The Top 10 Technology Mistakes Small Businesses Make (And How To Avoid Them) Telephone:  289-383-0383
Small Business Operations Small businesses typically focus energy, time and resources on running their businesses Few small businesses have time/energy to monitor daily technology needs, changes, innovations and threats 10 technology mistakes commonly occur
#1: Weak Tech Support One “quasi support” tech Telephone support dependence Unprofessional IT consultants providing service “on-the-side” Big box electronics stores whose technicians may be inexperienced or learning the business
Professional Technicians: Resolve problems faster Possess significant experience and knowledge Grow in ability to better serve you the more they serve your organization Fulfill specific technology needs Complement existing “quasi support” staff Deliver cost-effective, proven solutions
#2: Old, Cheap, Inconsistent Hardware Older hardware (3-4 years old) is much more likely to experience failure and downtime Cheap components are more likely to experience incompatibilities and problems Inconsistent hardware (different PCs with different components) slows diagnosis/recovery
Consistency Solutions Work with a reputable technology partner to: Ensure your organization deploys consistent, high-quality hardware Standardize software applications Maximize technology investments
#3: Inadequate Power Protection Small but consistent power surges and brownouts dramatically reduce any technology device’s lifespan Surge suppressors vary widely in quality Surge suppressors wear out over time Common power strips provide no protection
Power Solutions Deploy high-quality surge suppressors for all computer equipment Replace surge suppressors every 2-3 years Identify locations where battery backups with line conditioning are a better match for protecting critical equipment
#4: Illegal Software Many businesses don’t realize they don’t “own” software; instead, you license it Some businesses use “borrowed” software Many programs report activation/usage back to the manufacturer (including Intuit, Microsoft, Norton and others) Murphy’s Law plays a role The BSA estimates 22% of North American software is unlicensed
Software Solutions Realize there are no shortcuts Purchase software only from reputable vendors Store product keys, certificates of authenticity, licenses and original installation media in a single, easily accessible location Read license agreements carefully when installing programs
#5: Inadequate Training Most office workers understand less than 20% of the available software packages they use Inefficiencies often result Limited skill sets mean employees work harder (and less efficiently) than necessary
Training Solutions Consult with a knowledgeable technology partner to identify areas of weakness Leverage classroom training Consider computer-based training programs Build software training requirements into employees’ performance reviews
#6: Weak Security Hackers work 24/7/365 to: Steal and/or delete your data Corrupt your PCs and information Compromise your security, thereby enabling hackers to control your PCs remotely Use your PCs to send their email (spam)
Security Solutions Use strong passwords on all systems Regularly update Windows with the latest patches Regularly update programs and applications Deploy hardware-based firewalls Secure all wireless networks Prohibit peer-to-peer file sharing programs Prohibit unnecessary Internet usage Discourage employees from opening email attachments
#7: Insufficient Data Backups There is a 50% chance an organization will go out of business immediately when critical data is lost Odds of business failure increase to 90% within two years On average, data loss costs 19 days of productivity Recovering data from damaged disks is exponentially more expensive (and time consuming) than ensuring you possess adequate backups
Data Backup Solutions Review what information is critical to your business and develop a plan to back it up Determine how much time can safely pass between backups Test back up sets regularly Update back up routines whenever installing/updating software applications Automate off-site storage
#8: Virus Vulnerability Viruses pose a serious threat to PCs A recent BBC report demonstrated Windows systems connected to the Internet (without a firewall) can become infected within 10 seconds Another recent report revealed an unprotected PC connected to the Internet has a 90% chance of being infected within 40 minutes Viruses reduce performance and risk data corruption
#9: Spyware Threats Spyware programs pose as big (or bigger) a threat than do viruses Malware can steal sensitive information and lead to identity theft Spyware infections cripple system performance Estimates frequently tout spyware infection rates as high as 80% on home systems
Virus and Spyware Solutions Purchase, install, update and configure solid business-class antivirus, antispyware and antirootkit applications Automate regular malware scans Review antimalware scan logs Ensure antimalware programs update automatically Prohibit use of file sharing programs Discourage non business-related Internet use Do not permit antimalware programs to expire
#10: Spam Habits Unsolicited email so plagues many small businesses that many are second-guessing email use Estimates place spam’s cost as high as $20.5 billion annually Approximately half of all email messages are spam
Spam Solutions Never advertise your email address on a Web site Do not sign up for email newsletters using a personal email address Avoid forwarding chain email letters Greet money-making opportunities with extreme skepticism Use a reputable email filter Read and ensure you understand usage terms before providing your email address on a Web form
Thanks for your time More questions? Call Computer Troubleshooters: (289)-383-0383 Email us at info@ctnewmarket.com Visit us on the web: ctnewmarket.com

S M B Top 10minstakes

  • 1.
    The Top 10Technology Mistakes Small Businesses Make (And How To Avoid Them) Telephone: 289-383-0383
  • 2.
    Small Business OperationsSmall businesses typically focus energy, time and resources on running their businesses Few small businesses have time/energy to monitor daily technology needs, changes, innovations and threats 10 technology mistakes commonly occur
  • 3.
    #1: Weak TechSupport One “quasi support” tech Telephone support dependence Unprofessional IT consultants providing service “on-the-side” Big box electronics stores whose technicians may be inexperienced or learning the business
  • 4.
    Professional Technicians: Resolveproblems faster Possess significant experience and knowledge Grow in ability to better serve you the more they serve your organization Fulfill specific technology needs Complement existing “quasi support” staff Deliver cost-effective, proven solutions
  • 5.
    #2: Old, Cheap,Inconsistent Hardware Older hardware (3-4 years old) is much more likely to experience failure and downtime Cheap components are more likely to experience incompatibilities and problems Inconsistent hardware (different PCs with different components) slows diagnosis/recovery
  • 6.
    Consistency Solutions Workwith a reputable technology partner to: Ensure your organization deploys consistent, high-quality hardware Standardize software applications Maximize technology investments
  • 7.
    #3: Inadequate PowerProtection Small but consistent power surges and brownouts dramatically reduce any technology device’s lifespan Surge suppressors vary widely in quality Surge suppressors wear out over time Common power strips provide no protection
  • 8.
    Power Solutions Deployhigh-quality surge suppressors for all computer equipment Replace surge suppressors every 2-3 years Identify locations where battery backups with line conditioning are a better match for protecting critical equipment
  • 9.
    #4: Illegal SoftwareMany businesses don’t realize they don’t “own” software; instead, you license it Some businesses use “borrowed” software Many programs report activation/usage back to the manufacturer (including Intuit, Microsoft, Norton and others) Murphy’s Law plays a role The BSA estimates 22% of North American software is unlicensed
  • 10.
    Software Solutions Realizethere are no shortcuts Purchase software only from reputable vendors Store product keys, certificates of authenticity, licenses and original installation media in a single, easily accessible location Read license agreements carefully when installing programs
  • 11.
    #5: Inadequate TrainingMost office workers understand less than 20% of the available software packages they use Inefficiencies often result Limited skill sets mean employees work harder (and less efficiently) than necessary
  • 12.
    Training Solutions Consultwith a knowledgeable technology partner to identify areas of weakness Leverage classroom training Consider computer-based training programs Build software training requirements into employees’ performance reviews
  • 13.
    #6: Weak SecurityHackers work 24/7/365 to: Steal and/or delete your data Corrupt your PCs and information Compromise your security, thereby enabling hackers to control your PCs remotely Use your PCs to send their email (spam)
  • 14.
    Security Solutions Usestrong passwords on all systems Regularly update Windows with the latest patches Regularly update programs and applications Deploy hardware-based firewalls Secure all wireless networks Prohibit peer-to-peer file sharing programs Prohibit unnecessary Internet usage Discourage employees from opening email attachments
  • 15.
    #7: Insufficient DataBackups There is a 50% chance an organization will go out of business immediately when critical data is lost Odds of business failure increase to 90% within two years On average, data loss costs 19 days of productivity Recovering data from damaged disks is exponentially more expensive (and time consuming) than ensuring you possess adequate backups
  • 16.
    Data Backup SolutionsReview what information is critical to your business and develop a plan to back it up Determine how much time can safely pass between backups Test back up sets regularly Update back up routines whenever installing/updating software applications Automate off-site storage
  • 17.
    #8: Virus VulnerabilityViruses pose a serious threat to PCs A recent BBC report demonstrated Windows systems connected to the Internet (without a firewall) can become infected within 10 seconds Another recent report revealed an unprotected PC connected to the Internet has a 90% chance of being infected within 40 minutes Viruses reduce performance and risk data corruption
  • 18.
    #9: Spyware ThreatsSpyware programs pose as big (or bigger) a threat than do viruses Malware can steal sensitive information and lead to identity theft Spyware infections cripple system performance Estimates frequently tout spyware infection rates as high as 80% on home systems
  • 19.
    Virus and SpywareSolutions Purchase, install, update and configure solid business-class antivirus, antispyware and antirootkit applications Automate regular malware scans Review antimalware scan logs Ensure antimalware programs update automatically Prohibit use of file sharing programs Discourage non business-related Internet use Do not permit antimalware programs to expire
  • 20.
    #10: Spam HabitsUnsolicited email so plagues many small businesses that many are second-guessing email use Estimates place spam’s cost as high as $20.5 billion annually Approximately half of all email messages are spam
  • 21.
    Spam Solutions Neveradvertise your email address on a Web site Do not sign up for email newsletters using a personal email address Avoid forwarding chain email letters Greet money-making opportunities with extreme skepticism Use a reputable email filter Read and ensure you understand usage terms before providing your email address on a Web form
  • 22.
    Thanks for yourtime More questions? Call Computer Troubleshooters: (289)-383-0383 Email us at info@ctnewmarket.com Visit us on the web: ctnewmarket.com