SlideShare ist ein Scribd-Unternehmen logo
1 von 74
Downloaden Sie, um offline zu lesen
Overcoming the IT Hurdle
Introduction


Background – Infinity Technologies


    Started in 1996 – Retail Software

    Provide IT Support and Phone Systems

    9-person Tech Staff – Microsoft Certified

    Small Business Focus – 5 to 50 Users
Introduction


The Five Biggest IT Challenges Facing Small Business



1.     Data Loss
2.     Security Vulnerabilities
3.     Downtime
4.     Cloud Confusion
5.     Productivity Problems
Introduction


Recommendation: Have a plan to manage your IT


1.    Develop a ‘Playbook’ (living document)
2.    Systemize
3.    Delegate tasks and duties
4.    Plan ahead as much as possible
Introduction


Technology solutions are still seen as critical to survival


    The market for small and midsize IT
    spending in the US continued to
    grow through the recession, moving
    from $305 billion in 2007, to a
    projected $411 billion in 2012.


       Compass Intelligence. “SMB Mania: Analysis of vendor marketing strategies targeting the SMB market.” September, 2008.
Introduction


Small businesses’ IT spending tends to involve outsourcing


       “CONVENTIONAL WISDOM ONCE TOLD US
       THAT A COMPANY WITH 1,000 EMPLOYEES
       IS MORE SUCCESSFUL THAN ONE WITH JUST
       TEN EMPLOYEES. TODAY, THAT WISDOM
       HAS BEEN TURNED ON ITS HEAD AND WE
       ARE SEEING SMALL AND MIDSIZE
       BUSINESSES ACHIEVING RECORD GROWTH,
       AND ACCOMPLISHING MORE WITH FEWER
       RESOURCES.”
Compass Intelligence. “Stimulating SMB: Small and mid-size business IT market today & a look at the latest survey results.” September,
                                                                  2009.
Small businesses’ IT spending tends to involve outsourcing
Threat #1
Threat #1: Data Loss


The data loss threat is real



      70 percent of small firms
      that experience a major data
      loss go out of business
      within a year.

Contingency Planning, Strategic Research Corp and DTI/Price Waterhouse Coopers (2004) and is widely quoted in places
      such as: Diana Shepstone, National data awareness project launched to help businesses prevent data disasters
      ( Data Centre Solutions, Jan. 8, 2007)
Threat #1: Data Loss


Equipment theft/loss has become more prevalent as the number of
mobile and remote workers has increased

   34 percent of small and mid-size
   businesses admitted that they have
   lost a company laptop.

   30 percent of respondents have
   important data contained on the
   laptop, which is not backed up in
   the office.
                       Insight UK Survey, 2009.
Threat #1: Data Loss


Redundancy is the key to an effective Data Protection Strategy




                        RAID



           External               Offsite
Threat #1: Data Loss


Redundancy is the key to an effective Data Protection Strategy

                                               1. Inexpensive
                                               2. Set and Forget
                        RAID                   3. Fairly Standard
                                               4. Local


           External               Offsite
Threat #1: Data Loss


Redundancy is the key to an effective Data Protection Strategy

                                               1. Hands On*
                                               2. Device Dependant
                        RAID                   3. Software Costs
                                               4. Local



           External               Offsite
Threat #1: Data Loss


Redundancy is the key to an effective Data Protection Strategy

                                               1. Device Dependant
                                               2. Local
                        RAID                   3. Subscription*
                                               4. Degree of Trust
                                               5. Configuration

           External               Offsite
Threat #1: Data Loss


Online Backup is a standard Best Practice


    “YOUR BACKUP MUST BE OFFSITE, SECURE,
    AND AVAILABLE FOR RECOVERY 24/7. ONE
    POPULAR OPTION THAT MEETS THE ABOVE
    CRITERIA, WITH THE ADDED BENEFIT OF
    EASE OF USE AND AUTOMATION, IS ONLINE
    BACKUP.”

       Walzer, Jennifer. “Small business guide: Disaster recovery. New York Times, September 9, 2009.
Threat #1: Data Loss


Redundancy is the key to an effective Data Protection Strategy


                                               Total Solution
                                                       (sort of…)
                        RAID



           External               Offsite
Threat #1: Data Loss


Redundancy is the key to an effective Data Protection Strategy


                                               Total Solution
                                                       (sort of…)
                        RAID

                                                  ..if you
           External               Offsite       Verify & Test
Threat #1: Data Loss


Monitoring the success/failure results of backups is critical


    It is therefore important that backups
    are not only automated to avoid
    human error but also periodically
    tested. It is useless having a backup
    system if restoration does not function
    as advertised.

     “Security Threats: A Guide for Small and Mid-Sized Nonprofits, Brad Dinerman and GFI Software, 2009
Threat #2
Threat #2: Security Vulnerabilities


In many cases, Security is viewed strictly as a cost center


    “WHEN ECONOMIC CIRCUMSTANCES LOOK
    DIRE, IT IS EASY TO TURN SECURITY INTO A
    CHECKLIST ITEM THAT KEEPS BEING PUSHED
    BACK. HOWEVER THE REALITY IS THAT, IN
    SUCH SITUATIONS, SECURITY SHOULD BE A
    PRIMARY ISSUE. THE LIKELIHOOD OF THREATS
    AFFECTING YOUR ORGANIZATION WILL
    PROBABLY INCREASE AND THE IMPACT CAN BE
    MORE DETRIMENTAL...”

       Dinerman, Brad. “Security threats: A guide for small and mid-size nonprofits.” GFI Software, 2009.
Threat #2: Security Vulnerabilities




“Trend Micro 2008 Annual Threat Roundup”. Trend Micro, 2009
Threat #2: Security Vulnerabilities


Exploit and attack threat levels continue to increase




              “Trend Micro 2008 Annual Threat Roundup”. Trend Micro, 2009
Threat #2: Security Vulnerabilities
Threat #2: Security Vulnerabilities


Botnets have become an extreme threat




Botnet is a jargon term for a
 collection of software agents, or
 robots, that run autonomously and
 automatically.


                                   Botnet
                     From Wikipedia, the free encyclopedia
Threat #2: Security Vulnerabilities


Exploit and attack threat levels continue to increase


    Altogether, ZeuS and other botnets
    control more than 100 million computers.
    This gives cybercriminals more
    computing power than the entire
    world's supercomputers combined.


                      Trend Micro. Threat Encyclopedia 2010.
Threat #2: Security Vulnerabilities


ZeuS Server installation page




               “ZeuS A Persistant Criminal Enterprise”. Trend Micro, 2010
Threat #2: Security Vulnerabilities


Security providers struggle to keep up




              “Trend Micro 2008 Annual Threat Roundup”. Trend Micro, 2009
Threat #2: Security Vulnerabilities
Social Media has become a favorite method for exploits
Social Media has become a favorite method for exploits
Threat #2: Security Vulnerabilities


Exploit and attack threat levels continue to increase


    Going into 2010, it is likely that social networks
    will continue to be the target of cybercriminals.
    However, it is also likely that social networks will
    be further used by legitimate businesses
    seeking new ways in which to communicate
    and engage with customers. For the business
    the challenge is how to harness the benefits of
    social networks while ensuring their own
    business networks remain secure.
           Trend Micro, Inc. “The future of threats and threat technologies.” December, 2009.
Threat #2: Security Vulnerabilities


Attacks are trending to be more localized and targeted


    “OVER THE PAST FEW YEARS, THE THREAT
    LANDSCAPE HAS SHIFTED, THERE ARE NO LONGER
    ANY GLOBAL OUTBREAKS, AS WERE PREVIOUSLY
    EXPERIENCED WITH SLAMMER OR CODERED.
    EVEN THE MUCH-COVERED CONFICKER INCIDENT
    OF 2008 AND EARLY 2009 WAS NOT TRULY A
    GLOBAL OUTBREAK—RATHER IT WAS A CAREFULLY
    ORCHESTRATED AND ARCHITECTED ATTACK. GOING
    FORWARD, LOCALIZED AND TARGETED ATTACKS
    ARE EXPECTED TO GROW IN NUMBER AND
    SOPHISTICATION.”
           Trend Micro, Inc. “The future of threats and threat technologies.” December, 2009.
Threat #2: Security Vulnerabilities


Advice for Businesses: PREVENTION


1.    Keep your PC/network security current
2.    Choose secure passwords
3.    Educate staff on safe web usage
4.    If possible, limit web surfing through
      Content Filtering
5.    Do regular scans for spyware infections
Threat #3
Threat #3: Downtime


Downtime can be the result of many possible factors
Threat #3: Downtime


The costs associated with downtime can add up quickly


    "In a new study on network
    downtime, Infonetics Research
    found that medium businesses (101
    to 1,000 employees) are losing an
    average of 1% of their annual
    revenue, or $867,000, to
    downtime.”
    Infonetics Research. The Costs of Downtime: North American Medium Businesses 2006
Threat #3: Downtime


Typical Small Business:
Threat #3: Downtime


Economic conditions have forced many businesses to put off
purchases of IT equipment

    “To survive what many view as the
    worst economic downturn since the
    Great Depression, 69 percent of
    manufacturers indicated they reduced
    their workforce, followed by delaying
    capital expenditures (66 percent),
    negotiating with suppliers for better
    deals (48 percent) and cutting
    promotional activities (37 percent).
  Society of Manufacturing Engineers. “Manufacturers detail recession survival strategies in new survey.”
                                             September 3, 2009.
Threat #3: Downtime


Economic conditions have forced many businesses to put off
purchases of IT equipment

    Nearly 40% of the PCs in small
    businesses are more than 3 years
    old, and a large percentage of them
    are running older operating systems
    such as Windows XP

    “SMB Perspectives: SMBs – The Case for Buying Modern PCs. Techaisle, March 2010.
Threat #3: Downtime


Average Mean Time Failure Rate:
Threat #3: Downtime


Advice for Businesses: Maintenance & Planning


1.    Perform regular maintenance
2.    Look into redundant internet services
3.    Develop a failover plan for telecom
4.    Plan for equipment refresh cycles
Threat #4
Threat #4: Cloud Confusion


Mickey does NOT live in the Cloud
Threat #4: Cloud Confusion


Reliance on the Internet for satisfying computing needs
Threat #4: Cloud Confusion


Cloud usage is widespread and fairly common:



69 percent of America’s Internet
users are using some form of
Internet-based computing, such as
web-based e-mail or photo
storage.
                        Source: Pew Research Center, 2008
Consumer Cloud Services

                                                                          2 billion unique calls per year
  14 billion ads per month                   23 million subscribers




                                                                           Over 6 million songs in the
                                     Over 600 million unique users                  catalog
  Over 3 billion WW
 queries each month



                                                                                370 million active
                                    500 million active Windows Live IDs             accounts


Petabytes of data every
month to millions of PCs

                       10 billion messages
                         processed daily
Threat #4: Cloud Confusion


The technical definition:


    Cloud computing is computation,
    software, data access, and storage
    services that do not require end-
    user knowledge of the physical
    location and configuration of the
    system that delivers the services.
                            Source: Wikipedia
Threat #4: Cloud Confusion


Reliance on the Internet for satisfying computing needs
Threat #4: Cloud Confusion


Cloud technologies provide a new method for content delivery
Threat #4: Cloud Confusion


The Cloud is changing entire industries
Threat #4: Cloud Confusion


Types of Cloud Services




 “SaaS”                   “PaaS”                          “IaaS”
software as a service     platform as a service      infrastructure as a service

consume it                 build on it                 migrate to it
Threat #4: Cloud Confusion


Software as a Service (SaaS)



SaaS defined:
“A model of software deployment
  where an application is hosted as
  a service provided to customers
  across the Internet.”
                               Source: Wikipedia
Why Business is Embracing the Cloud




                                        “By 2012, 20% of businesses will own
                                        no IT assets.”
                                        Gartner, Gartner Highlights Key Predictions for IT
                                        Organizations and Users in 2010 and Beyond, January, 2010




  Survey of 318 customers on satisfaction with SaaS noted “top 3 pros were no in-
  house maintenance(57%), shorter rollout(49%), usable anywhere via
  internet(46%).”
  Burton Group, “Gartner and Burton Group SaaS Surveys: Same High-Level Findings, Different Conclusions.”
  Craig Roth July, 2009.
Familiar and Integrated

•  25 GB mailbox per user                                •  Single location for sharing and collaboration
•  Shared calendaring and contacts                       •  Collaboration sites for teams, projects,
•  Always-up-to-date anti-spam & anti-virus                 meetings, and documents.
•  Access from Outlook on PC and Outlook                 •  Offline access to documents in Outlook
   Web App in the browser                                •  Forms & workflow
•  Offline access w/ Outlook synchronization             •  Portal sites, content management, and search
•  Support for Windows Phone, iPhone,
   Android, and Blackberry




     •  Online meetings, presentations, and              •  Business class Instant messaging (IM) and
        training sessions                                   chat
     •  Desktop sharing & whiteboard tools               •  Seamless presence awareness
     •  Rich media, hi-fi recording, live webcam video   •  1:1 video and voice chat
     •  Multi-party video, VOIP/audio, switching         •  Integration across Microsoft Office Outlook
     •  Web client support for remote attendees             calendar and contacts and other apps,
                                                            SharePoint
                                                         •  Quickly check on another user’s availability
Small Business Feedback
Threat #2: Security Vulnerabilities


Advice for Businesses: PREVENTION


1.    When time to replace, consider Cloud
2.    Add online storage for additional backup
      redundancy
3.    Leverage Cloud solutions to improve
      operational efficiencies
4.    Avoid the hype – look for proven
      products
Threat #5
Threat #5: Productivity Problems


Productivity can be negatively impacted by many possible factors
Threat #5: Productivity Problems
Threat #5: Productivity Problems
Threat #5: Productivity Problems
Threat #5: Productivity Problems
Threat #5: Productivity Problems
Threat #5: Productivity Problems


Voice Over IP phone systems greatly improve operations


    “BEYOND ITS SUPERIOR FLEXIBILITY,
    VOIP SAVES BUSINESSES MONEY.
    DEPENDING ON THE SERVICE YOU
    CHOOSE, YOU MAY BE ABLE TO AVOID
    PAYING FOR BOTH BROADBAND AND
    TELEPHONE SERVICES—OR
    SIGNIFICANTLY SCALE BACK YOUR
    TELEPHONE BILLS.”
                  Foley, Mary O. “VoIP: What are you waiting for?”
Threat #5: Productivity Problems


Web filtering and shaping can also help boost productivity


Are you experiencing any of these situations?

  Limited visibility of Internet traffic
  Slow Internet despite adequate bandwidth
  Lost hours due to internet abuse
  Anonymous proxy sites bypassing URL filters
Threat #5: Productivity Problems


Web filtering and shaping can also help boost productivity
Conclusion


Recommendation: Have a plan to manage your IT


1.    Develop a ‘Playbook’ (living document)
2.    Systemize
3.    Delegate tasks and duties
4.    Plan ahead as much as possible
IT
Organiza+on
for
Any
Business

                               INFRASTRUCTURE
 Proactive Management                        Network Administration
Centralized Services                        Day-to-Day Support
 Downtime & Performance Monitoring           Help Desk Support
 Weekend Auto Maintenance Service            Backup and Disaster Recovery
 Backup Monitoring and Alerts                Desktop and Server Optimization
 Security Patch Management                   Web Content Filtering




                                                                                   SUPPORT
 Virus and Spyware Protection                Adding and Removal of Users
 Asset Inventory                             Best Practices Checklist
 Reporting


Chief Information Officer                         Reactive Support
Virtual CIO                                 Field Support
  Technology Roadmap Planning                On-Site Support
  Design and Implementation Planning         Rapid Reaction/Response
  Budget and Strategy Planning               Mini-Project Jobs
  Research & Testing of New Technologies     Third Party Product Support
  Vendor Liaison                             Virus REMOVAL and Cleaning
                                              Recovery in Event of Server Crash


           STRATEGY
INFRASTRUCTURE
    Proactive Management
Centralized Services
 Downtime & Performance Monitoring
 Weekend Auto Maintenance Service
 Backup Monitoring and Alerts
 Security Patch Management
 Virus and Spyware Protection
 Asset Inventory
 Reporting
INFRASTRUCTURE
    Network Administration
Day-to-Day Support
  Help Desk Support




                                     SUPPORT
  Backup and Disaster Recovery
  Desktop and Server Optimization
  Web Content Filtering
  Adding and Removal of Users
  Best Practices Checklist
Reactive Support
Field Support
  On-Site Support




                                       SUPPORT
  Rapid Reaction/Response
  Mini-Project Jobs
  Third Party Product Support
  Virus REMOVAL and Cleaning
  Recovery in Event of Server Crash
INFRASTRUCTURE
    Chief Information Officer
Virtual CIO
  Technology Roadmap Planning
  Design and Implementation Planning




                                            SUPPORT
  Budget and Strategy Planning
  Research & Testing of New Technologies
  Vendor Liaison




     STRATEGY
Conclusion


Recommendation: Have a plan to manage your IT


1.    Develop a ‘Playbook’ (living document)
2.    Systemize
3.    Delegate tasks and duties
4.    Plan ahead as much as possible

Weitere ähnliche Inhalte

Was ist angesagt?

CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeKrisValerio
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revShanker Sareen
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...Andris Soroka
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryTrend Micro
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your UsersMike Murray
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology SummitCarahsoft
 
Security Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldSecurity Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldInfotecsGmbH
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File VirtualizationFindWhitePapers
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2Ian Sommerville
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographicCSC Australia
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityMatthew Rosenquist
 

Was ist angesagt? (20)

CRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff CrumeCRTC Cloud Security- Jeff Crume
CRTC Cloud Security- Jeff Crume
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Business Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_revBusiness Driven Security Securing the Smarter Planet pcty_020710_rev
Business Driven Security Securing the Smarter Planet pcty_020710_rev
 
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
DSS ITSEC Conference 2012 - Lumension Intelligent Application Whitelisting & ...
 
Cyber Influence Operations
Cyber Influence OperationsCyber Influence Operations
Cyber Influence Operations
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
 
Security Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex WorldSecurity Challenges and Innovative Solutions for Securing a Complex World
Security Challenges and Innovative Solutions for Securing a Complex World
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File Virtualization
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 

Andere mochten auch

Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentationsismailraesha
 
Small Farmers in India: Challenges and Opportunities - Paper by S. Mahendra D...
Small Farmers in India: Challenges and Opportunities - Paper by S. Mahendra D...Small Farmers in India: Challenges and Opportunities - Paper by S. Mahendra D...
Small Farmers in India: Challenges and Opportunities - Paper by S. Mahendra D...People's Archive of Rural India
 
Small Business Challenges
Small Business ChallengesSmall Business Challenges
Small Business ChallengesBonnie Canal
 
Bring Your Own Quiz- Short set on Technology and Business
Bring Your Own Quiz- Short set on Technology and BusinessBring Your Own Quiz- Short set on Technology and Business
Bring Your Own Quiz- Short set on Technology and BusinessGokul Panigrahi
 
22 Barcelona KPMG Presentation Investing In India Opportunities And Challe...
22 Barcelona KPMG Presentation Investing In India    Opportunities And Challe...22 Barcelona KPMG Presentation Investing In India    Opportunities And Challe...
22 Barcelona KPMG Presentation Investing In India Opportunities And Challe...Prof Parameshwar P Iyer
 
Big Data for Small Businesses
Big Data for Small BusinessesBig Data for Small Businesses
Big Data for Small BusinessesVivastream
 
Certificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityCertificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityLatha Menon
 
Impact of Globalization on Small Scale Industries in (1)
Impact of Globalization on Small Scale Industries in (1)Impact of Globalization on Small Scale Industries in (1)
Impact of Globalization on Small Scale Industries in (1)Russel Shaik
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Alison Gianotto
 
“Effects of changing business environment on business strategies and challeng...
“Effects of changing business environment on business strategies and challeng...“Effects of changing business environment on business strategies and challeng...
“Effects of changing business environment on business strategies and challeng...mikybhuvi
 
Bus 325 global human resource management week 2 quiz –
Bus 325 global human resource management week 2 quiz –Bus 325 global human resource management week 2 quiz –
Bus 325 global human resource management week 2 quiz –LindaAdams2017
 
Challenges of Doing Business in india - Corruption, Efficiency and the Way Fo...
Challenges of Doing Business in india - Corruption, Efficiency and the Way Fo...Challenges of Doing Business in india - Corruption, Efficiency and the Way Fo...
Challenges of Doing Business in india - Corruption, Efficiency and the Way Fo...IPPAI
 
Eai presentation investment challenges in small hydro in india delhi mar 2010
Eai presentation investment challenges in small hydro in india delhi mar 2010Eai presentation investment challenges in small hydro in india delhi mar 2010
Eai presentation investment challenges in small hydro in india delhi mar 2010Renganathan M G
 

Andere mochten auch (20)

Technology powerpoint presentations
Technology powerpoint presentationsTechnology powerpoint presentations
Technology powerpoint presentations
 
Entp 09ppt
Entp 09pptEntp 09ppt
Entp 09ppt
 
Small Farmers in India: Challenges and Opportunities - Paper by S. Mahendra D...
Small Farmers in India: Challenges and Opportunities - Paper by S. Mahendra D...Small Farmers in India: Challenges and Opportunities - Paper by S. Mahendra D...
Small Farmers in India: Challenges and Opportunities - Paper by S. Mahendra D...
 
10 biggest challenges facing small business
10 biggest challenges facing small business10 biggest challenges facing small business
10 biggest challenges facing small business
 
Small Business Challenges
Small Business ChallengesSmall Business Challenges
Small Business Challenges
 
Bring Your Own Quiz- Short set on Technology and Business
Bring Your Own Quiz- Short set on Technology and BusinessBring Your Own Quiz- Short set on Technology and Business
Bring Your Own Quiz- Short set on Technology and Business
 
22 Barcelona KPMG Presentation Investing In India Opportunities And Challe...
22 Barcelona KPMG Presentation Investing In India    Opportunities And Challe...22 Barcelona KPMG Presentation Investing In India    Opportunities And Challe...
22 Barcelona KPMG Presentation Investing In India Opportunities And Challe...
 
Big Data for Small Businesses
Big Data for Small BusinessesBig Data for Small Businesses
Big Data for Small Businesses
 
Certificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityCertificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and Security
 
Impact of Globalization on Small Scale Industries in (1)
Impact of Globalization on Small Scale Industries in (1)Impact of Globalization on Small Scale Industries in (1)
Impact of Globalization on Small Scale Industries in (1)
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Overcoming Small Business Challenges
Overcoming Small Business ChallengesOvercoming Small Business Challenges
Overcoming Small Business Challenges
 
Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
“Effects of changing business environment on business strategies and challeng...
“Effects of changing business environment on business strategies and challeng...“Effects of changing business environment on business strategies and challeng...
“Effects of changing business environment on business strategies and challeng...
 
CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1
 
Bus 325 global human resource management week 2 quiz –
Bus 325 global human resource management week 2 quiz –Bus 325 global human resource management week 2 quiz –
Bus 325 global human resource management week 2 quiz –
 
Challenges of Doing Business in india - Corruption, Efficiency and the Way Fo...
Challenges of Doing Business in india - Corruption, Efficiency and the Way Fo...Challenges of Doing Business in india - Corruption, Efficiency and the Way Fo...
Challenges of Doing Business in india - Corruption, Efficiency and the Way Fo...
 
Eai presentation investment challenges in small hydro in india delhi mar 2010
Eai presentation investment challenges in small hydro in india delhi mar 2010Eai presentation investment challenges in small hydro in india delhi mar 2010
Eai presentation investment challenges in small hydro in india delhi mar 2010
 

Ähnlich wie Small Business Technology Challenges

Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksIBM
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013Imperva
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityarms8586
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sectorCore Security
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better businessDell EMC World
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Dalia Reda
 
Presentation defend your company against cyber threats with security solutions
Presentation   defend your company against cyber threats with security solutionsPresentation   defend your company against cyber threats with security solutions
Presentation defend your company against cyber threats with security solutionsxKinAnx
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ EnterprisesNigel Hanson
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment PresentationLionel Medina
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?HelpSystems
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)GuardEra Access Solutions, Inc.
 
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxSOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxTamaOlan1
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2Donald Jennings
 

Ähnlich wie Small Business Technology Challenges (20)

Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Top Security Trends for 2013
Top Security Trends for 2013Top Security Trends for 2013
Top Security Trends for 2013
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
 
Presentation defend your company against cyber threats with security solutions
Presentation   defend your company against cyber threats with security solutionsPresentation   defend your company against cyber threats with security solutions
Presentation defend your company against cyber threats with security solutions
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)A Guide To SMB Network Security Compliance Research Group(1)
A Guide To SMB Network Security Compliance Research Group(1)
 
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxSOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 

Kürzlich hochgeladen

Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...ShrutiBose4
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 

Kürzlich hochgeladen (20)

Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
Ms Motilal Padampat Sugar Mills vs. State of Uttar Pradesh & Ors. - A Milesto...
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 

Small Business Technology Challenges

  • 2. Introduction Background – Infinity Technologies   Started in 1996 – Retail Software   Provide IT Support and Phone Systems   9-person Tech Staff – Microsoft Certified   Small Business Focus – 5 to 50 Users
  • 3. Introduction The Five Biggest IT Challenges Facing Small Business 1.  Data Loss 2.  Security Vulnerabilities 3.  Downtime 4.  Cloud Confusion 5.  Productivity Problems
  • 4. Introduction Recommendation: Have a plan to manage your IT 1.  Develop a ‘Playbook’ (living document) 2.  Systemize 3.  Delegate tasks and duties 4.  Plan ahead as much as possible
  • 5. Introduction Technology solutions are still seen as critical to survival The market for small and midsize IT spending in the US continued to grow through the recession, moving from $305 billion in 2007, to a projected $411 billion in 2012. Compass Intelligence. “SMB Mania: Analysis of vendor marketing strategies targeting the SMB market.” September, 2008.
  • 6. Introduction Small businesses’ IT spending tends to involve outsourcing “CONVENTIONAL WISDOM ONCE TOLD US THAT A COMPANY WITH 1,000 EMPLOYEES IS MORE SUCCESSFUL THAN ONE WITH JUST TEN EMPLOYEES. TODAY, THAT WISDOM HAS BEEN TURNED ON ITS HEAD AND WE ARE SEEING SMALL AND MIDSIZE BUSINESSES ACHIEVING RECORD GROWTH, AND ACCOMPLISHING MORE WITH FEWER RESOURCES.” Compass Intelligence. “Stimulating SMB: Small and mid-size business IT market today & a look at the latest survey results.” September, 2009.
  • 7. Small businesses’ IT spending tends to involve outsourcing
  • 9. Threat #1: Data Loss The data loss threat is real 70 percent of small firms that experience a major data loss go out of business within a year. Contingency Planning, Strategic Research Corp and DTI/Price Waterhouse Coopers (2004) and is widely quoted in places such as: Diana Shepstone, National data awareness project launched to help businesses prevent data disasters ( Data Centre Solutions, Jan. 8, 2007)
  • 10. Threat #1: Data Loss Equipment theft/loss has become more prevalent as the number of mobile and remote workers has increased 34 percent of small and mid-size businesses admitted that they have lost a company laptop. 30 percent of respondents have important data contained on the laptop, which is not backed up in the office. Insight UK Survey, 2009.
  • 11. Threat #1: Data Loss Redundancy is the key to an effective Data Protection Strategy RAID External Offsite
  • 12. Threat #1: Data Loss Redundancy is the key to an effective Data Protection Strategy 1. Inexpensive 2. Set and Forget RAID 3. Fairly Standard 4. Local External Offsite
  • 13. Threat #1: Data Loss Redundancy is the key to an effective Data Protection Strategy 1. Hands On* 2. Device Dependant RAID 3. Software Costs 4. Local External Offsite
  • 14. Threat #1: Data Loss Redundancy is the key to an effective Data Protection Strategy 1. Device Dependant 2. Local RAID 3. Subscription* 4. Degree of Trust 5. Configuration External Offsite
  • 15. Threat #1: Data Loss Online Backup is a standard Best Practice “YOUR BACKUP MUST BE OFFSITE, SECURE, AND AVAILABLE FOR RECOVERY 24/7. ONE POPULAR OPTION THAT MEETS THE ABOVE CRITERIA, WITH THE ADDED BENEFIT OF EASE OF USE AND AUTOMATION, IS ONLINE BACKUP.” Walzer, Jennifer. “Small business guide: Disaster recovery. New York Times, September 9, 2009.
  • 16. Threat #1: Data Loss Redundancy is the key to an effective Data Protection Strategy Total Solution (sort of…) RAID External Offsite
  • 17. Threat #1: Data Loss Redundancy is the key to an effective Data Protection Strategy Total Solution (sort of…) RAID ..if you External Offsite Verify & Test
  • 18. Threat #1: Data Loss Monitoring the success/failure results of backups is critical It is therefore important that backups are not only automated to avoid human error but also periodically tested. It is useless having a backup system if restoration does not function as advertised. “Security Threats: A Guide for Small and Mid-Sized Nonprofits, Brad Dinerman and GFI Software, 2009
  • 20. Threat #2: Security Vulnerabilities In many cases, Security is viewed strictly as a cost center “WHEN ECONOMIC CIRCUMSTANCES LOOK DIRE, IT IS EASY TO TURN SECURITY INTO A CHECKLIST ITEM THAT KEEPS BEING PUSHED BACK. HOWEVER THE REALITY IS THAT, IN SUCH SITUATIONS, SECURITY SHOULD BE A PRIMARY ISSUE. THE LIKELIHOOD OF THREATS AFFECTING YOUR ORGANIZATION WILL PROBABLY INCREASE AND THE IMPACT CAN BE MORE DETRIMENTAL...” Dinerman, Brad. “Security threats: A guide for small and mid-size nonprofits.” GFI Software, 2009.
  • 21. Threat #2: Security Vulnerabilities “Trend Micro 2008 Annual Threat Roundup”. Trend Micro, 2009
  • 22. Threat #2: Security Vulnerabilities Exploit and attack threat levels continue to increase “Trend Micro 2008 Annual Threat Roundup”. Trend Micro, 2009
  • 23. Threat #2: Security Vulnerabilities
  • 24. Threat #2: Security Vulnerabilities Botnets have become an extreme threat Botnet is a jargon term for a collection of software agents, or robots, that run autonomously and automatically. Botnet From Wikipedia, the free encyclopedia
  • 25. Threat #2: Security Vulnerabilities Exploit and attack threat levels continue to increase Altogether, ZeuS and other botnets control more than 100 million computers. This gives cybercriminals more computing power than the entire world's supercomputers combined. Trend Micro. Threat Encyclopedia 2010.
  • 26. Threat #2: Security Vulnerabilities ZeuS Server installation page “ZeuS A Persistant Criminal Enterprise”. Trend Micro, 2010
  • 27. Threat #2: Security Vulnerabilities Security providers struggle to keep up “Trend Micro 2008 Annual Threat Roundup”. Trend Micro, 2009
  • 28. Threat #2: Security Vulnerabilities
  • 29. Social Media has become a favorite method for exploits
  • 30. Social Media has become a favorite method for exploits
  • 31. Threat #2: Security Vulnerabilities Exploit and attack threat levels continue to increase Going into 2010, it is likely that social networks will continue to be the target of cybercriminals. However, it is also likely that social networks will be further used by legitimate businesses seeking new ways in which to communicate and engage with customers. For the business the challenge is how to harness the benefits of social networks while ensuring their own business networks remain secure. Trend Micro, Inc. “The future of threats and threat technologies.” December, 2009.
  • 32. Threat #2: Security Vulnerabilities Attacks are trending to be more localized and targeted “OVER THE PAST FEW YEARS, THE THREAT LANDSCAPE HAS SHIFTED, THERE ARE NO LONGER ANY GLOBAL OUTBREAKS, AS WERE PREVIOUSLY EXPERIENCED WITH SLAMMER OR CODERED. EVEN THE MUCH-COVERED CONFICKER INCIDENT OF 2008 AND EARLY 2009 WAS NOT TRULY A GLOBAL OUTBREAK—RATHER IT WAS A CAREFULLY ORCHESTRATED AND ARCHITECTED ATTACK. GOING FORWARD, LOCALIZED AND TARGETED ATTACKS ARE EXPECTED TO GROW IN NUMBER AND SOPHISTICATION.” Trend Micro, Inc. “The future of threats and threat technologies.” December, 2009.
  • 33. Threat #2: Security Vulnerabilities Advice for Businesses: PREVENTION 1.  Keep your PC/network security current 2.  Choose secure passwords 3.  Educate staff on safe web usage 4.  If possible, limit web surfing through Content Filtering 5.  Do regular scans for spyware infections
  • 35. Threat #3: Downtime Downtime can be the result of many possible factors
  • 36. Threat #3: Downtime The costs associated with downtime can add up quickly "In a new study on network downtime, Infonetics Research found that medium businesses (101 to 1,000 employees) are losing an average of 1% of their annual revenue, or $867,000, to downtime.” Infonetics Research. The Costs of Downtime: North American Medium Businesses 2006
  • 37. Threat #3: Downtime Typical Small Business:
  • 38. Threat #3: Downtime Economic conditions have forced many businesses to put off purchases of IT equipment “To survive what many view as the worst economic downturn since the Great Depression, 69 percent of manufacturers indicated they reduced their workforce, followed by delaying capital expenditures (66 percent), negotiating with suppliers for better deals (48 percent) and cutting promotional activities (37 percent). Society of Manufacturing Engineers. “Manufacturers detail recession survival strategies in new survey.” September 3, 2009.
  • 39. Threat #3: Downtime Economic conditions have forced many businesses to put off purchases of IT equipment Nearly 40% of the PCs in small businesses are more than 3 years old, and a large percentage of them are running older operating systems such as Windows XP “SMB Perspectives: SMBs – The Case for Buying Modern PCs. Techaisle, March 2010.
  • 40. Threat #3: Downtime Average Mean Time Failure Rate:
  • 41. Threat #3: Downtime Advice for Businesses: Maintenance & Planning 1.  Perform regular maintenance 2.  Look into redundant internet services 3.  Develop a failover plan for telecom 4.  Plan for equipment refresh cycles
  • 43. Threat #4: Cloud Confusion Mickey does NOT live in the Cloud
  • 44. Threat #4: Cloud Confusion Reliance on the Internet for satisfying computing needs
  • 45. Threat #4: Cloud Confusion Cloud usage is widespread and fairly common: 69 percent of America’s Internet users are using some form of Internet-based computing, such as web-based e-mail or photo storage. Source: Pew Research Center, 2008
  • 46. Consumer Cloud Services 2 billion unique calls per year 14 billion ads per month 23 million subscribers Over 6 million songs in the Over 600 million unique users catalog Over 3 billion WW queries each month 370 million active 500 million active Windows Live IDs accounts Petabytes of data every month to millions of PCs 10 billion messages processed daily
  • 47. Threat #4: Cloud Confusion The technical definition: Cloud computing is computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Source: Wikipedia
  • 48. Threat #4: Cloud Confusion Reliance on the Internet for satisfying computing needs
  • 49. Threat #4: Cloud Confusion Cloud technologies provide a new method for content delivery
  • 50. Threat #4: Cloud Confusion The Cloud is changing entire industries
  • 51. Threat #4: Cloud Confusion Types of Cloud Services “SaaS” “PaaS” “IaaS” software as a service platform as a service infrastructure as a service consume it build on it migrate to it
  • 52. Threat #4: Cloud Confusion Software as a Service (SaaS) SaaS defined: “A model of software deployment where an application is hosted as a service provided to customers across the Internet.” Source: Wikipedia
  • 53. Why Business is Embracing the Cloud “By 2012, 20% of businesses will own no IT assets.” Gartner, Gartner Highlights Key Predictions for IT Organizations and Users in 2010 and Beyond, January, 2010 Survey of 318 customers on satisfaction with SaaS noted “top 3 pros were no in- house maintenance(57%), shorter rollout(49%), usable anywhere via internet(46%).” Burton Group, “Gartner and Burton Group SaaS Surveys: Same High-Level Findings, Different Conclusions.” Craig Roth July, 2009.
  • 54. Familiar and Integrated •  25 GB mailbox per user •  Single location for sharing and collaboration •  Shared calendaring and contacts •  Collaboration sites for teams, projects, •  Always-up-to-date anti-spam & anti-virus meetings, and documents. •  Access from Outlook on PC and Outlook •  Offline access to documents in Outlook Web App in the browser •  Forms & workflow •  Offline access w/ Outlook synchronization •  Portal sites, content management, and search •  Support for Windows Phone, iPhone, Android, and Blackberry •  Online meetings, presentations, and •  Business class Instant messaging (IM) and training sessions chat •  Desktop sharing & whiteboard tools •  Seamless presence awareness •  Rich media, hi-fi recording, live webcam video •  1:1 video and voice chat •  Multi-party video, VOIP/audio, switching •  Integration across Microsoft Office Outlook •  Web client support for remote attendees calendar and contacts and other apps, SharePoint •  Quickly check on another user’s availability
  • 56. Threat #2: Security Vulnerabilities Advice for Businesses: PREVENTION 1.  When time to replace, consider Cloud 2.  Add online storage for additional backup redundancy 3.  Leverage Cloud solutions to improve operational efficiencies 4.  Avoid the hype – look for proven products
  • 58. Threat #5: Productivity Problems Productivity can be negatively impacted by many possible factors
  • 64. Threat #5: Productivity Problems Voice Over IP phone systems greatly improve operations “BEYOND ITS SUPERIOR FLEXIBILITY, VOIP SAVES BUSINESSES MONEY. DEPENDING ON THE SERVICE YOU CHOOSE, YOU MAY BE ABLE TO AVOID PAYING FOR BOTH BROADBAND AND TELEPHONE SERVICES—OR SIGNIFICANTLY SCALE BACK YOUR TELEPHONE BILLS.” Foley, Mary O. “VoIP: What are you waiting for?”
  • 65. Threat #5: Productivity Problems Web filtering and shaping can also help boost productivity Are you experiencing any of these situations?   Limited visibility of Internet traffic   Slow Internet despite adequate bandwidth   Lost hours due to internet abuse   Anonymous proxy sites bypassing URL filters
  • 66. Threat #5: Productivity Problems Web filtering and shaping can also help boost productivity
  • 67.
  • 68. Conclusion Recommendation: Have a plan to manage your IT 1.  Develop a ‘Playbook’ (living document) 2.  Systemize 3.  Delegate tasks and duties 4.  Plan ahead as much as possible
  • 69. IT
Organiza+on
for
Any
Business
 INFRASTRUCTURE Proactive Management Network Administration Centralized Services Day-to-Day Support  Downtime & Performance Monitoring   Help Desk Support  Weekend Auto Maintenance Service   Backup and Disaster Recovery  Backup Monitoring and Alerts   Desktop and Server Optimization  Security Patch Management   Web Content Filtering SUPPORT  Virus and Spyware Protection   Adding and Removal of Users  Asset Inventory   Best Practices Checklist  Reporting Chief Information Officer Reactive Support Virtual CIO Field Support   Technology Roadmap Planning   On-Site Support   Design and Implementation Planning   Rapid Reaction/Response   Budget and Strategy Planning   Mini-Project Jobs   Research & Testing of New Technologies   Third Party Product Support   Vendor Liaison   Virus REMOVAL and Cleaning   Recovery in Event of Server Crash STRATEGY
  • 70. INFRASTRUCTURE Proactive Management Centralized Services  Downtime & Performance Monitoring  Weekend Auto Maintenance Service  Backup Monitoring and Alerts  Security Patch Management  Virus and Spyware Protection  Asset Inventory  Reporting
  • 71. INFRASTRUCTURE Network Administration Day-to-Day Support   Help Desk Support SUPPORT   Backup and Disaster Recovery   Desktop and Server Optimization   Web Content Filtering   Adding and Removal of Users   Best Practices Checklist
  • 72. Reactive Support Field Support   On-Site Support SUPPORT   Rapid Reaction/Response   Mini-Project Jobs   Third Party Product Support   Virus REMOVAL and Cleaning   Recovery in Event of Server Crash
  • 73. INFRASTRUCTURE Chief Information Officer Virtual CIO   Technology Roadmap Planning   Design and Implementation Planning SUPPORT   Budget and Strategy Planning   Research & Testing of New Technologies   Vendor Liaison STRATEGY
  • 74. Conclusion Recommendation: Have a plan to manage your IT 1.  Develop a ‘Playbook’ (living document) 2.  Systemize 3.  Delegate tasks and duties 4.  Plan ahead as much as possible