One important subject matter we touched on last year was budgeting. Improper budgeting, or even a lack of, can delay and even halt important projects that you as a customer want to prioritize. And no one likes surprises. Budget development is an intricate task, but it is one of the many added features with UniVista Core and Comprehensive Agreements. General budget planning starts with the Q1 quarterly business review meeting, assuming your fiscal year starts in January. For government or other verticals, budgeting starts in the spring, it is pretty well developed by August, and it’s finalized by Oct 1st. An IT budget is most useful if it is a true representation of what is necessary for your maintenance, repair, replacement, and one time “project” expenditures. We work with you to put all of this on paper and allow for proper planning. Let’s touch on a few topics that are very important components of budgeting.
Within the IT community the term Cybersecurity is often thrown around with little to no explanation. Cybersecurity can be defined as “the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.” – Wikipedia. Cybersecurity attacks can affect both people and businesses alike. To get a better understanding, let’s discuss some different approaches to cyber threats. What you can do to help prevent yourself from falling victim to these types of attack?
The concept of Network Security can be pretty daunting. There are lots of rules and regulations that talk about security, how to enforce security, and what you should or shouldn’t do. Well, my brain is pretty full of stuff that is important, like passwords and account numbers, and not so important, like the name of Pink Floyd’s keyboard player, so I have to simplify everything I have to remember. I’ve had to do this for network security too.
Here are the six simple rules I use when I’m thinking about security. I based my rules off every regulation I’ve ever read (and I’ve read too many!) and something I found online by Marcus Ranum and Fred Avolio called the Seven Tenants of Good Security.
I know, this has nothing whatsoever to do with IT, networking, or security but if you live in Williamson County this is a big deal. Round Rock has officially become the epicenter of the burger world. The new in-n-out burger will be located within walking distance of Mighty Fine Burger, Five Guys, and a couple other really decent burger places. http://www.bizjournals.com/austin/blog/morning_call/2012/07/round-rock-approves-zoning-for.html?ana=e_aus_rdup&s=newsletter&ed=2012-07-26
Who will Dell buy next? Who is Dell trying to become? Should I, the owner of a small IT Var, be worried that Dell is trying to push me out of business? Do all their recent acquisitions make Dell the consumer’s new best friend? Check out this article on Channelnomics and let me know what you think? http://channelnomics.com/2012/04/06/what-will-dell-buy-next/
The folks at AlienVault just discovered a new MS Office Exploit that targets Mac users. If you don’t have an antivirus on your Mac now may be the time to start thinking about it.
Please be aware that there is a new email phishing scam/threat. This one personally made me cringe because the email looks like it is from the BBB re: a customer complaint. After investigating the message I found that its source is in the Netherlands, obviously not the headquarters for the BBB.
This message will be from [email protected].
Here’s an example message:
SUBJECT LINE: BBB assistance Re: Case # 94494305
The Better Business Bureau has been filed the above mentioned complaint from one of your customers on the subject of their dealings with you.
The details of the consumer’s concern are presented in attached file.
Please examine this matter and advise us of your opinion.
Please CLICK HERE to respond this complaint.
We look forward to your urgent response.
Better Business Bureau
We have alerted the BBB about this threat.
Please immediately delete this message if you see it. Do not click on the CLICK HERE link. If you have any questions or concerns please do not hesitate to call our help desk at 512-832-6209.
Please remember to save your active documents as much as possible. You could be affected by a brownout at any time.
If you do lose power give us a call as soon as power is restored and we’ll help you get everything back up as quickly as possible. We can be reached at 866-832-6209.