IT Free Fall: The Business Owner's Guide to Avoiding Technology Pitfalls
()
About this ebook
Is Your Computer Support Guy Giving You The “Runaround”? Not returning your calls fast enough... Constantly missing deadlines... Not fixing things right the first time... Never following up on your requests? I think it’s about time someone finally got it right. That’s why we decided to start IT Free Fall and committed ourselves to helping business owners. If you just want your IT problems handled quickly and correctly the first time, this book is for you!
Nick Bernfeld
Nick Bernfeld was born in Copenhagen, Denmark in 1984. He moved over to America when he was 6 years old, and has been living in Rhode Island ever since. Nick brings a high level of energy and determination to his work. He loves all thing tech, and is always the first to get the latest gadget, whether it's the latest iPhone or Microsoft Server software. He loves challenging himself to reach new heights, both mentally and physically. Such as going paragliding, kiteboarding, and heli-skiing.
Related to IT Free Fall
Related ebooks
Cracking the IT Code: Technology Management for Non-Technology Managers Rating: 5 out of 5 stars5/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsCyber Essentials: A Pocket Guide Rating: 5 out of 5 stars5/5Selling Information Security to the Board: A Primer Rating: 0 out of 5 stars0 ratingsFortify Your Data: A Guide to the Emerging Technologies Rating: 0 out of 5 stars0 ratingsThe Future and Opportunities of Cybersecurity in the Workforce Rating: 3 out of 5 stars3/5Keeping The Barbarians Out: How CIOs Can Secure Their Department and Company Rating: 0 out of 5 stars0 ratingsThe Secure CEO: How to Protect Your Computer Systems, Your Company, and Your Job Rating: 0 out of 5 stars0 ratingsAvoiding Software Project Pitfalls: Seven Simple Ground Rules That Could Save Your Career Rating: 4 out of 5 stars4/5Harvard Business Review on Aligning Technology with Strategy Rating: 3 out of 5 stars3/5Cybersecurity for Small Businesses: Comprehensive Guide to Protecting a Small Business from Various Types of Cyber Threats Rating: 0 out of 5 stars0 ratingsFrom Exposed to Secure: The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep Your Company Safe Rating: 0 out of 5 stars0 ratings8 Things We Hate About IT: How to Move Beyond the Frustrations to Form a New Partnership with IT Rating: 3 out of 5 stars3/5Consumption Economics: The New Rules of Tech Rating: 5 out of 5 stars5/5Going Global on a Shoestring: Global Expansion in the Software Industry on a Small Budget Rating: 5 out of 5 stars5/5Starting a Tech Business: A Practical Guide for Anyone Creating or Designing Applications or Software Rating: 4 out of 5 stars4/5IT Induction and Information Security Awareness: A Pocket Guide Rating: 0 out of 5 stars0 ratingsHow to Start and Run an IT Consultancy Business Rating: 0 out of 5 stars0 ratingsThe IT Professional's Guide to Researching a New Industry: Get to know your industry for a happy and successful career Rating: 0 out of 5 stars0 ratingsAI For Entreprender: How to successfully build, grow or expand your business using artificial intelligence Rating: 0 out of 5 stars0 ratingsSmiling Security: The Cybersecurity Manager's Road to Success Rating: 0 out of 5 stars0 ratingsBring Your Own Device (BYOD): The mobile computing challenge Rating: 0 out of 5 stars0 ratingsCybersecurity Essentials for Small Businesses: Safeguarding Your Digital Assets Rating: 0 out of 5 stars0 ratingsThe 24-Hour Customer: New Rules for Winning in a Time-Starved, Always-Connected Economy Rating: 5 out of 5 stars5/5A Best Practices Guide for Comprehensive Employee Awareness Programs Rating: 0 out of 5 stars0 ratingsComplexity Avalanche: Overcoming the Threat to Technology Adoption Rating: 0 out of 5 stars0 ratingsUnlock the Potential of AI in Your Business: A Step-by-Step Guide for Non-Techies Rating: 0 out of 5 stars0 ratingsThe New IT Leader Rating: 0 out of 5 stars0 ratingsEvent Processing for Business: Organizing the Real-Time Enterprise Rating: 0 out of 5 stars0 ratings
Business For You
Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5Law of Connection: Lesson 10 from The 21 Irrefutable Laws of Leadership Rating: 4 out of 5 stars4/5Collaborating with the Enemy: How to Work with People You Don’t Agree with or Like or Trust Rating: 4 out of 5 stars4/5Leadership and Self-Deception: Getting out of the Box Rating: 4 out of 5 stars4/5The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5Crucial Conversations: Tools for Talking When Stakes are High, Third Edition Rating: 4 out of 5 stars4/5Crucial Conversations Tools for Talking When Stakes Are High, Second Edition Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5Just Listen: Discover the Secret to Getting Through to Absolutely Anyone Rating: 4 out of 5 stars4/5Set for Life: An All-Out Approach to Early Financial Freedom Rating: 4 out of 5 stars4/5Confessions of an Economic Hit Man, 3rd Edition Rating: 5 out of 5 stars5/5Summary of J.L. Collins's The Simple Path to Wealth Rating: 5 out of 5 stars5/5The Catalyst: How to Change Anyone's Mind Rating: 4 out of 5 stars4/5Tools Of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers Rating: 4 out of 5 stars4/5Robert's Rules Of Order Rating: 5 out of 5 stars5/5Buy, Rehab, Rent, Refinance, Repeat: The BRRRR Rental Property Investment Strategy Made Simple Rating: 5 out of 5 stars5/5High Conflict: Why We Get Trapped and How We Get Out Rating: 4 out of 5 stars4/5Capitalism and Freedom Rating: 4 out of 5 stars4/5Lying Rating: 4 out of 5 stars4/5The Five Dysfunctions of a Team: A Leadership Fable, 20th Anniversary Edition Rating: 4 out of 5 stars4/5Robert's Rules of Order: The Original Manual for Assembly Rules, Business Etiquette, and Conduct Rating: 4 out of 5 stars4/5Invisible Influence: The Hidden Forces that Shape Behavior Rating: 4 out of 5 stars4/5The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5Emotional Intelligence: Exploring the Most Powerful Intelligence Ever Discovered Rating: 5 out of 5 stars5/5Summary of Eve Rodsky's Fair Play Rating: 2 out of 5 stars2/5
Reviews for IT Free Fall
0 ratings0 reviews
Book preview
IT Free Fall - Nick Bernfeld
IT FREE
FALL
THE BUSINESS OWNER’S GUIDE TO AVOIDING TECHNOLOGY PITFALLS
by
Nick Bernfeld & Paul Riendeau
Copyright © 2015 by Nick Bernfeld & Paul Riendeau
All rights reserved.
This book or any portion thereof may not be reproduced or used in any manner whatsoever without the express written permission of the publisher except for the use of brief quotations in a book review.
First Printing, 2015
Printed in the United States of America
ISBN: 978-0692446928
More information can be found at:
http://www.itfreefall.com/
This book is dedicated to the clients of SNECS, LLC.
Thank you for giving us the honor and privilege of serving you.
Table of Contents
INTRODUCTION: TECHNOLOGY IS BECOMING MORE COMPLICATED? CAN YOU KEEP UP?
It's Not a Matter Of If, But When, Technology Fails
Why Finding a Competent Computer Consultant Isn't As Easy As a Quick Google Search
CHAPTER ONE: THE INVISIBLE COSTS OF CHOOSING THE WRONG IT COMPANY
Statistics That Should Frighten You
How Much Does Bad Advice Actually Cost Your Business?
CHAPTER TWO: IT SUPPORT 101 – WHAT ARE YOUR OPTIONS?
Not Doing Anything
DIY Support
Outsourcing to a Competent IT Professional
1. Vendor Support
2. Computer Support Hotlines
3. Part-Time IT People and New Technicians Trying to Start Out on Their Own
4. Large Tech Support Companies
5. Independently Owned IT Firms
CHAPTER THREE: EVERYTHING YOU EVER WANTED TO KNOW ABOUT CHOOSING AN IT CONSULTANT
10 Characteristics of a Competent Computer Consultant
1. Qualifications & Experience
How to Determine a Consultant’s Qualifications Before It’s Too Late
2. Client References
3. The Importance of Multiple Technicians
4. Availability and Response Time
5. Get Everything in Writing
6. Insurance
7. Understanding Your Business
8. Professional Appearance and Demeanor
9. Detailed Invoicing
10. Clear Communication
Relationships, Attitudes, and Service
CHAPTER FOUR: STEERING CLEAR OF DISASTER
Determining Priorities
Price
Testing Consultants by Starting Small
Fixed Pricing is Always Better than an Hourly Rate
Get It in Writing
Communicating Concerns
CHAPTER FIVE: YOU’VE FOUND THE PERFECT CONSULTANT – NOW WHAT?
Taking Responsibility for Network Integrity and Protection
How Spyware, Viruses, and Other Malware Get on Your Network
Creating and Enforcing an AUP
Being the Dream Client
Consultants Love Working With
Three Tips for Fostering a Good Relationship with Your Consultant
CHAPTER SIX: THE IMPORTANCE OF PROACTIVE MAINTENANCE
How Managed Services Work and Why It’s Important for Your Business
Benefits of Managed Services
Things to Look for in a Managed Services Plan
The Benefits of a Working Ticketing System
CHAPTER SEVEN: PRICING, CONTRACTS, AND NEGOTIATING RATES
Establishing Guarantees (In Writing)
Payment Terms
Timelines and Scheduling
Changes and Scope Creep
Hardware and Software Costs
Arbitration
INTRODUCTION TO PART TWO
CHAPTER EIGHT: POLICY DEVELOPMENT AND MANAGEMENT
Establishing Security Roles and Responsibilities
Creating an AUP
Don’t Forget about Social Media
CHAPTER NINE: SCAMS & FRAUD
The Dangers of Social Engineering
Online Fraud
Phishing Scams
Rogue Antivirus Offers
Other Malware Threats
CHAPTER TEN: NETWORK SECURITY
Securing the Internal Network and Cloud Services
Enforcing Strong Password Policies
Securing Wi-Fi
Encrypting Sensitive Data
Regular Application Updates
Using VPN for Remote Access
CHAPTER ELEVEN: WEBSITE SECURITY
Proper Planning is Essential
Web Server Operating Systems
Monitoring the Content Published on Your Website
Preventing Unauthorized Access
Beware of Active Content
CHAPTER TWELVE: EMAIL
Spam Filtering
Employee Training
Sensitive Information and Email Don’t Mix Well
Email Retention Policies
Developing an Email Usage Policy
CHAPTER THIRTEEN: MOBILE DEVICES
Security Software
Ensure Software is Up-to-date
Encryption
Password Protection
Reporting Procedures for Lost/Stolen Equipment
Disposal Procedures
CHAPTER FOURTEEN: EMPLOYEES
Vetting Job Candidates
Setting Appropriate Access Controls
Proper Security Training for Employees
CHAPTER FIFTEEN: PHYSICAL SECURITY
The Importance of Securing Your Facility
Be Mindful of Printed Materials Containing Sensitive Information
Securing Snail Mail
CHAPTER SIXTEEN: OPSEC
Identifying Critical Information
Analyzing Threats
Analyzing Vulnerabilities
Assessing Risk
Applying OPSEC Countermeasures
CHAPTER SEVENTEEN: PAYMENT SECURITY
Understanding the Data You Keep
Access Control
CHAPTER EIGHTEEN: INCIDENT REPORTING
Notify Law Enforcement (if necessary)
Work with Leadership Teams to Mitigate Damage
Recovery
Learning from the Incident
THANK YOUR FOR READING: A QUICK WORD FROM THE AUTHORS
GLOSSARY OF TERMS: DON’T BE FOOLED BY GEEK SPEAK
REFERENCES
INTRODUCTION: TECHNOLOGY IS BECOMING MORE COMPLICATED? CAN YOU KEEP UP?
It doesn't matter if you are at the helm of a growing business with lots of employees or if you proudly own a small Mom and Pop
operation, every modern business needs technology to function. From payment processing to marketing and advertising to accounting, every business in existence today relies on at least some level of technology to conduct daily business operations.
When everything is working properly, this increased dependence on technology is a good thing. Computers and related technology provide your business with numerous advantages including increased productivity, better customer service, and accurate reporting that can be used to plan for the future.
But what happens when this technology doesn't work? This is the downside of technology, and it can be frustrating at the very least. In extreme cases of technology failure, an entire business can be destroyed overnight. Whether it's a temporary setback or a major disaster, a technology failure is a serious concern -- or at least it should be. Lost revenue, a decreasing customer base, and a host of other issues can all result from even a relatively small network outage lasting only a few hours.
It's Not a Matter Of If, But When, Technology Fails
No business is immune from computer problems and failures. Sure, that fancy new machine you just bought may work well with no maintenance for the first month or two of service, but what happens when that shiny new machine gets a virus, needs a critical security update, or crashes randomly for no apparent reason? What if that machine is essential to your business? Think payment processing, monitoring inventory, order taking, payroll, etc… The list of business-critical processes that could be affected by a technology failure is endless, but the consequences are almost always the same.
And don't forget about the complexity of installing new equipment in the first place. What do you buy? How will these new purchases integrate with existing hardware and software? It's OK if you don't know the answers to these questions. The reality is that most business owners don't. After all, you're worried about maintaining and growing your business, not the latest trends in wireless access points, solid state hard drives, and how many terabytes of data storage you need to store important customer data, right?
While it's true that many small business owners are forced to wear many hats, staying on top of technology trends and understanding the nuances of network maintenance is a job best left to the professionals.
The costs of not taking Information Technology (IT) seriously can be astronomical. Although you will learn much more about how expensive poor IT management can be in Chapter One, businesses have gone bankrupt practically overnight because of catastrophic data loss. These horror stories happen all the time and what's even worse is that most of them could have been avoided had the business spent more time properly managing the technology responsible for the failure.
And let's not forget about the growing concerns surrounding the security of your business technology. There are hackers around the world that would simply love to gain access to your network and use your business and customer data for many nefarious purposes. One only needs to peruse the news headlines to find countless stories of businesses large and small that have been victimized by hackers. Major retailers including Target, Neiman Marcus, Home Depot, and Adobe have all fallen victim to embarrassing and expensive security breaches in just the last year. If these large companies are susceptible to attack, what makes you think your business isn't as well? The difference is that your Small to Mid-Sized Business (SMB) may not have deep enough pockets to recover from such a catastrophic breach. In the Target breach, for example, the payment information for over 40 million customers was compromised. Could your business recover from a similar disaster? In most cases, the answer is nope, not a chance.
Network security is a whole separate issue and also something