s m b top 10minstakes
DESCRIPTION
Top 10 Mistakes - SMB (Small Business)TRANSCRIPT
The Top 10 Technology Mistakes Small Businesses Make
(And How To Avoid Them)
Telephone: 289-383-0383
Small Business Operations• Small businesses typically focus energy, time
and resources on running their businesses• Few small businesses have time/energy to
monitor daily technology needs, changes, innovations and threats
• 10 technology mistakes commonly occur
#1: Weak Tech Support• One “quasi support” tech• Telephone support dependence• Unprofessional IT consultants providing
service “on-the-side”• Big box electronics stores whose technicians
may be inexperienced or learning the business
Professional Technicians:• Resolve problems faster• Possess significant experience and knowledge• Grow in ability to better serve you the more
they serve your organization• Fulfill specific technology needs• Complement existing “quasi support” staff• Deliver cost-effective, proven solutions
#2: Old, Cheap, Inconsistent Hardware
• Older hardware (3-4 years old) is much more likely to experience failure and downtime
• Cheap components are more likely to experience incompatibilities and problems
• Inconsistent hardware (different PCs with different components) slows diagnosis/recovery
Consistency Solutions• Work with a reputable technology partner to:– Ensure your organization deploys consistent, high-
quality hardware– Standardize software applications– Maximize technology investments
#3: Inadequate Power Protection• Small but consistent power surges and
brownouts dramatically reduce any technology device’s lifespan
• Surge suppressors vary widely in quality• Surge suppressors wear out over time• Common power strips provide no protection
Power Solutions• Deploy high-quality surge suppressors for all
computer equipment• Replace surge suppressors every 2-3 years• Identify locations where battery backups with
line conditioning are a better match for protecting critical equipment
#4: Illegal Software• Many businesses don’t realize they don’t “own”
software; instead, you license it• Some businesses use “borrowed” software• Many programs report activation/usage back to
the manufacturer (including Intuit, Microsoft, Norton and others)
• Murphy’s Law plays a role• The BSA estimates 22% of North American
software is unlicensed
Software Solutions• Realize there are no shortcuts• Purchase software only from reputable vendors• Store product keys, certificates of authenticity,
licenses and original installation media in a single, easily accessible location
• Read license agreements carefully when installing programs
#5: Inadequate Training• Most office workers understand less than 20%
of the available software packages they use• Inefficiencies often result• Limited skill sets mean employees work
harder (and less efficiently) than necessary
Training Solutions• Consult with a knowledgeable technology
partner to identify areas of weakness• Leverage classroom training• Consider computer-based training programs• Build software training requirements into
employees’ performance reviews
#6: Weak Security• Hackers work 24/7/365 to:– Steal and/or delete your data– Corrupt your PCs and information– Compromise your security, thereby enabling
hackers to control your PCs remotely– Use your PCs to send their email (spam)
Security Solutions• Use strong passwords on all systems• Regularly update Windows with the latest patches• Regularly update programs and applications• Deploy hardware-based firewalls• Secure all wireless networks• Prohibit peer-to-peer file sharing programs• Prohibit unnecessary Internet usage• Discourage employees from opening email
attachments
#7: Insufficient Data Backups• There is a 50% chance an organization will go out of
business immediately when critical data is lost– Odds of business failure increase to 90% within two years
• On average, data loss costs 19 days of productivity• Recovering data from damaged disks is exponentially
more expensive (and time consuming) than ensuring you possess adequate backups
Data Backup Solutions• Review what information is critical to your
business and develop a plan to back it up• Determine how much time can safely pass
between backups• Test back up sets regularly• Update back up routines whenever
installing/updating software applications• Automate off-site storage
#8: Virus Vulnerability• Viruses pose a serious threat to PCs– A recent BBC report demonstrated Windows systems
connected to the Internet (without a firewall) can become infected within 10 seconds
– Another recent report revealed an unprotected PC connected to the Internet has a 90% chance of being infected within 40 minutes
• Viruses reduce performance and risk data corruption
#9: Spyware Threats• Spyware programs pose as big (or bigger) a
threat than do viruses• Malware can steal sensitive information and lead
to identity theft• Spyware infections cripple system performance• Estimates frequently tout spyware infection rates
as high as 80% on home systems
Virus and Spyware Solutions• Purchase, install, update and configure solid business-
class antivirus, antispyware and antirootkit applications
• Automate regular malware scans• Review antimalware scan logs• Ensure antimalware programs update automatically• Prohibit use of file sharing programs• Discourage non business-related Internet use• Do not permit antimalware programs to expire
#10: Spam Habits• Unsolicited email so plagues many small
businesses that many are second-guessing email use
• Estimates place spam’s cost as high as $20.5 billion annually
• Approximately half of all email messages are spam
Spam Solutions• Never advertise your email address on a Web site• Do not sign up for email newsletters using a personal
email address• Avoid forwarding chain email letters• Greet money-making opportunities with extreme
skepticism• Use a reputable email filter• Read and ensure you understand usage terms before
providing your email address on a Web form
Thanks for your time• More questions?– Call Computer Troubleshooters: (289)-383-0383– Email us at [email protected]– Visit us on the web: ctnewmarket.com