BLOG POSTS

The K.I.S. Blog for Friday, November 17, 2017

 

Archiving vs. Backup—What’s the Difference?

 

Although the terms backup and archive are sometimes used interchangeably, they actually refer to two completely different processes. Both deal with long-term data storage, yes, but that is where the similarities end.

 

Backups are designed to provide an organization with a way of recovering its data following some sort of catastrophe. As such, a backup can be thought of as a restorable, point-in-time copy of an organization’s data, or of entire systems. Conversely, archives are not designed to act as a rescue mechanism to be used following a data loss event. Instead, archives are typically used as a tool for reducing storage costs.

 

Backup solutions tend to overwrite—or retire—backups after a specific length of time. Depending on how an organization’s backups are set up, the system may only retain backups for a month or two. Archives, on the other hand, can store data for decades. Furthermore, an archive system can sometimes automate the process of identifying aging data and moving that data to the archive. If you were to use backup software as a solution for archiving data, this would largely require a manual process.

 

So, as you can see, backups and archives serve two completely different purposes. Backups are used for recovering data following a catastrophic event, whereas archives are used to move aging data off of primary storage in an effort to reduce storage costs.

 

_________________________________________________________________________________________________________________________

 

The K.I.S. Blog for Monday, November 13, 2017

Managed Backup – Reducing the cost of Data Assurance

 

What would be the cost to your business if you lost critical data?

 

Your business data is the lifeblood of your company and the amount you are collecting and storing is growing all the time. Imagine the impact if you lost a day’s data, a week’s data, a year’s data, due to inadequate or infrequent back-up processes. What would happen, and could you recover?

A managed backup service from Kempenfelt Imaging Systems Inc. ensures that all files are automatically backed up frequently, and it will likely cost less than your monthly phone bill. So, how much is your data worth?

 

Benefits of a Managed Backup:

 

  1. Low Cost of Ownership
  2. Total peace of mind
  3. Reduce your day-to-day operating costs
  4. Safeguard Business Information
  5. Ensure Business Continuity
  6. Increase Productivity and Decrease Downtime
  7. Detailed Reporting Information

 

Don’t risk your business being unprepared. Call today for a custom quote!

 

____________________________________________________________________________________________________________________________

 

The K.I.S. Blog for Thursday, November 2, 2017

The Top 5 Challenges in Information Security

 

1.    IoT devices are weapons waiting to happen. They are typically impossible to secure, and are growing too rapidly to keep track of. It is estimated that by the year 2020, there will be 4.3 internet connected devices per person on the planet!

 

2.    The Public Cloud expands the attack surface, and restricts network-wide visibility. It also hinders enforcement of consistent policies. It is predicted that 92% of workloads will be processed by cloud data centers in the next few years (accordding to Forbes)

 

3.    Ransomware is increasingly more sophisticated and harder to detect. It is becoming less expensive, and easier to launch. It is estimated by experts that Ransomware cost more than 1 billion dollars in 2016.

 

4.    SSL encrypted traffic hides malware and other malicious threats. It requires resource intensive inspection, and the volume is growing quickly. More than 50% of network traffic is encrypted.

 

5.    There is a cybersecurity skills gap, which is responsible for a growing number of security events. This makes it difficult to plan, manage and improve security posture.

 

The only solution to these challenges is integrated security to protect against attacks from all vendors, shared intelligence and automation for faster response to threats, and visibility and policy enforcement across entire network from endpoint to cloud.

______________________________________________________________________________________________________________________________

 

The K.I.S. Blog for Wednesday, October 25, 2017

OFGO Custom Furniture Solutions

 

Do you have a special idea in mind that you want to turn into reality? Kempenfelt Imaging Systems and OFGO can work together to produce the made-to-order furniture that you need to bring your idea to life!

 

Using the latest CNC machinery, OFGO fabricates made-to-order furniture to your exact specifications, ensuring that the work is done right the first time, every time. Our in-house customer service team coordinates with you to keep you up to date at every step of the process, from design to delivery. Our custom solution process involves a presentation of Design Layouts in 2D & 3D, modifications, revisions, and final approval. After this, OFGO’s in-house development staff will create a CNC machine computer program to be used in the fabrication of the custom furniture. OFGO makes a computer program for every custom solution they create. By doing so, they can ensure 100% cutting and drilling accuracy within the manufacturing process.

 

Contact our furniture solutions department today to set up a complimentary design meeting.

_________________________________________________________________________________________________________________________________

 

The K.I.S. Blog for Monday, October 23, 2017

Fortinet Enterprise Telephone System Built In Highlights

 

FortiVoice Enterprise systems include all the fundamentals of enterprise-class voice communications, with no additional licenses to buy or cards to install. Auto attendants, auto provisioning, line/extension appearance, ring groups, user privileges, call queue, call barge, multi-location integration and much more are built-in. FortiVoice systems are easy to purchase, easy to install and easy to manage, so you save the headaches that come with most enterprise phone systems.

The FortiVoice personal web portal lets your staff view their call logs, configure and manage their own messaging and access other features. Your employees get control over their phones, and your IT staff get a break from having to configure every little change.

Here are some of our favorite features:

 

  • Auto attendants and music on hold
  • Remote extensions, which allow for call forwarding from your office line to your cell phone, e-mail etc when you are away from the office
  • Auto provisioning
  • Web-based management
  • User interfaces
  • Real-time call status monitoring, line/extension appearance
  • Fax service
  • Rule-based dial plan AND
  • Call recording

____________________________________________________________________________________________________________________________________

 

The K.I.S. Blog for Monday, October 16, 2017

Listen to our new radio ad here! 

 

Our new radio ad, featuring K.I.S President Jody, and our Sales and Marketing Coordinator Jenna, is now live on 107.5 Kool FM. Playing weekdays at 5:30 and 6:00 a.m. Check out the audio clip here:

 

______________________________________________________________________________________________________________________________________

 

The K.I.S. Blog for Monday, August 14, 2017

7 Steps to help limit your chances of getting hit by a ransomware attack

 

1. Do not trust the e-mail display name – Do not trust the name that is displayed. If it looks suspicious, don’t open the email.

 

2. Look, but don’t click – Hover your mouse over any links embedded in the body of the email. If the link address looks strange or nonstandard or you don’t recognize it, don’t click on it.

 

3. Don’t enable macros in document attachments received via e-mail

 

4. Check for spelling mistakes – Legitimate messages usually do not have major spelling mistakes or poor grammar.

 

5. Do not give up personal information – Legitimate companies and financial institutions will never ask for personal credentials via email.

 

6. Beware of urgent or threatening language – Invoking a sense of urgency or fear is a common phishing tactic.

 

7. Don’t believe everything you see – Just because an email has convincing brand logos, language, and a seemingly valid email address, does not mean that it is legitimate.

 

_______________________________________________________________________________________________________________________________________

 

The K.I.S. Blog for Friday, June 30, 2017

K.I.S is now offering a full range of Fortinet IP Telephones

 

Kempenfelt Imaging is now Fortinet certified. We offer complete business telephone systems to accommodate your organization’s individual needs. Some of the features that accompany Fortinet IP phones are:
  • Visual Notifications
  • Auto discovery for easy setup
  • Conference calling
  • Speed dialing
  • Do Not Disturb
  • One touch transfers
  • HD Quality Audio

 

Call us for more details, or click here for more information

______________________________________________________________________________________________________________________________________
 The K.I.S. Blog for Monday, June 26, 2017

Taking a proactive approach to protecting your organization from Ransomware

 

Recent cyber threats and attacks, such as WannaCry and CryptoLocker, remind us of the importance of having the necessary backups and antivirus in place to protect our information. Different strains of ransomware can spread automatically across all workstations in a network, compromising workstations and servers alike.

 

KIS IT always recommends exercising extreme caution when you get an email with an attachment you did not ask for. For example, if you see a .zip file in the attachment, never click on it.  Instead delete the whole email.  Normally no one would send a Zip file.  Remember: “If in doubt, throw it out!”

 

If you are a Managed Services Client of ours, our engineering team routinely patches our clientele’s Windows operating systems, and we are confident that the security measures we have employed will stand up against these types of attacks and our recovery systems would allow us to recover rapidly should you become compromised.

 

If you are not a Managed Services client of ours, you may want to consider becoming one.  We will proactively monitor and maintain the health of your network and fully support your end users.  Our Security specialists will help ensure that you have the right layered security in place to help prevent problems and we will help to create disaster recovery plans to support your business if one occurs.  Our goal as your managed IT partner is to help you reach your goals while minimizing business risks.
If you or a co-worker are concerned that you may have clicked on something or have an active infection, it is imperative to report it immediately to your IT staff or to us.  Unreported Incidents can lead to mass infections and widespread network damage that otherwise could have been addressed quickly.

______________________________________________________________________________________________________________________________________

 

The K.I.S. Blog for Friday, June 23, 2017

Why our clients choose our Managed Anti-virus Solution

 

Keeping your business protected requires more than just off the shelf software. Our Managed Anti-virus solution delivers enterprise class protection, and is maintained 24/7 by our technical team, keeping your business secure while saving you money.

Stand-alone Anti-virus Software

* Provides a point solution to specific issues

* Requires manual monitoring and maintenance to remain current and effective

* Relies on end-user decisions for operation

* Does not provide consistent version control across desktops

* Does not provide centralized management

 

VS

 

Managed Anti-virus

* Provides proactive and comprehensive security, monitoring and management

* Centralizes the deployment and updating of software to ensure coverage and consistency

* Automates management processes to avoid errors and reduce costs

* Leverages expert IT skills