Category Archives: Featured

What’s Your Exit Strategy?

Do you have an exit strategy in place to address the unexpected when it comes to an IT failure? What is you exit strategy in case of a fire, flood or natural disaster? What if your computer crashes tomorrow morning or a virus wipes out all data? Would you be able to effectively cope with this situation and its potential affect on your business? Perhaps you should start thinking about one, if you don’t have a plan in place to handle these types of unexpected events.

The key is to plan ahead for the unexpected, the more prepared you can be for these situations the less likely it will be that the impact will be severe and disrupt your business for any length of time.

Last but not least, remember to have an exit strategy in place to protect your mission critical data, whether it is customer records, emails or confidential business documents. To have your data available is priceless!

Information Security Basics

How Strong is Your Information Security Program?

Traditionally, documented security policies have been viewed as nothing more than a regulatory requirement. While this may have been true in the past, building a strong information security program (ISP) is a business imperative as you fight to keep the customers you have and work to attract new ones. Your information security policies can either work to help you grow your business or signal a red flag that security is not a top priority.

No matter how strong your security posture is now, if you don’t document it, it won’t last. You must assume that people instrumental in building your security environment will eventually move on. In that respect, training the replacement is a lot less painful and much more effective with a written guide. Without a policy manual, the new employee would eventually learn what to do but would you really want to risk a security incident while they are trying to figure it out?

It’s important to understand that there is no procedure, policy, or technology that will ever be 100% secure. It just doesn’t exist. You can, however, endeavor to get as close to perfect as possible.

Lack of a documented security policy is a huge red flag when determining liability in the event of an incident. You do not know when the next attack will happen and if someone is aggressively targeting you, they will cause pain. When it comes time to defend yourself, no matter the strength of your security environment, the lack of a documented information security program is a message that management has not taken data security seriously. This perception becomes increasingly dangerous when we’re talking about a court of law and an untold number of potential customers in the court of public opinion.

Whether you are currently without a policy or want to ascertain where yours fits along the continuum, here are key components that should be in a best practices ISP.

Information Security Best Practices: The Information Security Officer

The first thing that any security program must do is establish the presence of the Information Security Officer. Depending on the size of your security environment, this could be a full-time position or a current employee who has the availability to take on further duties.

Besides the time element, the organization must clearly define the expectations of the Information Security Officer and determine if an individual is capable to fill the role. During a later post I will describe the attributes that ascertain “capability”, but the complete lack of someone in this role means that information security is not a priority in your organization.

Information Security Best Practices: End User Acceptable Use Guidelines

Your policy should contain specific language detailing what employees can do with “your” workstations. While we hope that all company property is used for company purposes, this just isn’t the case in real life. Instruct employees as to what is considered business use and explain the risks of downloading games or using tools like instant messaging.

Information Security Best Practices: Software Updates and Patches

What’s your stance when it comes to patch management? Do you require patches and upgrades to be implemented immediately? Are you sure you’re actually doing what your policy says?

Random checks to confirm you are following your own rules is the best way to monitor the activity.

If you’re scratching your head at my use of the phrase “patch management”, understand that if you don’t keep up to date on your system patches and upgrades, you leave yourself wide open for the most basic of hacks. If you never update, your vulnerabilities are exponentially increased. Your best practices Information Security Program should clearly document your patch management procedures and frequency of the updates.

Information Security Best Practices: Vendor Management

You’re only as strong as your weakest link, and when you work with third-party providers their information security downfall can become your issue. Make sure you document which vendors receive confidential information and how this information is treated when in the custody of the vendor. The lack of strict vendor guidelines could increase the risk of releasing your customers’ private information.

Information Security Best Practices: Physical Security

Documents don’t walk out of the office on their own. Having strict rules about who can physically access your offices and how they gain entry can decrease the likelihood that an unauthorized individual is present to steal information. The next step is to ensure that your policy documents how physical information is stored and destroyed.

Information Security Best Practices: Data Classification and Retention

Lessen your liability by classifying exactly what type of data you need and how long you need it. A breach is bad enough, what’s worse is if data is stolen that you didn’t need to keep or shouldn’t have had to begin with. In the case of TJX (“PCI DSS auditors see lessons in TJX data breach” TechTarget March 1, 2007), many of the credit card numbers affected had no business purpose in being kept.

Information Security Best Practices: Password Requirements and Guidelines

Your employees dread having another password to remember. The more complicated the requirements you make to ensure security, the more they decide to write them down and expose them to others. Establish a strong password policy but stay within reason for your employees. Sometimes, a little additional training as to why the policy is the way it is can be all you need to gain acceptance.

Information Security Best Practices: Wireless Networking

There is no doubt that the implementation of wireless networks has saved many organizations both time and money in comparison with traditional cabling. As you decide what type of network connectivity to adopt, understand that with increased flexibility allowed by wireless, a stronger encryption standard is required to ensure there is no abuse.

Information Security Best Practices: Employee Awareness Training

How well informed are your employees to identify or prevent a security incident? Each and every one of your employees can act as a member of your own security army with some simple training. The first step in recruiting them for the cause is to set the expectations appropriately and communicate those expectations in your policy.

Information Security Best Practices: Incident Response

Hands down, the worst time to create an incident response program is when you are actually having an incident. You can’t undo what has happened and you’re in crisis mode dealing with the after effects of the breach.

Not the time to be putting policy to paper.

Your reputation is severely at risk, and if you respond inadequately you risk making it worse with law enforcement as well as your customers. Act as if a breach is inevitable and take the time to develop the language and procedures you will use in the event of an incident to ensure you’re prepared when the time comes.

Information Security Best Practices: Annual Updates and Reporting

Don’t let all your hard work go to waste. The worst thing to do after investing time and resources into your information security program is to allow it to sit on the shelf and become obsolete. Threats and risks are changing daily and it is imperative that your policies stay up to date. Requiring an annual review, with results are reported to the Board of Directors and senior management, will help to ensure that your program remains current and can handle any future incidents.

Recovery & Vulnerability

Are You Still Not Backing up Your Data?

You should know this by now: Computers can and do fail. And nasty viruses can take down your system by creeping through your antivirus software and firewall. The problem is that you usually get no warning before it’s too late. Puff! Your data is gone.

This has happened to more than a few businesspeople. In extreme cases, it has put companies out of business. And the worst part is this: It’s completely avoidable. By backing up your data, you can retrieve all or most of what you lose.

Yes, yes, I hear some of you snickering about the hassle involved. Indeed, there is a hassle involved. But you owe it to yourself — and your business — to take stock of your backup plan (or lack thereof) by reviewing these tips.

Most Important: Back up Your Customer Databases and Payroll Records

What’s the heart and soul of your company? People have different opinions, but certainly your customer or client database has to rank high.
Inside one or two data files are all the nitty-gritty details including what they buy, when they buy, how they pay and so forth. Contact lists also are databases, and you might have yours combined with your customer list.

So, where would you be if you lost your database? How would you feel if you attempted to open your database and it wasn’t there? Not good, I’ll bet. So you should be backing up your database.

Also mission-critical for backups are your employee payroll records. You don’t want to lose the information that you have to report to the Internal Revenue Service. Your employees don’t want problems with the IRS, either. And they certainly don’t want to be paid late.

Protect Your Registry Settings

You should be backing up all of your data. But if you don’t, a third item you should have high on your priority list for regular backups is your Windows Registry. This is the huge database that tells your computer how to run. Without it, you have an expensive paperweight.
Most backup programs allow you to back up the Registry automatically. If not, you can easily do it manually. Here’s how:
• Click Start > Run.
• In the box, enter “regedit” (without the quotes). Click OK.
• In the Registry, click File > Export (or Registry > Export Registry File in Windows 98). Navigate to your backup medium. It will probably be drive E:.
• Name the file and click Save.

You don’t need to back up Windows or your applications, such as Microsoft Word. If the worst happens, you can always re-install those programs. But the information you create must be protected.

Store Your Backups Off-Site

To really be safe, the backup medium (tape, CD or DVD, etc.) should be removed from your site. If you are backing up to tape, for instance, and you leave the tape cartridge in the machine, you’ll be protected if the hard drive fails. But if the equipment is stolen, or the office burns to the ground, the backup will be lost.

The safest procedure is to use a different tape or disk each day. Keep all but the current day’s media off-site — at your home, perhaps.

Forget About Doing Backups With Floppies

The earliest backup medium was the floppy. These are no longer practical. They hold only 1.4 megabytes of data, so a large collection would be needed for a backup. You would have to sit at the computer for hours, swapping the floppies in and out. Don’t even think about it.
Tape has been the medium of choice for a number of years. Tape backups are relatively slow, but the process can be automated. You can schedule the backup for when you’re sleeping.

Tape drives have a capacity of 10 to 40 gigabytes, with the data uncompressed. Most advertise that they’ll hold twice as much if the data is compressed. It’s true that they can hold more compressed data, but you’re unlikely to get double the storage. Some file types just don’t compress.
Most tape drives cost several hundred dollars. Tapes are relatively expensive, too. And the software can be difficult. Tape is a great backup medium, once you understand it. It has its drawbacks in terms of the time and work involved. But once you get a system down, it can go smoothly.

Here are some other options:

• Back up to a burner — a CD or DVD drive. Neither holds nearly as much data as a tape. If you decide to go this route, be sure your software allows automated backups. A CD or DVD will work well if your data is not voluminous. CDs will hold up to 700 MB; most DVDs will hold 4.7 GB.
• Use a Zip or Jaz drive. These are made by Iomega. Zips hold 250 MB of data; Jaz holds 2 GB.
• Use an external hard drive. These run U.S. $200-$300 and hold a vast amount of data. They attach to the computer via high-speed connections such as USB 2.0 or FireWire. Hard drives are fast, so the backup wouldn’t take much time. But an external hard drive is relatively bulky, so you would get tired of taking it home.

Another Option to Consider: Backing up on an Internal Hard Drive
You could use a second internal hard drive, although that would mean leaving the backup in the office. Massive hard drives can be had for less than U.S. $100. Windows automatically accommodates multiple hard drives. You could simply copy your data from the master hard drive to the second one, known as a slave.

If you’re handy, you can install a second hard drive yourself. Having a shop retrofit a computer wouldn’t be especially expensive. Or, if you’re buying a new computer, order it with two hard drives.

If having two hard drives appeals to you, consider a RAID system. RAID means Redundant Array of Inexpensive Disks. RAID systems can be immensely complicated. But a two-disk system is not; you set it up as a mirror.
When you save something, it automatically saves to both drives. The second drive looks just like the first. So if one fails, you have a perfect copy. And RAID will automatically switch you over to the working drive. Some motherboards have RAID capability built in. If yours doesn’t, a RAID card can be added to the computer. However, a RAID system would leave your backup inside the computer. That leaves you vulnerable to fire or theft.

Need More Security? Consider an Online Backup Service
If you’re especially concerned about safety, you might want to consider an Internet backup. There are many firms on the Web that will store your data for you, for a monthly fee. You can run the backup automatically.

Most analysts recommend that only businesses with a high-speed Internet connection consider this option, because backups by dial-up modem could tie up your phone lines for several hours at a time.

Also, Microsoft Windows SharePoint Services — which enable you to build a private intranet or extranet site for your business — offer the ability to store copies of your most-vital business documents in a secure area that you can access through the Internet.

Benefits of Managed Service

What Are Managed Services?

When a company subscribes to a managed service, a service provider manages the network equipment and applications on the customer premises according to the terms of a service-level agreement (SLA) established to meet the company’s unique business needs. Some managed services are also hosted, meaning that the service provider hosts the equipment in its facility instead of the customer’s, and delivers services to company employees over the WAN.

For small and medium-sized businesses (SMBs), managed services provide enterprise-class capabilities for a predictable monthly fee—without requiring a large, initial capital investment. Companies that out-task enjoy high levels of network support and availability, enable internal IT staff to focus on strategic activities instead of network support, and pay only for those networking services that they need.

Managed services generally include software, hardware, and other IP networking services. The service provider’s highly experienced technical experts focus exclusively on providing the network services and support that their customers need to meet their business requirements. Companies have the option to out-task some or all of their network management and monitoring tasks and retain control of the rest—even if the equipment is physically located at the provider’s site. For more information on various arrangement scenarios contact us at NSP NOC for a free consultation

Reasons for Adopting Managed Services

In October 2006, market analyst Ovum Ltd conducted a survey to identify the major reasons that companies adopt managed services. The primary reason for managed services adoption is cost reduction. The next most highly rated reasons are higher levels of support and availability, predictable costs, and access to the latest technology (Figure 3).

What do Managed Services Solve?

Managed services are an innovative and cost-efficient alternative to managing the network with internal resources (Figure 6). They enable a company’s personnel and financial resources to focus on core business concerns and allow the company to pay for only those services it requires. This arrangement frees the company from having to hire staff with expertise in multiple networking technologies and invest in ongoing training.


What is an IT Consultant?

Put simply, an IT consultant is someone who helps you figure out how to increase sales and productivity through technology and communications. To do this, they ask the questions you never thought to ask, from the most basic to the more complex: “Do you need a T1 line for high speed Internet when all you want is email?” or “How often do you need to back up your data?” and “What’s your  digital marketing vision?” and “Do you know what digital marketing is?”

They also get you thinking about your company’s IT infrastructure with questions along the lines of “What’s your data protection plan for your network and your customer database?  Where are you going to securely store your important customer information like contact information, purchase histories or even medical histories? Is a unified VoIP (Voice over Internet Protocol) phone and Internet system right for your business? Do you want a full-time IT manager to handle this stuff or do you want to outsource as much as possible to a managed service provider (MSP)?”

Done right, like the way we do it at NSP NOC, this IT consultant delivers an action plan of concrete IT solutions that allows you to concentrate on running your business to its maximum potential. Best of all, help doesn’t have to be expensive and doesn’t require someone dedicated to an IT company. In fact, help can even come free of charge.

Cloud Computing, What’s the Catch?

In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realising that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is.

Every breached security system was once thought infallible

SaaS (software as a service) and PaaS (platform as a service) providers all trumpet the robustness of their systems, often claiming that security in the cloud is tighter than in most enterprises. But the simple fact is that every security system that has ever been breached was once thought infallible.

Google was forced to make an embarrassing apology in February when its Gmail service collapsed in Europe, while Salesforce.com is still smarting from a phishing attack in 2007 which duped a staff member into revealing passwords.

While cloud service providers face similar security issues as other sorts of organisations, analysts warn that the cloud is becoming particularly attractive to cyber crooks. “The richer the pot of data, the more cloud service providers need to do to protect it,” says IDC research analyst David Bradshaw.

Understand the risks of cloud computing

Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment.

“At the heart of cloud infrastructure is this idea of multi-tenancy and decoupling between specific hardware resources and applications,” explains Datamonitor senior analyst Vuk Trifković. “In the jungle of multi-tenant data, you need to trust the cloud provider that your information will not be exposed.”

For their part, companies need to be vigilant, for instance about how passwords are assigned, protected and changed. Cloud service providers typically work with numbers of third parties, and customers are advised to gain information about those companies which could potentially access their data.

IDC’s Bradshaw says an important measure of security often overlooked by companies is how much downtime a cloud service provider experiences. He recommends that companies ask to see service providers’ reliability reports to determine whether these meet the requirements of the business. Exception monitoring systems is another important area which companies should ask their service providers about, he adds.

London-based financial transaction specialists SmartStream Technologies made its foray into the cloud services space last month with a new SaaS product aimed at providing smaller banks and other financial institutions with a cheap means of reconciling transactions. Product manager Darryl Twiggs says that the service has attracted a good deal of interest amongst small to mid-tier banks, but that some top tier players are also being attracted by the potential cost savings.

An important consideration for cloud service customers, especially those responsible for highly sensitive data, Twiggs says, is to find out about the hosting company used by the provider and if possible seek an independent audit of their security status.

“Customers we engage with haven’t been as stringent as we thought they would have been with this”.

How cloud hosting companies have approached security

As with most SaaS offerings, the applications forming SmartClear’s offering are constantly being tweaked and revised, a fact which raises more security issues for customers. Companies need to know, for instance, whether a software change might actually alter its security settings.

“For every update we review the security requirements for every user in the system,” Twiggs says.

One of the world’s largest technology companies, Google, has invested a lot of money into the cloud space, where it recognises that having a reputation for security is a key determinant of success. “Security is built into the DNA of our products,” says a company spokesperson. “Google practices a defense-in-depth security strategy, by architecting security into our people, process and technologies”.

However, according to Datamonitor’s Trifković, the cloud is still very much a new frontier with very little in the way of specific standards for security or data privacy. In many ways he says that cloud computing is in a similar position to where the recording industry found itself when it was trying to combat peer-to-peer file sharing with copyright laws created in the age of analogue.

“In terms of legislation, at the moment there’s nothing that grabs my attention that is specifically built for cloud computing,” he says. “As is frequently the case with disruptive technologies, the law lags behind the technology development for cloud computing.”

What’s more, many are concerned that cloud computing remains at such an embryonic stage that the imposition of strict standards could do more harm than good.

IBM, Cisco, SAP, EMC and several other leading technology companies announced in late March that they had created an ‘Open Cloud Manifesto’ calling for more consistent security and monitoring of cloud services.

But the fact that neither Amazon.com, Google nor Salesforce.com agreed to take part suggests that broad industry consensus may be some way off. Microsoft also abstained, charging that IBM was forcing its agenda.

“Standards by definition are restrictive. Consequently, people are questioning whether cloud computing can benefit from standardisation at this stage of market development.” says Trifković. “There is a slight reluctance on the part of cloud providers to create standards before the market landscape is fully formed.”

Until it is there are nevertheless a handful of existing web standards which companies in the cloud should know about. Chief among these is ISO27001, which is designed to provide the foundations for third party audit, and implements OECD principles governing security of information and network systems. The SAS70 auditing standard is also used by cloud service providers.

Local law and jurisdiction where data is held

Possibly even more pressing an issue than standards in this new frontier is the emerging question of jurisdiction. Data that might be secure in one country may not be secure in another. In many cases though, users of cloud services don’t know where their information is held. Currently in the process of trying to harmonise the data laws of its member states, the EU favours very strict protection of privacy, while in America laws such as the US Patriot Act invest government and other agencies with virtually limitless powers to access information including that belonging to companies.

UK-based electronics distributor ACAL is using NetSuite OneWorld for its CRM. Simon Rush, IT manager at ACAL, has needed to ensure that ACAL had immediate access to all of its data should its contract with NetSuite be terminated for any reason, so that the information could be quickly relocated. Part of this included knowing in which jurisdiction the data is held. “We had to make sure that, as a company, our data was correctly and legally held.”

European concerns about about US privacy laws led to creation of the US Safe Harbor Privacy Principles, which are intended to provide European companies with a degree of insulation from US laws. James Blake from e-mail management SaaS provider Mimecast suspects that these powers are being abused. “Counter terrorism legislation is increasingly being used to gain access to data for other reasons,” he warns.

Mimecast provides a comprehensive e-mail management service in the cloud for over 25,000 customers, including 40% of the top legal firms in the UK.

Customers benefit from advanced encryption that only they are able to decode, ensuring that Mimecast acts only as the custodian, rather than the controller of the data, offering companies concerned about privacy another layer of protection. Mimecast also gives customers the option of having their data stored in different jurisdictions.

For John Tyreman, IT manager for outsourced business services provider Liberata, flexibility over jurisdiction was a key factor in his choosing Mimecast to help the company meet its obligations to store and manage e-mails from 2500 or so staff spread across 20 countries. The company is one of the UK’s leading outsourcing providers for the Public Sector, Life Pensions and Investments and Corporate Pensions leading. “Storing our data in the US would have been a major concern,” Tyreman says.

Best practice for companies in the cloud

  • Inquire about exception monitoring systems
  • Be vigilant around updates and making sure that staff don’t suddenly gain access privileges they’re not supposed to.
  • Ask where the data is kept and inquire as to the details of data protection laws in the relevant jurisdictions.
  • Seek an independent security audit of the host
  • Find out which third parties the company deals with and whether they are able to access your data
  • Be careful to develop good policies around passwords; how they are created, protected and changed.
  • Look into availability guarantees and penalties.
  • Find out whether the cloud provider will accommodate your own security policies

When Will Your System Fail?

There’s no question your systems are going to fail at some point with resulting loss of data – “it’s a 100 percent certainty.” The only question is when. And businesses that don’t adequately protect their data will inevitably suffer.

It doesn’t matter whether you’re a small or mid-sized business, global enterprise, or a service provider; NSP NOC will serve you anytime and help you ensure the critical information you’re responsible for guarding will be there when it’s needed the most.
Choosing the right backup service for your business could not be simpler, our experts are on hand to discuss your requirements and understand your business needs. We will tailor a package to meet your specific backup and recovery objectives and your budget. Whether you are looking to simply backup your data securely offsite, protect multiple computers/servers from a single office or unlimited remote offices/ branches all over the world, we can provide you with the right solution.

Clean Cabling, Why It’s Important.

First, ask yourself if you can afford to be out of service?

Messy Cable
Don't Let This Happen To You

Regardless of if you can or if you can’t, like most of us, then you need to ensure the job was done right the first time. Old cables or bad jobs can cause your networks to run slow, and even result in dangerous fires. By using high quality Cat 5, 6, 7 and fiber optic cables in coordination with scheduled testing to ensure your cables are your network is maximizing its full potential and not creating further liabilities.

NSP NOC’s technicians guarantee clean cabling, providing you & your business with the certainty you need.