On March 25th, 2019, Motherboard released an article highlighting a recent Supply Chain Attack, discovered by Kaspersky Lab in January 2019. At the time the article was written the scope and purpose of the attack was still being investigated, however it has since been independently verified by cybersecurity software provider, Symantec. The estimated number of systems infected by the trojan is around a half a million machines.
Privacy is paramount for both our personal and business lives. We rely on passwords to maintain that privacy on the devices and accounts we use every day. If we are doing our due diligence, these passwords will be strong; using a complex variety or letters, capitalization, numbers, special characters or through the use of phrases. We also should not be using the same password for all of our devices or accounts because if one of them is compromised, it no longer matters how complex it was. Sometimes though, all of our careful planning may not be enough and a breach can occur anyway, so it’s important to be proactive in ways to defend ourselves.
March is Asset Management Awareness Month and we are here to offer some insight and tips to help you maintain this data. Asset management is the process of tracking what you and your company define as an asset and documenting its usage from the start of its life cycle until it is retired. It serves as a way to store detailed information for individual hardware, software, recurring services, or other designated items. You should make each entry unique by adding information like serial numbers, license keys, detailed descriptions, who it’s assigned to, dates of activation or expiration, and any related documentation.
Data capture and entry while in the field can be a time-consuming process that often requires the transposing of physical documents into your enterprise resource planning (ERP) software, and constant filing and looking up of paperwork. Finding ways to streamline the way you record and access your data in the field can help you focus more on getting the job done. The Business Information Group, Inc. (BIG) application development team has created a solution by integrating tools into the Viewpoint Vista ERP to help automate your day-to-day processes.
For the past decade or so, Intel’s flagship processor has been the Intel i7 product line. It has been touted as the best cost for performance processor in the industry time and time again, starting with the i7 2600K what seems like a century ago.
We use phones all-day every-day, but we may not always stop to think about what it takes to keep us all connected. Behind the scenes, there are various providers, technologies, and services to consider when making the best choice for you.
Security is our number one focus area not only internally but for our clients as well. With the ever-growing number of threats, security should be every business’s number one concern for all internal and external information that it holds.
Spear phishing and Cyber fraud are gaining traction as the most significant security threats and are causing detrimental damage to individuals and businesses. What is Spear Phishing and Cyber Fraud and how do they work?
Internet security is more important than ever before. Malware and internet attacks have become more prevalent and difficult to combat with confidence. Any internet accessible device can be affected by these attacks and can cost a company or individual an exuberant amount of money to recover.
The construction industry employs about 7 percent of the world’s working-age population and is one of the world economy’s largest sectors, with $10 trillion spent on construction-related goods and services every year…. But the industry has an intractable productivity problem.
The world of technology is rapidly growing and so are social engineering attacks. In 2016, over 638 million users were affected by ransomware, and the number of attacks continue to increase. According to the FBI, it’s estimated nearly $3.1 billion has been stolen from over 27,000 victims of CEO fraud. Because social engineering attacks are evolving and becoming harder and harder to detect, Business Information Group, Inc. has chosen not only to partner with KnowBe4 to provide their clients with a valuable and necessary service, but has also adopted KnowBe4 internally.
Business Information Group (BIG) welcomed 8 year old Fiona Myers, and her mother Jen Myers, for an afternoon to learn about application development and answer her questions on how to create a mobile app.
NVMe, though having been around for nearly a decade; most have not heard of or those that have are likely not utilizing it in their environment due to cost. As it relates to Information Technology, costs are always coming down and NVMe is no different and if implemented in a hybrid mode, initial costs can be decreased as well.
Traditional security camera solutions pose some challenges such as increasing cost of video storage for each additional camera, central storage that causes single point failure, and software that is commonly never updated. Years go by and these devices connected to the internet for remote viewing become targets of malware attacks and create easy points of entry into your network. Business Information Group recently deployed a new security offering from Cisco Meraki that has created a new solution for this generation of job site camera security.
To enable security for clients and to help mitigate risk, Business Information Group has established a partnership with Duo, a cloud-based, two-factor authentication that verifies the identity of users and the health of their devices before allowing them access to their applications.
The first consideration for information systems in any company is how to keep your data secure. The threats to get company data are always present and it is up to the Information Security team to minimize these risks. Social engineering is a great threat to a company. Most social engineering attacks are targeted to a single person. These attacks focus on a single person’s willingness to help, greed, need for connection, fear tactics, or sense of responsibility. These manipulated attacks can be used to get employees to release company information if the employee isn’t properly trained to be on the lookout for these threats.
Enterprise Resource Planning (ERP) systems and Business Intelligence (BI) platforms generally take a large chunk of the IT budget at many organizations. What tends to get overlooked in these efforts, however, is the quality of the data being generated and consumed.
… undertaking large IT development projects can be a daunting undertaking. When approached properly, these efforts can have a positive impact on the organization’s bottom line, and as such require the attention they deserve to be successful. By bringing IT and business users together under one umbrella to tackle the challenge, risks can be more easily managed and the delivered product can help the organization meet its strategic goals.
Technology has allowed organizations to conduct their business more efficiently than ever before. However, that efficiency has come with additional risks to their infrastructure, clients, and employees. Data breaches and other forms of cyber-attacks will continue to occur, and no organization is immune for these threats.
YORK, PA. (20 September 2017) — Business Information Group (BIG), a leading IT consulting firm based in York, Pennsylvania, is pleased to participate in a fall clean-up day for Leg Up Farm, a nonprofit therapy center in York County for children with special needs.
Implementing an Enterprise Resource Planning platform can be a daunting challenge. The investment in time and resources is usually something that most large organizations only undertake in rare occasions, and fairly infrequently. Now that the system is Live and the organization is using the new tools available, many organizations simply return to focus on their core business, and the project team that implemented the new software returns to their “day jobs”.
In 1989, Eastman Kodak made a bold and revolutionary business decision: rather than figuring out how to build a new data processing center, they partnered with IBM who would design, build, and then manage Kodak’s new facility. This decision, while criticized heavily at the time, is widely regarded as the deal that kick-started the IT outsourcing frenzy.
It is described as integrating communications in order to optimize business processes. That means that a company is able to unify its typical business processes of both real-time (phone calls, conference calls, videoconferencing) and non real-time (voicemail, email) communications.
The “Cloud”: the wonderful, magical buzz-word that aims to solve all of IT’s cost issues and ease of access to business data. Depending on what side of the IT organization one falls The Cloud can either be a worthwhile way to save on IT expenditures and maintenance costs or yet another third-party service that requires management, recurring service charges, and worry about the security of the organization’s data.
The data that we create every day is what we rely on to keep business moving forward. What if one day the data is no longer available? This may be due to ransomware, natural disaster, infrastructure failure or theft. How can your company recover from an incident like this? There are many different directions we can take this conversation but for right now let’s just focus how we are backing the data up.
Business Intelligence (BI) entered the popular business lexicon in the late 1990s, and has grown to such prominence that there are entire careers and service industries centered around business intelligence, and how it can give any organization with the resources a huge competitive advantage.
YORK, PA. (19 June 2017) — Employees from Business Information Group (BIG), a leading IT consulting firm based in York, Pennsylvania, volunteered on June 9, 2017, with Home Helps. Operated through Servants, Inc., the Home Helps program provides repair and maintenance services for low-income older adults, disabled individuals and single-parent homeowners who are living in an unsafe or unhealthy home in York and Lancaster counties.
Enterprise Resource Planning (ERP) systems are often the keystone by which all business processes are built around. Modern ERP systems are tailored to the specific industries they support, ranging from construction, retail, manufacturing, or even agriculture.
Technology has been advancing rapidly in the last few years and we are now seeing such futuristic things like driverless cars, augmented reality and artificial intelligence. We are all familiar with poor mobile phone coverage, dropped calls and slow data speeds. However we are now moving into a world where everything will be connected together, creating a world where billions of devices communicate with each other in real time, fully automating our lives. We will all live in Smart Cities…
The realm of the traditional IT department and related staff used to be in a back corner of the office, emerging only when a business user ran into a problem, or the network or a critical server suddenly stopped working. In traditionally conservative industries like the Engineering and Construction space, this delegation of IT to the background who only becomes useful when something stops working is even more prevalent.
It’s the company’s core values that keep BIG and its employees grounded and determined to give back to the locale that provided its start. Those values emphasize continuous learning, open communication, honesty, change and excellence. These are key to BIG’s mission and to the way the firm serves its clients.
The traditional model of acquiring technology services is time and material; your server broke and your provider showed up to repair with no end in sight on what the dreaded bill was going to be. The longer it took to diagnose and repair the more money it cost you, the consumer. This often left clients feeling frustrated and vulnerable. More recently technology providers have started to offer a more comprehensive acquisition model that is proving to be mutually beneficial, leaving clients satisfied, while providing the insight necessary to affordably remediate in a timely manner. Many technology firms refer to this offering as Managed IT Services.
Security is a topic that we hear about everywhere, from big box stores like Target to the Presidential Election. Security is something that every company should be evaluating and planning for, so why aren’t they, because security is inconvenient.
Years ago data backups were great insurance in the case of a catastrophic hardware failure. However, the need to restore from those backups was relatively infrequent. Many folks would question the value of expensive data backup systems because it was insurance that was rarely or never needed. Those days are long gone.
Although the Construction Industry is not top of mind when thinking about the industries that fall victim to most cyber-attacks it is still a critical threat to any business that is connected to the internet. Based on the way a construction company and its associated partners access and share data; Cyber Security should be a component of risk mitigation for every company.
Cloud revenue is estimated to be $149.12B by 2019*. I think it’s safe to say that cloud services and applications are here to stay; 59% of companies indicate that they are using some sort of cloud service for at least 1 or 2 applications*.