Cloud computing: What is it and how can it help you and your business?
- Thursday, 20 February 2014 08:39
~~Something we hear a lot about lately is “the cloud.” But what is it exactly and why has it become important in both the business and private sectors? The term is so popular these days that it has become somewhat a cliché. And within that cliché, it has become harder and harder to define this nebulous term that everyone seems to keep flinging around. Some even go as far as defining the cloud as anything outside your firewall. But cloud computing is really more a great way for your business to add computing capacity and capabilities without investing in costly infrastructure and the time it takes to get these physical, site-based systems up and running including training personnel in its use, software licensing. Cloud computing involves subscription or pay-per-use services that can increase your company’s computing capabilities by using the internet. These services usually involve renting out space on a server or remote computer and retrieving the information stored in that space or using that remote system’s computing powers for your business needs. These services include, but are not limited to, applications like word processing and accounting, secure data storage, and spam filtering to name a few. These services are offered through a wide variety of companies, large and small. It can be difficult to know which service, subscription or application is right for you.
TRA Consulting, a computer solutions firm based in Long Beach, can help you decide which cloud computing options might work best for your small or medium-sized business and then help you implement those services. But first, let’s discuss the kinds of subscriptions and services that are available to you through cloud computing. Desktop management services are one of the aspects of cloud computing that has been around the longest. This allows updates, software downloads and computer maintenance on your business’ computers to be done from a remote location. Another aspect of cloud computing is software as a service or SaaS. This allows users to access a program or application through the internet which sometimes makes it cheaper than hosting the application on your own local servers and avoiding costly software licensing. SaaS is commonly used for Human Resources apps and ERP (Enterprise Resource Planning, a popular business management software). Online data storage is another aspect of cloud computing, these services are helping to augment datacenters through the use of virtual commodity servers. There are some web services that are also important parts of cloud computing. These web services offer APIs (application programming interface) that allow you to do payroll processing, postal services, credit card processing and mapping all through cloud computing.
While the term cloud computing is still a mystery to most and can mean a number of different things to different people, there are many great ways that cloud computing can help you and your business thrive. Contact TRA Consulting, Inc. today to find out how we can help you expand your businesses computing power without much extra cost.
The Hacking Epidemic at the Sochi 2014 Winter Olympics
- Wednesday, 19 February 2014 09:22
~~The Sochi 2014 Winter Olympics in Russia are in the final stretch. In just a few days, athletes from around the world will be completing their competitions, attending the closing ceremonies, and heading home. But in the meantime, smart phones, computers and tablets in Sochi have been under near constant attack from hackers since before the games began. As NBC Nightly News reported on February 4th, when athletes, support teams, volunteers, reporters, and spectators began arriving in Sochi, Russia in preparation for the games, they found their electronic devices were quickly threatened.
Most people turn on their cell phones when they get off the airplane upon arriving in a new place. When they get to their hotel, they usually fire-up their laptops or tablets. It seems like a very natural thing to do these days, especially when you want to let loved ones and colleagues know you have arrived safely and catch up on any correspondence you might have missed. But as several news stories have warned, hackers are taking advantage of the huge influx of unwitting Olympic visitors to Sochi to gain as much personal information or other sensitive data from the devices that came into the country with their owners. Phones may be tapped wirelessly and hackers can listen into your conversations, and in many cases smart phones automatically downloaded malware that left it open to other types of cyber attacks. The information gleaned by hackers about visitors then might be used by that hacker for theft, or sold to other criminal enterprises for the purposes of identity theft, or even completely hijack a visitors’ computer, tablet or phone to carry out criminal activities.
News sources reporting on the wide-spread hacking in Sochi are reporting that travelers are advised to have no expectation of privacy when they arrive in Sochi. These sources also recommended that travelers remove all sensitive data from smart phones, tablets and computers before leaving home, avoid the public wifi, not use their devices at all, or just leave them at home. Another option might be to buy a new disposable phone once you arrive at your destination for use only in that location.
Whether you traveled to Sochi to enjoy the Winter Olympics, or you are an armchair warrior watching from home, it’s smart to think ahead about computer security here at home and for when you travel. As the example from the Sochi Winter Olympics illustrates, traveling has taken on a new dimension in terms of computer safety and security. At TRA Consulting, let us handle the headache for you. We can advise you on the best way to keep your devices safe for your next business trip or vacation. If you have recently returned from travels, we can help with virus removal and protect your computer, tablet, or phone from future threats. We are serving the Long Beach and Greater Los Angeles areas with computer solutions, training, consulting, and virus removal for individuals, small, and medium-sized businesses
Cyber Attacks on Businesses During the 2014 Sochi Winter Olympics
- Wednesday, 19 February 2014 09:21
~~The 2014 Winter Olympics in Sochi Russia are winding down and in a few days, athletes and spectators will be attending the closing ceremonies and hoping flights headed home. Many news outlets have warned since before the games started that individuals traveling to Sochi were at great risk for hacking to their computers, tablets, and mobile devices and that information privacy in Russia would be difficult to come by. But other news sources are also warning that businesses are also vulnerable to cyber criminals during the 2014 Sochi Winter Olympics. And the bad news is that you don’t even have to travel outside of your country of origin to be targeted by hackers that are taking advantage of the excitement around the Winter Olympics. Many computer experts are warning businesses to be vigilant against attacks from the start of the Winter Olympics opening ceremony at the Fisht Olympic Stadium, to the closing ceremonies that will take place on Sunday February 23, 2014.
There will be a lot of interest in the games throughout the two and a half weeks they are held and that offers cyber criminals a perfect window of opportunity to target users with phishing attacks by masking emails designed to steal information. These emails are often disguised as updates on the games, sports commentary or other insights about the Winter Games. Hackers will then capitalize on this interest in the Winter Games by using those emails to inject malware, viruses and tracking software, sometimes right onto company servers. Other attacks on computer systems may not have criminal intent, but may be just as difficult to deal with. These would come in the form of cyber attacks from what’s now known as hacktivists. These are activists for social justice issues that use the internet, computers, and hacking to send a message about the social cause they are promoting, but hacktivists can also carry out acts of terrorism in their attempts to express their dissent. And just like the cyber criminals mentioned above, these hacker/activists are attracted to events that garner a lot of public attention because they believe they can get their message out to a wider audience.
At TRA Consulting, a busy IT solutions firm serving the Long Beach, Orange County and the Greater Los Angeles area, we can help you protect your business from phishing scams and other hacking activities by making sure your system is secure from top-to-bottom. We offer computing solutions for server and network security, set-up of email filters and firewalls that will help you and your employees save valuable time by ensuring that your important transactions and communications remain secure and private. One of the newer ways of securing email is to use Domain-based Message Authentication, Reporting & Conformance or DMARC which uses the Domain Name System or DNS to check the authenticity of your emails every step of the way. Contact TRA Consulting today and we can discuss security solutions and logistics for you and your business.
Sochi Olympics IT
- Sunday, 16 February 2014 09:17
The Sochi Olympics Winter Games are an outstanding opportunity to showcase the convergence of IT and sports medicine. I would like to see more IT in the coverage of the games.
TRA Consulting is your number one source for managed services
IE11 and Buggy Software
- Sunday, 16 February 2014 09:14
~~November 2013 saw the release of Microsoft’s latest version of Internet Explorer, IE 11 for Windows 7. The new web browser’s impact is growing as many Windows 7 and Windows 8 users install this new version of Internet Explorer as part of their regular Windows Updates. As touted by Microsoft, there are a few benefits to the new browser such as faster rendering (loading) of web pages, better security, and it is also optimized for the touch screen interfaces that are now being used with the new Windows 8 platform. All of these sound like steps in the right direction, but, in providing desktop support for the business clients of TRA Consulting, I find that I am spending a considerable amount of time preventing IE 11 from being installed in the first place, and removing this latest incarnation of IE when it has caused problems for users. Whenever a new version of Internet Explorer is released, there is always quite a bit of trouble for computer users in making the transition. This is particularly true in the business world where businesses are tied in to other programs that need Internet Explorer in order to work and are needed in the day-to-day running of the business.
One of the problems caused by the update of IE 11 lies in the fact that the development of the many add-ons and extensions created for in Internet Explorer for business-use have not kept pace with Microsoft’s efforts to keep IE relevant to home users. These add-ons and extensions for business-use are often created by smaller third-party companies that usually don’t have the personnel or resources to keep up with Microsoft’s many changes. As a result, there can often be a disconnect in the coding between newer and older versions of Internet Explorer and its interfaces with other programs that were created for older versions of IE, causing users to report bugs.
For example, one of the companies we support has financial accounts at a bank that allows users to print checks directly from the bank’s web site using a compatible check printer. The bank’s site and the printer are accessed exclusively through Internet Explorer up through version 9. By default, IE is set to automatically update to the latest version via Windows Update. Once the IE 10 and IE 11 updates were released, users at this company started reporting problems regarding check-printing. We solved the problem by un-installing IE 10 and IE 11 and rolled the users back to IE 9 and blocked any further updates until printer add-on has been updated to be compatible for further versions of Internet Explorer.
Employees can sometimes waste valuable time trying to find a work-around or a solution to these problems, when their time could be spent more productively. Businesses can increase and facilitate the productivity of employees by providing them with smooth and user-friendly computer systems. We can help by providing pro-active desktop support through remote management software (RMM), and personal one-on-one service from TRA Consulting which means we can block and/or remove IE 11 on each managed system individually or as a group in a matter of minutes; thus saving time and keeping IT costs for our customers in line with their projections.