Archive for the ‘Small Business Security Strategies’ Category


Everon announces it’s NEW Total Data Protection Plan.

Everon News, Small Business Management Strategies, Small Business Security Strategies No comments

Latest technology in data protection, backed by Everon’s award winning support, all with off-site storage included and flat rate pricing.

Do you backup your data?

You rely on your computer systems to perform many of your business needs, from creating sales quotes to provisioning orders and storing vital data. Your internal processes are built around these systems and you store your customer and financial data on these systems. Can your business survive if this data and these systems are not available?

Data loss can happen to anyone.


The Solution: The Total Data Protection Plan™ from Everon

A completed backup and disaster recovery solution to make sure your critical data is safe and secure and accessible when you need it.  
Now with flat rate, affordable and predictable pricing and off-site storage included.

Your business data is too valuable to leave its safekeeping to chance. That’s why the team at Everon has created the only data protection plan that exclusively meets the needs of small businesses, and is backed by our commitment to Remarkable Service™.

The Everon Total Data Protection™ Plan (TDP) is made up of three distinct features that make this the most complete and reliable server data backup option available to your business:

TDP header bar


1.  Hassle-free Local Backup that gives you the fastest way to recover files

  • Data backed up as often as each 15 minutes to Total Data Protection unit located in your office
  • No unreliable tapes; instead backing up your data to redundant hard drives
  • All data and applications backed up – no need for Exchange, SQL, or open file agents
  • Full restoration of files fast TDP monitored 24/7 by Everon
  • Full 3 year warranty on the Total Data Protection Unit.

2.  Quick Recovery™ Business Continuity Capability

Quick Recovery Business Continuity Capability enables the highest possible levels of business continuity in the event of an emergency.  If one of your servers crash, the TDP can quickly be provisioned to temporarily “take over” in place of the failed server, with all of your applications, data, and settings available within moments vs. the 1 to 3 days typical recovery time from a tape backup system (assuming the data is actually even on the tape, and assuming you even have a functional server to restore to!)

3.  Disaster Recovery Capability

Disaster recovery capability allows us to re-create your entire data history in the event of a true disaster and eliminates the cost and hassle of off-site tape storage. Copies of your data are kept off-site at two SAS70 Type II secure data centers in the United States.  In the event of an emergency that disables or destroys your local back up, offsite copies of your data provides for quick business recovery.

TDP eliminates the cost and hassle of off-site tape storage.  In the event that anything happens to your physical server room, the Everon team can virtualize your Servers from the remote data centers over the cloud; providing complete disaster recovery for your business.

No data protection service is complete without these three features – don’t leave your business exposed to the risks of an incomplete data protection plan!

Why Everon for Total Data Protection™?

The only small business data protection plan backed by hands-on service from a leading SMB IT management team.

Everon’s Total Data Protection™ Plan is tailored precisely to fit the needs of your needs so businesses both large and small can all enjoy the benefits of the most comprehensive and secure data protection in the market at the price point that fits your budget.

Regular, systematic and verified backup of your company’s files is absolutely critical. Our automated backup process virtually eliminates human error and equipment failure. Coupled with off-site file protection, your data security is ensured even in the event of system failure or catastrophic loss. All data is kept in military grade bi coastal facilities (SAS 70 compliant). Whether you are backing up for compliance, disaster recover or archiving, your data is easily accessible and always available whenever and wherever you need it.


Every TDP flat rate monthly plan includes:

  • Proactive monitoring of your backups 24/7 with free support from our dedicated backup engineer support team
  • Frequent Backups- as often as every 15 minutes
  • Off-site storage in Bi-Coastal Data Centers included in your monthly cost
  • 3 Year Hardware Warranty
  • No Recovery Fees
  • Unlimited Agent Licenses
  • Device Seeding
  • Account Management
  • Flexible Upgrade Policy
  • On-site storage device provides fast server virtualization capabilities in the event of server failure
  • Flat Rate pricing with Off-site storage included!

Technical Specifications:

  • Bare Metal Restore
  • Data Deduplication & Local Compression
  • Secure Linux Based OS
  • ZFS Snapshots
  • Message-Level Exchange Recovery
  • Granular SharePoint Recovery
  • Advanced File Level Restore
  • Instant Off-Site Virtualization
  • VMDK/VHD Export
  • Instant On-Site Virtualization
  • Screenshot virtualization of Backups

To learn more about our Total Data Protection or to watch an informative webinar on how our TDP can help your business click here or email us today at [email protected].

Post to Twitter


Are malicious PDF files society’s greatest menace?

Small Business Security Strategies No comments

…okay, maybe we’re being a little harsh there.adobe_logo

But a recent ScanSafe report indicates that malicious PDF files accounted for 80% of all web-encountered exploits in 2009. Flash exploits, on the other hand, dropped from 40% of all exploits in 1Q09 to 18% in 4Q09.

(By comparison, web-encountered exploits in Word and Excel comprised less than 1% of all detected exploits for the year).

It’s an interesting change-of-scene. In response to these perceived security flaws, some are recommending avoiding Adobe products altogether - which would make sense, except that more than 90% of internet-enabled PCs have Acrobat installed (and more than 99% of them have Flash).

But as Dancho Danchev at ZDNet points out, the increased number of exploits may be owing to the number of outdated Adobe products in use. As mentioned in his article, if 83% of those PC users with Acrobat installed haven’t installed the latest security patch, they may as well paint a big target on their backs.

Given the widespread use of Adobe products, avoiding Acrobat and Flash isn’t really a viable answer for most small businesses and individuals. Like most things in internet security, you can do a lot to protect yourself by just being a little more proactive. Keep your Adobe products updated. Treat any downloaded PDF files with the same caution you would use when opening an executable file. And if you’re really worried, disabling the use of javascript in Acrobat Reader and avoiding the use of browser plug-ins will give you an extra layer of protection.

(And in case you’re wondering, you can download the original ScanSafe report here. Yes, we’re well aware of the irony that it’s delivered as a PDF.)

Kipp Chambers
Sr. Internet Marketing Specialist

Post to Twitter


Choosing the right password is more important than you may think!

Small Business Security Strategies 1 comment

Choosing the right password - What’s it to me?

In today’s world technology is always right at all of our fingertips. All things considered, this is a good thing to most people. Still, we must work to keep our personal identities safe.  How would you honestly answer this question:

How safe am I being on the internet?

Typical people can have multiple passwords to a series of different accounts on the internet, like social media sites, e-mail and online banking. We are all vulnerable out there when it comes to the simple passwords we choose so that we can remember them all.

A study at the trends of the simple passwords used in the 1990’s all the way to now, we have seen many similarities in passwords chosen like “12345, abc123, and password” When we look at the overall picture we see that the best way to make sure you don’t fall victim to hacker’s with bad intentions choose a more complex password.

Pointers for  password creation:

- Select one with 8 or more characters
- Add  a capital letter, number, and some form of punctuation mark (ex. Pa33w0rd!)
- Never use your street name or your own name in a password

This above example (Pa33word!) shows a very simple password converted to different characters to make it more difficult for a hacker to figure out. Most hacker’s at this time do not try and guess your password by inputting it themselves they have programs that do that for them. The experts suggest that everyone should choose at least two different passwords; a complex one for Web sites where security is vital, such as banks and e-mail, and a simpler one for places where the stakes are lower, such as social networking and entertainment sites.

Here is a list of the top 32 user passwords that got hacked from a company that makes software for social media sites like Facebook and MySpace:

Most popular passwords:

1.  123456
2.  12345
3.  123456789
4.  password
5.  iloveyou
6.  princess
7.  rockyou
8.  1234567
9.  12345678
10.  abc123
11.  nicole
12.  daniel
13.  babygirl
14.  monkey
15.  jessica
16.  lovely
17.  michael
18.  ashley
19.  654321
20.  qwerty
21.  iloveu
22.  michelle
23.  111111
24.  0
25.  tigger
26.  password1
27.  sunshine
28.  chocolate
29.  anthony
30.  angel
32.  soccer

Source: New York Times

It should go without saying, but don’t ever use one of these passwords! And, if one of these is currently a password of yours, I would greatly advise that you change it ASAP!

Chris Branson, Network Engineer

Post to Twitter


Firefox updates fix 3 critical flaws

Small Business Security Strategies No comments

Mozilla Firefox has just released version 3.5.6 on December 15th. This update of the open-source browser sews up security and stability issues, resolving three critical security holes, and also patches up other stability issues. The three flaws that this update rectifies:

1. An integer overflow flaw in the libtheora video library
2. A memory Safety concern in the liboggplay media library
3. A problem with Javascript that could allow for crashing the browser and potentially running malicious commands

Please see Mozilla’s list of security advisories for a full list on the critical fixes and more details.

The moral of this post: When your Firefox browser prompts you to install some updates, please do so!

Post to Twitter


5 quick ways to protect your PC online

Small Business Mobile Technology, Small Business Security Strategies No comments

1. Don’t open emails from unknown sources -  Email is the main source of worms, viruses, and Trojan horses. Be especially careful not to open any attachments from an unknown source.

2. Protect your PC with antivirus - If you don’t have an antivirus software on your PC, you’re dancing with disaster! Never click any of those “Free antivirus software, click here!” pop-up ads. They actually GIVE you viruses. Make sure you purchase antivirus from a trusted, well known company. And once you have it, make sure it remains up to date at all times. To ensure that you’re using the right antivirus software for your needs, please talk to your IT provider.

3. Scan everything - Scan all discs and downloads for viruses before running them.

4. Maintain all updates - This does not only go for the patches mentioned above. Make sure all system updates are installed. If you run Windows, visit the Windows Update website. It has the answers to your operating system needs.

5. Watch your downloading and clicking habits - Be careful what sites you download things from off of the internet.  Always try to download new programs directly from the source when possible. Always be suspicious of any downloads that a chat application may send you; ie. AIM or MSN messenger. Most people don’t think twice before they click a random link and end up sorry for it. Most likely, your old college roomate really isn’t going to be the one sending you a “How much do you know about me” quiz or a “Click here to claim your prize!”

Remember these few simple tips and your PC will thank you!

Post to Twitter