an attack.</span></span></li>
<li><span style="font-family: inherit;"><b><span style="color: #6fa8dc;">Network Health Monitoring Included</span></b><span style="color: #cccccc;"> - We monitor the health of your network, servers and workstations with daily maintenance checks including memory, processor and drive usage to proactively discover issues before they impact your business.</span></span></li>
<li><span style="font-family: inherit;"><b><span style="color: #6fa8dc;">Centralized management</span></b><span style="color: #cccccc;"> - Each machine is kept up to date directly from a centralized server. You no longer have to rely on end -users to manage their anti-virus.</span></span></li>
</ul>
<div style="color: #cccccc;">
<span style="font-family: inherit;"><br />
</span></div>
<div style="color: #cccccc;">
<span style="font-family: inherit;">While the list of features and benefits that a managed Anti-virus solution provide to your business is huge, the price is generally not much more than you are probably paying for your current Anti-virus solution. Here at Blueline Network Solutions we provide a managed Anti-virus solution not only to our business customers, but to our residential ones as well. Viruses are getting smarter and smarter everyday, isn't it about time your Anti-virus solution got smarter too?</span></div>
<div style="color: #cccccc;">
<span style="font-family: inherit;"><br />
</span></div>
<br /></div>
<br />
<span style="color: #cccccc; font-family: inherit;">If you'd like more information on how a managed Anti-virus solution can benefit your home or business, feel free to<a href="http://bluelinenetworksolutions.com/"> visit our website</a> or give us a call at (<b>888) 748-BLUE.</b></span><br />
<span style="color: #444444;"><br />
</span><br />
<br />
<div class="MsoNormal">
<span style="color: #666666; font-family: Tahoma, sans-serif; font-size: x-small;"><br />
</span></div>
<div class="MsoNormal">
<span style="color: #666666; font-family: Tahoma, sans-serif; font-size: x-small;"><br />
</span></div>Shop Blueline Network Solutionshttp://www.blogger.com/profile/14807736692740066555noreply@blogger.com0tag:blogger.com,1999:blog-7617386339955168026.post-7670736339708356282011-10-16T09:17:00.000-05:002011-10-16T09:27:53.360-05:00Data Backup - Can you continue to ignore it?<div style="text-align: justify;">Data Backup. The 400lb gorilla in your IT strategy that nobody wants to talk about. Data backup is one of the single most critical aspects of any IT strategy and it is often overlooked, ignored, misunderstood and mismanaged. Perhaps most businesses don't pay attention to it because it isn't something we use on a daily basis. When the e-mail goes down or when we can't access a critical application we notice immediately, but backing that data up is something a lot of people just assume is being done properly. Sadly, we see businesses every week that have major backup and recovery problems. The hidden costs for managing a tape or hard disk based backup solution are unbelievably high. <b>Backup is critical and it is not an overstatement to say that a successfully recovered backup could save your business.</b></div><br />
<div style="text-align: center;"><b>What you need to know about your data backup and recovery strategy</b></div><br />
<ul><li style="text-align: justify;"><span class="Apple-style-span" style="color: #6fa8dc;">It’s not about the Backup. It’s about the RECOVERY</span> - You can backup every spec of information on your computer but if you can't recover it then you may as well have not backed it up in the first place. Regular testing of your backups to recover files is critical. We suggest testing miscellaneous files every 30 days and full server/system recoveries twice a year (you are doing full server backups right?)</li>
</ul><ul><li style="text-align: justify;"><span class="Apple-style-span" style="color: #6fa8dc;">Affordability</span> - The IT world is growing and evolving quicker than any other industry. New technologies are constantly coming out that may lower operational costs or open up formerly cost prohibitive techniques. We suggest an annual review of your IT strategy as a whole, including your backup and recovery process.</li>
<li style="text-align: justify;"><span class="Apple-style-span" style="color: #6fa8dc;">Lose the Tape Drives</span> - If ever there was an outdated technology that deserves to be put out to pasture it's tape drives. We see 3-4 times the number of problems with tape based backups as compared to alternative solutions and consequently, a much higher cost to maintain a tape based system. The tapes themselves have a relatively short shelf life (6-12 months) and are affected by environmental conditions like heat, humidity and magnetic interference.</li>
</ul><ul><li style="text-align: justify;"><span class="Apple-style-span" style="color: #6fa8dc;">Local as well as remote backup</span> - The best backup and recovery strategies include the use of local backup for quick, easy recovery as well as offsite or remote backup in the event of a catastrophe. Offsite and secure copies of your data should be readily accessible in the event of a disaster situation or in the event a critical server failure.</li>
</ul><div><div><ul><li style="text-align: justify;"><span class="Apple-style-span" style="color: #6fa8dc;">Are you backing up everything you need and is it recoverable</span> - Too often we are called to restore data only to find out that it is not recoverable because backup procedures were not followed; often because of lack of training or expertise. This is especially prevalent with SQL (and other) data base products as well as Exchange and other email systems. These systems typically require specialized backup procedures in order to ensure complete backup and recoverability of data.</li>
</ul></div></div><div><div><ul><li style="text-align: justify;"><span class="Apple-style-span" style="color: #6fa8dc;">What if a server goes down</span> - For some of us, each hour of down time comes at a high cost. In some backup plans, even in the best of circumstances, the company can expect a day or more down with the solutions they have in place. Technologies such as server virtualization can often be used to get your systems back up and running in a few hours or less, as opposed to a day or more. Some companies even feel the need to implement a spare server on site.</li>
</ul></div></div><div><div><ul><li style="text-align: justify;"><span class="Apple-style-span" style="color: #6fa8dc;">Data Retention and Archiving</span> - How long are you retaining your data for and how many copies of that data? We've seen some companies that implement a backup solution that simply overwrites the previous backup but what if you need an older copy of a file? Proper solutions should maintain numerous instances of your data and allow you to select which specific instance of a file or files you would like to restore. Additionally, many businesses require archiving of older data as well. Certain businesses may be required to retrieve data that is 10 or more years old. Understanding the rules and regulations that may affect your data retention policies is critical.</li>
</ul></div></div><div><div><ul><li style="text-align: justify;"><span class="Apple-style-span" style="color: #6fa8dc;">Is once a day enough</span> - Many businesses follow a very traditional procedure of "nightly backups". For some businesses this may be perfectly acceptable but what happens in the event of a power outage or a failed backup? Is a full day's worth of data loss going to affect your business? Many new technologies can allow for files to be backed up within minutes of changes taking place to them, assuring your business of up to the minute data backup.</li>
</ul></div></div><div><div><ul><li style="text-align: justify;"><span class="Apple-style-span" style="color: #6fa8dc;">Backed up data needs to be secure (encrypted)</span> - Maybe your business is regulated by various government policies that mandate your data be secure and encrypted or perhaps you're simply concerned that the private information on your system be kept private (and you should be!). In the event of a lost or stolen tape or drive, it is imperative that the information on that medium stays safe and secure, especially if your backup data contains information which is considered protected (i.e., name and social security number or patient health information</li>
</ul></div></div><div><div><ul><li style="text-align: justify;"><span class="Apple-style-span" style="color: #6fa8dc;">Write it down</span> - Any process or procedure is only as good as the paper it is written on. Your backup and recovery policy needs to be clearly documented included a list of who is responsible for everything from backing the data up, monitoring the backup to ensure that it is taking place and testing the recovery process on a regularly scheduled basis.</li>
</ul><div><div><br />
</div><div style="text-align: justify;">If all of this sounds like a lot of information, it is. The fact of the matter is that implementing a proper backup strategy requires planning, expertise, monitoring and testing. If you are unable or unwilling to commit the resources to do it properly then consider having someone do it for you. Most Managed Service Providers (MSP's) can handle the entire process including providing offsite storage, encryption and more. Typically the monthly cost for this type of service are probably less than you would pay an employee to handle all of these tasks and you have the peace of mind of knowing that the procedures are being performed by trained experts. Most MSPs can provide weekly and monthly reports and reviews that document their monitoring, backup and recovery tests performed.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">If you would like to know more about data backup procedures and Managed services in general give us a call at 888.748.BLUE (2583) or visit us at www.shopblueline.com.</div></div></div></div><div><br />
</div><div><br />
</div><div><br />
</div><div><br />
</div><div><br />
</div><div><br />
</div><div><br />
</div><div></div>Shop Blueline Network Solutionshttp://www.blogger.com/profile/14807736692740066555noreply@blogger.com0tag:blogger.com,1999:blog-7617386339955168026.post-32732687013136055462011-10-04T06:06:00.000-05:002011-10-04T06:06:01.994-05:00Patch Management - Who's Minding Your Network?<div style="text-align: justify;"><span class="Apple-style-span" style="font-family: sans-serif;"><span class="Apple-style-span" style="line-height: 19px;">A <b>patch</b> is a piece of software designed to fix problems with, or update a computer program, operating system or its supporting data. This includes fixing security vulnerabilities and other bugs, and improving the overall usability and performance. Though meant to fix problems, poorly designed or improperly managed patches can sometimes introduce new problems.</span></span></div><div style="text-align: justify;"><span class="Apple-style-span" style="font-family: sans-serif;"><span class="Apple-style-span" style="line-height: 19px;"><br />
</span></span></div><div style="text-align: justify;"><span class="Apple-style-span" style="font-family: sans-serif;"><span class="Apple-style-span" style="line-height: 19px;">Patch management is the <b>process</b> of using a <b>strategy</b> and <b>plan</b> of what patches should be applied to which systems at a specified time. <span class="Apple-style-span" style="color: #3d85c6;">The key works here are Process, Strategy and Plan.</span> Without all of these in place you aren't performing patch management, you are simply installing (or not installing) patches without knowing what effect they will have on your network. A typical patch management strategy should look like this:</span></span></div><span class="Apple-style-span" style="background-color: white; font-family: sans-serif; line-height: 19px;"><span class="Apple-style-span" style="font-family: 'Segoe UI', Verdana, Arial; line-height: normal;"></span></span><br />
<ul><li><span class="Apple-style-span" style="color: #3d85c6;"><strong>Detect</strong>.</span> Use tools to scan your systems for missing security patches. The detection should be automated and will trigger the patch management process.</li>
<li><span class="Apple-style-span" style="color: #3d85c6;"><strong>Assess</strong>.</span> If necessary updates are not installed, determine the severity of the issue(s) addressed by the patch and the mitigating factors that may influence your decision. By balancing the severity of the issue and mitigating factors, you can determine if the vulnerabilities are a threat to your current environment.</li>
<li><span class="Apple-style-span" style="color: #3d85c6;"><strong>Acquire</strong>.</span> If the vulnerability is not addressed by the security measures already in place, download the patch for testing.</li>
<li><span class="Apple-style-span" style="color: #3d85c6;"><strong>Test</strong>.</span> Install the patch on a test system to verify the ramifications of the update against your production configuration.</li>
<li><span class="Apple-style-span" style="color: #3d85c6;"><strong>Deploy</strong>.</span> Deploy the patch to production computers. Make sure your applications are not affected. Employ your rollback or backup restore plan if needed.</li>
<li><span class="Apple-style-span" style="color: #3d85c6;"><strong>Maintain</strong>.</span> Subscribe to notifications that alert you to vulnerabilities as they are reported. Begin the patch management process again.</li>
</ul><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Unfortunately most businesses and even many IT Service Providers have no formal process for patch management.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">A critical step in our process when we evaluate a company's IT infrastructure is a complete Network Assessment. One of the things we look at during this assessment is how the patches are being managed. The two most common methods we see are "download and install automatically" and "do not download or install patches and updates." Sometimes it is hard to determine which of the two methods is worse! </div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Potential clients will often tell us they don't download the updates/patches because "everything worked fine when the server/workstations were setup so we don't want any changes". New bugs, threats and vulnerabilities are discovered everyday and applying patches and updates to protect against these is critical. Ignoring them and allowing your system to go unpatched is a recipe for disaster. We also have potential clients that simply allow updates to be installed at random, as they are made available. Doing this on a live system can often result in problems when patches do not install properly or worse, when a patch or update is not compatible with an application that you may be running or when servers reboot overnight during an update and fail to come back online in the morning.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Patch management is one of the most critical and most overlooked and misunderstood aspects of maintaining a stable network environment. Most Managed Service providers offer a basic patch management program as a stand alone option (as well as bundled with more complete services) that is very affordable. When properly performed, patch management will provide you with a safe, secure and stable network environment. We encourage all of our clients and potential clients to periodically evaluate their patch management process and make changes where they are needed.</div><div style="text-align: justify;"><br />
</div><div><br />
</div>Shop Blueline Network Solutionshttp://www.blogger.com/profile/14807736692740066555noreply@blogger.com0tag:blogger.com,1999:blog-7617386339955168026.post-31965675736994914522011-09-11T19:58:00.000-05:002011-09-11T19:58:06.911-05:00Managed Services vs. Traditional IT Service<div class="MsoNormal" style="text-align: justify;">Traditionally, computers and printers get fixed after they are broken. Typically, while you or your staff is busy working, a problem occurs that prevents someone, or everyone, from doing their job. You place a phone call to a local IT Service provider and hopefully they are able to get out there in the next few hours, but you may have to wait until the following day...</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;">The technician shows up and begins working on resolving the problem. In the meantime, your business is not being as productive as it should. With luck, the technician had things back together in a few hours and you get a bill for the work that was done. <b>In most areas this will range from $100-150 an hour</b> but could be more or less, especially if it was an emergency or priority response. </div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;">So to recap things, something on your network broke, it cost you time and labor because employees could not do their jobs and you also had to pay someone to come out and fix it. It really is a strange scenario when you think about it. <b>Each day you hope nothing goes wrong so that you don't have to pay a technician to come out, and each day they plan on something going wrong so that they can make a living...</b></div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><span class="Apple-style-span" style="color: #3d85c6; font-size: large;"><b>Why not think differently? </b></span></div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;">When you get in your car and head to work, or to the store, your car warns you of potential problems. If you're low on oil, the check oil light comes on. If your coolant system isn't doing the job the temperature light comes on. Even that old smoke detector in your basement beeps when it senses that the battery is low. Your computer systems on the other hand, they just fail with no warning and leave you scrambling for a solution.</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;">A Managed Service Provider (MSP) is someone who thinks differently about your network. The break-fix mentality of the past is turned upside down and instead, an MSP makes money by keeping your network running smoothly. In this scenario an MSP charges a fixed monthly fee to service your network. The value of this service is far greater than simply fixing a computer when it goes down.</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"> A quality Managed Service Program is a proactive service, not a reactive one. This means that the smoother and more efficiently the MSP can keep your systems up and running, the more profitable they become. Typical MSPs provider constant 24x7 monitoring of your entire network, monitor and deploy security and application patches in a safe, controlled environment, provide virus updates, maintain firewalls and user permissions and many can even monitor the amount of toner in a printer and tell you when to order.</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;">As a business owner or manager, your overall IT costs are reduced and put into a single, manageable monthly fee. Your staff is more productive since your network and systems are healthy and maintained. Servers, desktops and network components are kept updated and security threats are significantly reduced. A recent study determined that an average business class desktop computer costs 60% less to have managed through an MSP than it does to have fixed when it breaks. Typical benefits of implementing a managed Service Program also include:</div><div class="MsoNormal" style="text-align: justify;"></div><ul><li><span class="Apple-style-span" style="color: #3d85c6;">Lower Total IT Costs:</span> Through a regular monthly fee that covers all preventative and proactive maintenance for client machines, total IT costs are lowered.</li>
<li><span class="Apple-style-span" style="color: #3d85c6;">Reduced Hidden Costs and Increased Staff Productivity:</span> Because client PCs and servers are stable and secure, with fewer disruptions or breakdowns, your staff will have more time to be productive. Additionally, incidents such as data loss, failed backups and corrupt database files can be virtually eliminated.</li>
<li><span class="Apple-style-span" style="line-height: 18px;"><span class="Apple-style-span" style="color: #3d85c6;">Greater IT Cost Predictability: </span>With a fixed monthly fee that covers monitoring, preventative maintenance, and unlimited remote support, clients know their exact IT costs per month and can budget accordingly.</span></li>
</ul><br />
<div class="MsoNormal" style="text-align: justify;">Not sure if Managed Services are for you? Perhaps your business is too small? <b>Think again, Eric Goodness, Vice President of the Gartner research firm predicts that by 2014, 90% of all North American companies will be using a remote infrastructure managed service.</b> The size of your company will directly determine the price an MSP charges, a company with 10 computers is going to pay significantly less than one with 50 computers.</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;">If you'd like to learn more about Managed Services or if you're simply in the market for some new computing equipment, visit our website at <a href="http://www.shopblueline.com/">www.shopblueline.com</a>.</div><div class="MsoNormal" style="text-align: justify;"><br />
</div><div class="MsoNormal" style="text-align: justify;"><span id="goog_1748016407"></span><span id="goog_1748016408"></span></div><div class="MsoNormal" style="text-align: justify;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpW1oDczeSW8bZANR4qitfiTRm_pHp9PNf-TmPEnmmSKYnJ1Xxo-VO3HbR1RSeQjyBGAI9Qi8b0rfngD_RuniAJeOjblsyNzg3BFSv3yyKD6v0-J91HPNiQ4bblrz35_0quadfLnJhtq7E/s1600/blue-care-banner-new.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="94" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpW1oDczeSW8bZANR4qitfiTRm_pHp9PNf-TmPEnmmSKYnJ1Xxo-VO3HbR1RSeQjyBGAI9Qi8b0rfngD_RuniAJeOjblsyNzg3BFSv3yyKD6v0-J91HPNiQ4bblrz35_0quadfLnJhtq7E/s640/blue-care-banner-new.jpg" width="640" /></a></div><br />
</div>Shop Blueline Network Solutionshttp://www.blogger.com/profile/14807736692740066555noreply@blogger.com0tag:blogger.com,1999:blog-7617386339955168026.post-65940986077050275822011-08-29T07:30:00.000-05:002011-08-29T07:30:46.474-05:00Power Supplies - A Blueline Advantage<div style="text-align: justify;">To the average consumer, the power supply is probably the single most overlooked and misunderstood component. We all look at "ram" and "storage" and "gigahertz" and we assume that's all we need to know, but when it's all said and done, your computer is only as good as the power supply it is using.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>What's the difference?</b></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">Most large computer manufacturers use extremely low end, low cost power supplies in an effort to increase profits. A low quality power supply, or PSU, can significantly impact your computer's stability and overall longevity. They can contribute to excessive heat, unstable voltages and lack of appropriate power while performing more demanding tasks. Additionally, if you ever upgrade your computer you may find that the power supply is incapable of handling the increased power requirements. A high quality PSU provides good clean power to the system even under full load, runs cooler and helps exhaust excess heat out of the computer and leads to a more stable system with fewer "crashes" and a more pleasant user experience.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>Don't larger PSU's cost more to run?</b></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">This is a very common misconception. Your computer will require a certain amount of electricity in order to run. This will vary depending on if you are simply browsing the internet or performing a more demanding task such as watching a movie or playing a game. While a larger PSU is capable of providing more power, it only provides the power required by your computer at the time. So if you have a 400 Watt PSU and your computer needs 200 Watts, the PSU delivers 200 Watts.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>What about efficiency?</b></div><div style="text-align: justify;"><b><br />
</b></div><div style="text-align: justify;">Power supply efficiency plays a huge role in terms of your cost to run the computer and as a general rule, the quality of the PSU. Typical computer power supplies are in the 60-65% efficiency range. What this means is that the power supply transfers 60-65% of the power it takes from the outlet into your computer. In other words, a computer that requires 250 Watts of electricity to run will actually use 384 Watts of electricity if it has a 65% efficient PSU. That same computer, using an 80% efficient PSU will require roughly 312 Watts to run.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><b>Blueline Power...</b></div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">At Blueline Network Solutions we're in the business of making sure our customer's systems are running optimally at all times. We firmly believe that a quality PSU can have a huge impact on your computer's stability and overall computer experience. <b>That's why all Blueline "P Series" computers (<a href="http://blueline.corecommerce.com/PC-s-Laptops-and-Servers/Desktop-Computers/Business-Systems/Blueline-Sapphire-P-400-Desktop.html">Sapphire P-400</a> and <a href="http://blueline.corecommerce.com/PC-s-Laptops-and-Servers/Desktop-Computers/Business-Systems/Blueline-Cobalt-P-500-Desktop.html">Cobalt P-500</a>) as well as Blueline <a href="http://blueline.corecommerce.com/PC-s-Laptops-and-Servers/Servers/Business-Servers/Proline-S-400-Business-Server.html">Servers</a> and <a href="http://blueline.corecommerce.com/PC-s-Laptops-and-Servers/Desktop-Computers/Gaming-Systems/">Indigo</a> gaming systems include high quality, 80 Plus Certified power supplies.</b> The 80 Plus certification is an independent, ENERGY STAR rating for computer power supplies. Furthermore, many of the optional, more powerful power supplies that we offer are even more efficient. What this means to you is that a Blueline P-Series, Server or Indigo gaming computer cost's less to run than similarly equipped machines from other manufacturers. It also demonstrates our absolute commitment to delivering the finest quality computing solutions to our customers.</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;">To learn more about Blueline Network Solutions and the quality computing solutions we provide visit our website at <a href="http://www.shopblueline.com/">www.shopblueline.com</a></div>Shop Blueline Network Solutionshttp://www.blogger.com/profile/14807736692740066555noreply@blogger.com0