Cralyn Technology Solutions, Inc. https://cralyntech.com Your Trusted Small Business Technology Partner Fri, 01 Oct 2021 06:55:29 +0000 en-US hourly 1 10 Terrifying Cybersecurity Stats You Need to Know https://cralyntech.com/10-terrifying-cybersecurity-stats-you-need-to-know/?utm_source=rss&utm_medium=rss&utm_campaign=10-terrifying-cybersecurity-stats-you-need-to-know Fri, 01 Oct 2021 12:38:00 +0000 https://cralyntech.com/?p=474

Continue reading]]> How can you be prepared for the cybersecurity risks of today?

The scary reality is, if your aren’t prepared for a cyberattack, you could lose everything—and ultimately. Here, we’ve compiled stats to help you illustrate the reality of the cybersecurity threat to you.

10. Cybersecurity should be top-of-mind for businesses. Everybody is a potential target.

The global information security market is forecasted to reach $170.4 billion in 2022, according to Gartner. And while that number is so large it’s hard to wrap your head around it, here’s another stat that might hit closer to home. According to Cybint, 95% of cybersecurity breaches are caused by human error, meaning they were likely preventable. Yes, you read that right. Would that catch your attention?

9. When a security breach occurs, companies have to hit pause, losing precious time and revenue. This hits small businesses especially hard.

Lost business costs accounts for nearly 40% of the average total cost of a data breach, increasing from $1.42 million in 2019 to $1.52 million in 2020. On average, companies in 2020 required 207 days to identify and 73 days to contain a breach, for a “lifecycle” of 280 days. 
(Source: IBM & Ponemon Cost of a Data Breach Report 2020)

8. Depending on the type of information that was compromised, businesses may be on the hook for legal fees.

If a settlement is in the works, a small business could be in limbo for quite some time. It’s common for 3 to 5 years to pass between a breach and a settlement. During that time, the company is paying legal fees, expenses and filing costs—not to mention the cost of the actual settlement.
(Source: Revision Legal)

7. If a company has broken a cybersecurity law, they could also be subject to penalties and fines.

Violating cybersecurity laws is an expensive and disruptive process. Did you know if you are in compliance with current regulations?

  • Health Insurance Portability and Accountability Act (HIPAA) fines are calculated based on the number of medical records exposed with fines ranging from $50 to $50,000 per record. 
  • Gramm-Leach-Bliley Act (GLBA) requires companies offering consumers financial products to explain their information-sharing practices and safeguard sensitive data. Fines can be as high as $100,000 for each violation, and the officers and directors of the organization may be fined up to $10,000 personally.
  • General Data Protection Regulation (GDPR) mandates the use of encryption and is especially punitive, with fines potentially totaling tens of millions of dollars.
  • Being in breach of Payment Card Industry Data Security Standards (PCI DDS) exposes organizations to minimum fines of $5,000 per month and maximum fines of $100,00 per month.  

(Source: CyberInsureOne)

6. If a company is found liable for the leaked information, victims could request compensation.

Perhaps the most sizable example is the Equifax breach that occurred in 2017. Two years later, Equifax agreed to pay nearly $700 million to settle federal and state investigations into how it handled a massive data breach that affected nearly 150 million people. 

The settlement included $425 million to directly help consumers affected by the breach. The restitution fund started with $300 million dedicated to consumer compensation, with an additional $125 million if the initial funds ran out. 
(Source: CNBC.com)

5. When a company is dealing with a data breach, normal everyday business can fall through the cracks. Lost sales result in lost profits and a very lean bottom line.

Significant revenue loss as a result of a cybersecurity breach is common. Studies show that 29% of businesses that face a data breach end up losing revenue. Of that lost revenue, 38% experienced a loss of 20% or more.
(Source: The Ame Group)

4. Identifying the breach is one thing, but remediating the situation is an entirely different animal—and the less prepared you are, the more expensive it will be.

The best defense is often a good offense. The cost of remediation can skyrocket as a companies:

  • Document the attack
  • Quarantine compromised hardware and software
  • Contain and eliminate the threat
  • Analyze activity logs
  • Fix the vulnerability that caused the breach
  • Repair or replace infected systems
  • Implement security improvements 

And ransomware significantly adds to this cost, tacking on an average of nearly $150,000! 
(Source: Field Effect

3. And when operations are subpar, your start to lose customers.

Eighty percent of breached organizations state that customer personally identifiable information (PII) was compromised during the breach. While the average cost per lost or solen record was $146 across all data breaches, those containing customer PII cost businesses $150 per record—as well as the threat of customers losing faith in the company and turning elsewhere. 
(Source: IBM & Ponemon Cost of a Data Breach Report 2020)

2. A breach can damage your reputation—and it can take years to recover.

The biggest cost of a cyberattack is reputation. Deloitte determined that up to 90% of the total costs in a cyberattack occur beneath the surface. Hidden costs, like damaged credibility, can affect a business for years after a breach. What’s more, loss of trust in the business, diminished brand reputation and increased costs concerning debt financing are not covered by insurance. 
(Source: Deloitte)

1. In a worst-case scenario, you could lose your entire business.

If everything listed above happens, it can be hard to keep a business afloat. This is especially true for small businesses and why 60% small businesses that are victims of a cyberattack go out of business within six months.  
(Source: Fundera)

These statistics tell a story—and it’s a pretty scary one. One (or more) of these situations can easily happen if you aren’t prepared and create a scenario that not only puts your business in jeopardy, but likely exposes sensitive customer data to cyber criminals, which can exponentially compound the negative impacts of a breach. Look no further than the Kaseya ransomware attack that impacted the MSP community in July 2021.

At the end of the day, being a security-focused individual not only protects your business, but it also adds an additional layer of protection to your business and your customers.

]]>
OS Over Time – Microsoft Windows from 1990-2015 https://cralyntech.com/os-over-time-microsoft-windows-from-1990-2015/?utm_source=rss&utm_medium=rss&utm_campaign=os-over-time-microsoft-windows-from-1990-2015 Thu, 03 Sep 2015 06:24:16 +0000 http://cralyntech.com/?p=321 Microsoft_OShistory_ig - 1 Microsoft_OShistory_ig - 2 Microsoft_OShistory_ig - 3 Microsoft_OShistory_ig - 4 Microsoft_OShistory_ig - 5 Microsoft_OShistory_ig - 6 Microsoft_OShistory_ig - 7 Microsoft_OShistory_ig - 8 Microsoft_OShistory_ig - 9

]]>
Increased Productivity: Get more work done with lower costs, higher security! https://cralyntech.com/increased-productivity-get-more-work-done-with-lower-costs-higher-security/?utm_source=rss&utm_medium=rss&utm_campaign=increased-productivity-get-more-work-done-with-lower-costs-higher-security Thu, 03 Sep 2015 04:26:13 +0000 http://cralyntech.com/?p=312

Continue reading]]> Increased Productivity with the RIGHT TechnologyYou know you need to do something about your older business PCs. They run so slowly that your employees are getting frustrated. They cost your business a great deal in repair costs and downtime. They lack the latest security technologies and put your business data at risk. Support and security updates for Windows* XP ended April 8, 2014, leaving your PCs even more vulnerable to threats.

Windows* XP Support Ended April 2014!

If you’re running Windows XP, keep in mind that Microsoft ended support for this operating system (and for Microsoft* Office 2003) on April 8, 2014. No more security patches from Microsoft or from ISVs whose products run on Windows XP.

Instead of spending your limited budget on upgrades and repairs, why not buy new computers and spend less? That’s right; with the cost of computers declining, it is likely that you can buy new computers for less money than repairing and upgrading older PCs. And with Intel® based desktops available in a variety of form factors, you can find the right devices to fit your work style.

Here are five good reasons to buy new computers:

Get more business done
The devices powered by 4th generation Intel® Core™ processors are blazingly fast. Instant-on technology wakes the system in seconds, and connecting to your office network is faster and simpler than ever. You get more done every day with the ability to multitask between all your business applications without frustrating waits.

Protect your business with multi-layered security
New devices have stronger built-in security features to help protect your sensitive business data, guard against user identity theft and ensure safe access to your network.

Reduce repair costs
Investing in new PCs can actually save you money in the long run. According to a recent Techaisle study, new PCs have 33% fewer problems than four-year-old or older systems. It cost about US $134 to upgrade a four-year-old PC with newer processor and memory and about $427 to repair it when it breaks. That’s $561 out of pocket to keep an old PC running – and does not include the cost of lost productivity when employees are without a computer. In fact, the Techaisle study found that an average of 42 productive work hours a year per PC are lost while computers are being repaired.

Apart from downtime-related savings, today’s PCs return minutes throughout the day to your time-strapped employees when performing operations as simple as computer startup and shutdown, running multiple applications at once. These cumulative time savings can add up to dozens of hours per week for your business – time your staff could spend making more sales calls, helping more customers, and coming up with more product ideas.

Better virtual workspace
Todays desktop PC allows your employees to use one large HD monitor or up to three HD monitors. This allows your employees to have a large virtual workspace so they can move effortlessly across multiple applications.

Remote access to your desktop
A desktop PC can become a personal hub using Intel® Ready Mode Technology. For example, large files can be stored on your employee’s desktop and while on the road using a tablet, they can remotely wake up the desktop from a very low power sleep state to access files. When the employee returns to the office, the desktop senses the tablet and synchronizes files to make them ready to use by the time your employee sits down.

Experience a new device today! Faster is truly more affordable than you may think. Learn more by visiting intel.com/smallbusiness to get a glimpse of all the different form factors available today.

Then, contact us to schedule a FREE consultation so we can help your business increase productivity! 

 

[contact_form] ]]> Storm Planning for Technology https://cralyntech.com/storm-planning-for-your-technology/?utm_source=rss&utm_medium=rss&utm_campaign=storm-planning-for-your-technology Thu, 27 Aug 2015 19:38:56 +0000 http://cralyntech.com/?p=160

Continue reading]]> Click HERE for a printable version of the list below.

As severe storms approach, here are some useful tips you would want to consider for your Home and Office.

  1. Verify Data Backups (onsite and offsite). Make sure any critical data is kept safe. If you have onsite backups, it is best to have two copies – one left onsite (preferably in a fire-proof / weather-proof / crash-proof safe), and one taken offsite as you may not be able to return to the office to retrieve the other backup set. If you have offsite backups already, verify they are working and up-to-date. Also remember, if you have a server, files on your local system may not be backed up – so move or copy them to your server to be backed-up properly!
  2. Power off all Computers / Servers / Printers / Network Equipment. You won’t likely be working from home during the storm and often power-outages will occur if the storm is severe enough anyway. It is best to power off all technology related devices/equipment and also UN-PLUG them! Just because it is powered off does not protect it from power surges. Do not forget computers, servers, phone systems, routers, switches, copiers, printers, battery backups, etc. Yes, please power off and unplug your UPS. If the power goes out, they will continuously beep and unnecessarily drain the battery. To make things easier, if all of your devices are connected to battery backups, you can power it off and unplug just the battery backup – this will make it easier in reconnecting and powering on.
  3. Disconnect network cables. Even though your computer or server may be unplugged and powered off, your network adapter could still be at risk. You can leave the cable plugged into the wall, simply remove it from the back of the PC/Server/Network Printer.
  4. Remove equipment from the floor space as best possible. Flooding can cause damage even if the devices are powered off and unplugged. So, try to store everything at least 24″ or more off of the ground.
  5. Move all equipment at least 6 feet away from doors and/or windows. If not possible, keep them off the ground, and do your best to wrap electronics in a plastic trash bag to prevent any water spray. This will not guard against falling trees or debris, but at least help keep your devices dry if water starts blowing into the building.
  6. Document all Software Licenses. If you have a folder/binder/drawer full of license keys, make a copy of them for safe keeping. Software can account for 30-50% of system cost. If your tower is tagged with a license key, take a picture or document the code and store them in a safe place. If you have a fire-proof safe, keep a copy there and take a copy with you.
  7. Make copies of software as needed. If you do not already have them stored on a CD/DVD, or other media, make backups of any software that you may need to help in restoring your home or business’ computers. These might be items like: Quickbooks/Quicken, other accounting/financial software, Client/Case Management software, Windows (XP/Vista/Windows 7), Microsoft Office, Server Software, Antivirus, and drivers.
  8. Print list of Contacts, Vendors, and Customer Info. You may need to contact customers or vendors before power is restored to your office. If you cannot access your PC, or the system is lost, it may be vital that you have a hard copy of contact information.
  9. Have a Business Continuity Plan. This plan should include how to contact other employees/co-workers, family, and clients in case the office/home is not accessible. Distribute cell numbers as well as home numbers and ask an out of area contact to be available to receive information from your employees in case of an emergency. Remember, during severe storms, cell phones may also not be operational for a period of time, so there may be times when communication is not possible.
  10. Insurance documentation. Know who your insurance company is and their contact information. Have a copy of both your policy and policy numbers safe. Document all assets accordingly in case of any loss. Pictures are always a good idea, but having a detailed list of the items is just as important.

This list is provided by Cralyn Technology Solutions. We are a full-service IT company, supporting both business and residential clients. If you have any questions or need assistance in performing any of the above steps, please contact us to schedule an appointment.

After the storm, if you need any assistance in reconnecting your systems/network or suffered a loss, contact us as soon as possible so we can get you back up and running with as little down-time as possible.

 

CRALYN TECHNOLOGY SOLUTIONS

Support@CralynTech.com – 407-710-7210

300 N. New York Avenue #1106, Winter Park, FL 32790

 

 

]]>
5 Ways to Clean Up Your Outlook Inbox https://cralyntech.com/5-ways-to-clean-up-your-outlook-inbox/?utm_source=rss&utm_medium=rss&utm_campaign=5-ways-to-clean-up-your-outlook-inbox Tue, 04 Aug 2015 04:09:26 +0000 http://cralyntech.com/?p=300

Continue reading]]> Here are 5 ways to clean up your Outlook inbox and folders so you can read and write email with less clutter. Plus, how to get rid of the emails you don’t need without losing the information.

Key takeaway points:

 

  • How to make a big reading and writing space
  • Don’t want the ribbon? Hide it
  • Clean up emails even faster

Additional Tips:

1) Move and change panes (View>Layout)

2) Collapse the ribbon (Ctrl+F1)

3) Preview docs and respond inline (new feature with Outlook 2013)

4) Conversation View (View>Show as Conversations)

5) Use the Clean Up Tool (Home>Clean Up)

References:

]]>
Are you protecting your intellectual property and creativity? https://cralyntech.com/are-you-protecting-your-intellectual-property-and-creativity/?utm_source=rss&utm_medium=rss&utm_campaign=are-you-protecting-your-intellectual-property-and-creativity Thu, 09 Apr 2015 16:00:20 +0000 http://cralyntech.com/?p=282

Continue reading]]>

Computer security should be a top priority for everyone – but especially anyone who makes a living off of their intellectual property or creations on computers. Whether they are spreadsheets, photos, music, writing, or any form of artwork, you want to make sure they are protected. Here are several tips to help keep you and your technology secure:

 

 

  1. First and foremost – backups! Too many people neglect making regular backups of their data, and some find out the hard way. How often should you back up? If you lost this entire weeks’ worth of work, how far would it set you back? Most businesses backup at least once per day, and some will backup multiple times per day. Backups can be automated to run on a schedule, and can be either local copies you maintain, or stored on a remote server. Discuss with a professional which is best in your scenario.
  2. Test your backups! Probably the next worst thing to not having a backup at all is thinking that you have one, and then finding out it was only a partial backup, or the backup itself was corrupt. Either you or your trusted technology advisor should perform a ‘disaster recovery’ test every so often to verify that your backups are both successful and complete in the event they are ever needed. Do not wait until it is too late and could cost hundreds or thousands in data recovery services.
  3. Make sure your passwords are both secure and complex. “Password” or “1234” are not sufficient passwords for any use – you might as well not even have one? Hackers are using programs that go through either dictionary-like lists of names and passwords, or use ‘brute-force’ attacks stepping through every possible combination of a password until they get a successful return. Once they have it, they do not need to change your password to lock you out – in fact, they do not want you to know they have it because as long as you are not suspicious, they have free reign over your data/systems. Change your password at a regular interval, and please use something of substance/complexity. A good password contains 8+ characters, both upper and lower case letters, with numbers, and even possibly a symbol. Stay away from names, birthdates, etc, or anything else easy to guess.
  4. Phishing Sites. A phishing site is one that looks like the real site, but is looking for you to enter your name and password, or other personal information. Always look at your address bar if ever in doubt, and BEFORE you enter your password. Once you enter information into a phishing site and click submit, the hacker has your information. If this happens, immediately change your password!
  5. Antivirus. Yes, even Mac’s are susceptible to viruses. Everyone needs to have an antivirus program, make sure it is up to date, and run scans frequently. Your computer cannot run a virus scan at 3am if your system is turned off. Find out what day/time your scheduled scan is to run, and make sure your system is on. Most antivirus programs try to have their scan run in the ‘off’ hours, so it does not impact your performance. The average virus scan can take anywhere from 30 minutes, up to 2+ hours, depending on the speed of your system and the amount of data to be scanned.
  6. Virus pop-ups. Be on the lookout for suspicious pop-ups or websites that say you are infected with a virus. BEFORE YOU CLICK ON ANYTHING, ASK! Most of these pop-ups or pages are the virus (called Trojans), and want you to think they are doing something good for you, when in reality they are the virus and about to infect your system. More often than not, you have the ability to prevent the virus if you get one of these messages – as long as you do not click on it and allow the virus to install itself and become active. Can’t close the page? Shut your system down – a restart might be safer than constantly clicking to attempt to exit from these messages. And, never feel that just because you have an antivirus program that you are impervious. The first thing these Trojans will do is disable your antivirus and invite their friends to wreak havoc on your system.
  7. Keep your software up to date. Whether it is Windows, Adobe, Office, Mac OS, or Java, it is just as important to keep your systems up to date with their software. Often times, developers will release Critical Security Updates that patch holes which have already been exploited by hackers. Without these updates, your system could be vulnerable.
  8. Use a trusted technology expert. Maybe a friend, family member, colleague, or an outside business – but have someone you can talk to about your computer issues or concerns. At CralynTech, we try to teach our clients as much as they would like to learn about their systems, how to use them more efficiently, and always try to answer every question to the best of our ability. We service all levels of clients, from individuals to small businesses, one computer or twenty – all of our clients receive the same respect and honest answers they deserve.
]]>
How Fast is Your Internet? https://cralyntech.com/speedtest-how-fast-is-your-internet/?utm_source=rss&utm_medium=rss&utm_campaign=speedtest-how-fast-is-your-internet Fri, 01 Mar 2013 04:36:47 +0000 http://cralyntech.com/?p=156

Continue reading]]> Are you here,

But want to be here?

 

Let Cralyn Tech help increase your Internet speed and get you working faster.

Whether it is your Internet Service Provider, your Router, Network Switch, or Wireless, we can help identify the slow points on your network and make the cost-effective recommendations to get you where you want to be. We can help you find the fastest available connections and the best prices in your area.

 

Give us a call or send us a message today for a no-obligation network inspection!

[contact_form]

]]>