The K.I.S. Blog for Friday, November 17, 2017
Although the terms backup and archive are sometimes used interchangeably, they actually refer to two completely different processes. Both deal with long-term data storage, yes, but that is where the similarities end.
Backups are designed to provide an organization with a way of recovering its data following some sort of catastrophe. As such, a backup can be thought of as a restorable, point-in-time copy of an organization’s data, or of entire systems. Conversely, archives are not designed to act as a rescue mechanism to be used following a data loss event. Instead, archives are typically used as a tool for reducing storage costs.
Backup solutions tend to overwrite—or retire—backups after a specific length of time. Depending on how an organization’s backups are set up, the system may only retain backups for a month or two. Archives, on the other hand, can store data for decades. Furthermore, an archive system can sometimes automate the process of identifying aging data and moving that data to the archive. If you were to use backup software as a solution for archiving data, this would largely require a manual process.
So, as you can see, backups and archives serve two completely different purposes. Backups are used for recovering data following a catastrophic event, whereas archives are used to move aging data off of primary storage in an effort to reduce storage costs.
The K.I.S. Blog for Monday, November 13, 2017
What would be the cost to your business if you lost critical data?
Your business data is the lifeblood of your company and the amount you are collecting and storing is growing all the time. Imagine the impact if you lost a day’s data, a week’s data, a year’s data, due to inadequate or infrequent back-up processes. What would happen, and could you recover?
A managed backup service from Kempenfelt Imaging Systems Inc. ensures that all files are automatically backed up frequently, and it will likely cost less than your monthly phone bill. So, how much is your data worth?
Benefits of a Managed Backup:
Don’t risk your business being unprepared. Call today for a custom quote!
The K.I.S. Blog for Thursday, November 2, 2017
1. IoT devices are weapons waiting to happen. They are typically impossible to secure, and are growing too rapidly to keep track of. It is estimated that by the year 2020, there will be 4.3 internet connected devices per person on the planet!
2. The Public Cloud expands the attack surface, and restricts network-wide visibility. It also hinders enforcement of consistent policies. It is predicted that 92% of workloads will be processed by cloud data centers in the next few years (accordding to Forbes)
3. Ransomware is increasingly more sophisticated and harder to detect. It is becoming less expensive, and easier to launch. It is estimated by experts that Ransomware cost more than 1 billion dollars in 2016.
4. SSL encrypted traffic hides malware and other malicious threats. It requires resource intensive inspection, and the volume is growing quickly. More than 50% of network traffic is encrypted.
5. There is a cybersecurity skills gap, which is responsible for a growing number of security events. This makes it difficult to plan, manage and improve security posture.
The only solution to these challenges is integrated security to protect against attacks from all vendors, shared intelligence and automation for faster response to threats, and visibility and policy enforcement across entire network from endpoint to cloud.
The K.I.S. Blog for Wednesday, October 25, 2017
Do you have a special idea in mind that you want to turn into reality? Kempenfelt Imaging Systems and OFGO can work together to produce the made-to-order furniture that you need to bring your idea to life!
Using the latest CNC machinery, OFGO fabricates made-to-order furniture to your exact specifications, ensuring that the work is done right the first time, every time. Our in-house customer service team coordinates with you to keep you up to date at every step of the process, from design to delivery. Our custom solution process involves a presentation of Design Layouts in 2D & 3D, modifications, revisions, and final approval. After this, OFGO’s in-house development staff will create a CNC machine computer program to be used in the fabrication of the custom furniture. OFGO makes a computer program for every custom solution they create. By doing so, they can ensure 100% cutting and drilling accuracy within the manufacturing process.
Contact our furniture solutions department today to set up a complimentary design meeting.
The K.I.S. Blog for Monday, October 23, 2017
FortiVoice Enterprise systems include all the fundamentals of enterprise-class voice communications, with no additional licenses to buy or cards to install. Auto attendants, auto provisioning, line/extension appearance, ring groups, user privileges, call queue, call barge, multi-location integration and much more are built-in. FortiVoice systems are easy to purchase, easy to install and easy to manage, so you save the headaches that come with most enterprise phone systems.
The FortiVoice personal web portal lets your staff view their call logs, configure and manage their own messaging and access other features. Your employees get control over their phones, and your IT staff get a break from having to configure every little change.
Here are some of our favorite features:
The K.I.S. Blog for Monday, October 16, 2017
Our new radio ad, featuring K.I.S President Jody, and our Sales and Marketing Coordinator Jenna, is now live on 107.5 Kool FM. Playing weekdays at 5:30 and 6:00 a.m. Check out the audio clip here:
The K.I.S. Blog for Monday, August 14, 2017
1. Do not trust the e-mail display name – Do not trust the name that is displayed. If it looks suspicious, don’t open the email.
2. Look, but don’t click – Hover your mouse over any links embedded in the body of the email. If the link address looks strange or nonstandard or you don’t recognize it, don’t click on it.
3. Don’t enable macros in document attachments received via e-mail
4. Check for spelling mistakes – Legitimate messages usually do not have major spelling mistakes or poor grammar.
5. Do not give up personal information – Legitimate companies and financial institutions will never ask for personal credentials via email.
6. Beware of urgent or threatening language – Invoking a sense of urgency or fear is a common phishing tactic.
7. Don’t believe everything you see – Just because an email has convincing brand logos, language, and a seemingly valid email address, does not mean that it is legitimate.
The K.I.S. Blog for Friday, June 30, 2017
Call us for more details, or click here for more information
Recent cyber threats and attacks, such as WannaCry and CryptoLocker, remind us of the importance of having the necessary backups and antivirus in place to protect our information. Different strains of ransomware can spread automatically across all workstations in a network, compromising workstations and servers alike.
KIS IT always recommends exercising extreme caution when you get an email with an attachment you did not ask for. For example, if you see a .zip file in the attachment, never click on it. Instead delete the whole email. Normally no one would send a Zip file. Remember: “If in doubt, throw it out!”
If you are a Managed Services Client of ours, our engineering team routinely patches our clientele’s Windows operating systems, and we are confident that the security measures we have employed will stand up against these types of attacks and our recovery systems would allow us to recover rapidly should you become compromised.
The K.I.S. Blog for Friday, June 23, 2017
Keeping your business protected requires more than just off the shelf software. Our Managed Anti-virus solution delivers enterprise class protection, and is maintained 24/7 by our technical team, keeping your business secure while saving you money.
* Provides a point solution to specific issues
* Requires manual monitoring and maintenance to remain current and effective
* Relies on end-user decisions for operation
* Does not provide consistent version control across desktops
* Does not provide centralized management
* Provides proactive and comprehensive security, monitoring and management
* Centralizes the deployment and updating of software to ensure coverage and consistency
* Automates management processes to avoid errors and reduce costs
* Leverages expert IT skills