Brain Trust Technologies LLC
TOLL FREE: (877) 288-5527
  • Home
  • Why Brain Trust
    • Partners & Certifications
    • Affiliations
  • Services & Solutions
    • Managed Services
    • Hosted Solutions
      • Business Solutions
    • Hardware & Software Sales
    • Professional Services
    • Business Continuity
  • Blog
  • Resources
    • White Papers
    • Brain Trust Reports
    • Case Studies
    • Newsletter Archive
  • About Us
    • Referral Program
    • Contact Us
  • Support
RSS

Cisco to predict IT failures using AI

October 31, 2017 admin Business 2017october31business_c, business continuity, business critical services, cisco ai, cisco high value services, cisco machine learning, it management

Mark Zuckerberg and Elon Musk are not the only ones dabbling with AI and machine learning. According to Cisco, these technologies might be key to the future of IT system management and business continuity, both of which have grown increasingly complex over the years.

Artificial intelligence (AI) and machine learning are extremely useful in helping us sift through massive amounts of information, and networking behemoth Cisco recently announced that they will be incorporating these technologies with two of their services.

Business Critical Services

This suite of services uses AI-powered automation, compliance, security, and machine learning analytics tools to reduce the complexity of IT systems management. It helps monitor the health of your business services and mitigate risks via automated compliance and remediation audits.

You can also replicate your network to improve reliability between your hardware and software components, and deploy features with automation capabilities.

Cisco High Value Services

This product support model provides network, software, and solution support using advanced analytics and best practices to access infrastructure performance and remediate issues. Cisco aims to improve business continuity and reduce resource constraints with remote monitoring, automated incident detection, and high SLAs.

Some of the services you can expect include software analysis, workflow integration, customer benchmarking, and predictive network analysis.

Using cutting-edge technologies as well as networking and hardware expertise, Cisco is gearing up its attempt to predict IT failures before they happen. That said, we assume it’s only a matter of time before other major developers follow suit, and when they do, you’ll be the first to know.

If you’d like to learn more about how to predict IT failures before they happen, or stay protected and operational when they do, just give us a call.

Published with permission from TechAdvisory.org. Source.

The right way to set up guest Wi-Fi

October 27, 2017 admin Hardware 2017october27hardware_c, business wi-fi, guest internet, guest wi-fi, internet setup

Customers, partners, and vendors expect internet access when they’re visiting someone else’s office. This is why guest Wi-Fi access is so common. But setting it up the wrong way can create a frustrating experience for people looking to connect and leave your company exposed to attacks. Here’s how to do it right.

Never give guests access to your primary Wi-Fi

While giving guests password to your company’s main Wi-Fi might be the easiest way to get them connected, you should avoid this at all costs.

Anyone with a little technical know-how can potentially access everything on your company network, including confidential data. Not to mention, guests’ devices connected to your business network increase the risk of a malware infection or cyber attack since you can never be sure that they’re safe and secure.

Ways to create secondary Wi-Fi for guests

If you router has built-in guest Wi-Fi support (you can check this feature through a quick web search) you could use it to create a separate “virtual” network. This means guests will have access to the internet without connecting to your main company network.

If your router doesn’t support multiple Wi-Fi networks, you can implement a separate wireless access point that bypasses the rest of your network and connects directly to your Internet service provider (ISP) connection.

Both options will keep your guests’ connectivity separate from your company network so you’ll never have to worry about unauthorized persons accessing your company data.

Keep in mind that guest Wi-Fi still uses your ISP connection so you should limit bandwidth usage on your guest network. The last thing you want is a guest streaming videos that slow down the Internet for your employees. With that in mind, you can even have your employees use guest Wi-Fi for their personal devices too. This minimizes the chance of employees hogging company bandwidth for personal use.

Your guest Wi-Fi should only provide outsiders with internet access, nothing more. While proper setup isn’t rocket science, it can be a tedious process. Having said that, if you need a team of experts to take care of it all for you, or simply have questions about how else to leverage your hardware for better efficiency and security, just give us a call.

 

Published with permission from TechAdvisory.org. Source.

Your passwords are not secure

October 19, 2017 admin Security 2017october19security_c, account monitoring, multi-factor authentication, Password security, security best practice, single sign-on

A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case according to the National Institute of Standards and Technology (NIST). On the hook for the password best practices that we still use today — the combination of letters, capitalizations, and numbers — NIST admits that the existing guidelines were misguided. Find out why and how it involves you.

The problem

The issue isn’t necessarily that NIST advised people to create passwords that are easy to crack, but it did steer people into creating lazy passwords, using capitalization, special characters, and numbers that are easy to predict, like “P@ssW0rd1.”

This may seem secure, but in reality, these strings of characters and numbers could easily be compromised by hackers using common algorithms.

To make matters worse, NIST also recommended that people change their passwords regularly, but did not define what it actually means to “change” them. Since people thought their passwords were already secure with special characters, most only added one number or symbol.

NIST essentially forced everyone, including you and your colleagues, to use passwords that are hard for humans to remember but easy for computers to guess.

The solution

One cartoonist pointed out just how ridiculous NIST’s best practices were when he revealed that a password like “Tr0ub4dor&3” could be cracked in only three days while a password like “correcthorsebatterystaple” would take about 550 years.

Simply put, passwords should be longer and include nonsensical phrases and English words that make it almost impossible for an automated system to make sense of.

Even better, you should enforce the following security solutions within your company:  

  • Multi-factor Authentication – which only grants access after you have successfully presented several pieces of evidence
  • Single Sign-On – which allows users to securely access multiple accounts with one set of credentials
  • Account Monitoring Tools – which recognize suspicious activity and lock out hackers

When it comes to security, ignorance is the biggest threat. If you’d like to learn about what else you can do to fortify security, just give us a call.

Published with permission from TechAdvisory.org. Source.

5 computer tips that add hours to your day

October 17, 2017 admin Business 2017october17business_c, business productivity, desktop clutter, keyboard shortcuts, productivity tracker, to-do list, url filtering

There are only so many hours in the workday, so making the most of your time is vital. If distracting websites, unorganized files, and cluttered inboxes prevent you from getting work done, consider using these tips to better manage your time and stay productive at work.

Monitor productivity levels
Start by tracking how much work you complete on an average day. Google Chrome Extensions like RescueTime record your most frequently visited sites, and track how much time you spend away from your computer. Running the app will provide you with a productivity rating and a detailed log of how you spend an average day.

If you find out you’re wasting a huge portion of your time on social networking, you’re more likely to make conscious adjustments on how you manage your time.

Get rid of clutter
Another way to increase output is by deleting old files, uninstalling unused programs, and organizing documents into appropriately labeled folders. This makes your work easier to find and improves your computer’s performance.

As for the clutter in your email inbox, Gmail and Outlook both have features that filter out unimportant messages. Simply enable Priority Inbox on Gmail or Clutter on Outlook to get a clean, spam-free inbox.

Block time-wasting sites
Visiting non-work-related websites is a surefire way to hinder productivity. A quick, five-minute break to check your Facebook feed or watch a YouTube clip may not seem like much, but a few of those per day add up to a lot of time.

If you and your employees have trouble staying away from sites like Facebook, Instagram and Twitter, it’s a good idea to block access to them using URL filters.

Of course, if you want your employees to take occasional breaks during the day, you could use apps like StayFocusd or Strict Workflow. These allow you to set a limit on how long and how many times users can visit non-work-related sites.

Stay on track with to-do lists
To-do lists help you break down large projects into manageable, bite-sized tasks. And perhaps the most satisfying aspect is crossing things off the list, giving you and your employees a sense of accomplishment and total visibility of your progress.

There are wide variety of digital to-do lists available today like Google Tasks or Trello. These platforms allow you to set deadlines for small tasks and write clear instructions for each item on the list. What’s more, they’re incredibly easy to use and are great for keeping track of your workflow.

Use keyboard shortcuts
Last but not least, mastering keyboard shortcuts will make it easier to perform simple functions than if you’re stuck looking for them in the toolbar. There are more than a hundred useful shortcuts, but some that you should always keep in mind are:

    • Ctrl + C, Ctrl + V, Ctrl + X – to copy, paste, and cut selected items
    • Ctrl + Z – to undo changes
    • Ctrl + T – to open a new tab on your web browser
    • Alt + Tab – to switch between open windows
    • Alt + F4 – to close the program

For many more like these, take a look at Windows’ list of advanced shortcuts.

These are just some of the tips every user should know to stay productive. If you need more ideas on how to get more out of your technology, call us today. We provide enterprise-level tools and advice that will make your life a lot easier.

Published with permission from TechAdvisory.org. Source.

Top tips for picking the right power supply

October 12, 2017 admin Hardware 2017october12hardware_c, cabling, cooling, efficiency, energy, power supply unit, psu, wattage

There are plenty of hardware specifications to consider when installing a new workstation in the office, but one you should focus on first is the power supply unit (PSU). Choosing a faulty, substandard PSU often leads to unstable systems and poor performance. Make sure you have the perfect power supply for your workstations by following this guide.

Higher isn’t always better
Many users assume the higher the total wattage, the better the performance of the PSU. While enormous 1800W PSUs are useful for running multiple drives and graphics-intensive applications, they’re unnecessary and often cost you an arm and a leg.

Most computers don’t run at full capacity all the time. In fact, if your computer has mid-level graphics cards, processors, and RAM, 600W is more than enough.

To find out exactly how much you need, online PSU calculators will give you a rough estimate of your daily power consumption. Once you’ve calculated how much wattage you need, you’ll ideally want a PSU that has a slightly higher total wattage limit to provide some headroom in case you want to install additional components later.

Pay attention to efficiency ratings
Highly efficient PSUs tend to have more effective components, consume less energy, and produce less heat, which saves you from huge monthly energy and cooling bills.

The best way to determine whether your PSU is efficient is to look for ones with “80 Plus” certifications. This certification means that a unit is at least 80% efficient, and loses approximately 20% as heat.

Note that higher efficiency ratings equal higher prices, so be sure to weigh the potential energy and cooling savings against the upfront cost of the PSU.

Consider larger PSUs
Although they can be quite cumbersome, larger PSUs are more reliable than lightweight models. Large PSUs are equipped with more advanced internal components and better cooling management. Fans are larger too, which means they can move more air, make less noise, and keep your workstation cool.

Choose your cables wisely
When it comes to cabling, you have three options: hard-wired cabling, partially modular cabling, or fully modular cabling.

  • Hard-wired cables are attached directly to the PSU box. While this setup is cheaper than the other two cabling options, the number of plugs are limited and not suited for customization.
  • Fully modular cabling means all PSU cables are removable, making installation and cabling management easy. These PSU models, however, tend to be much more expensive than other types of cabling.
  • Partially modular cabling takes the best of both worlds, providing necessary cables for the PSU while giving room for other components at a moderate price.

Research the manufacturer
Ideally, your PSU should be provided by a reliable manufacturer that offers reasonable warranties and comprehensive support. Most people tend to opt for Corsair, Seasonic, and Antec PSUs, but you should still take time to research the products.

Look for customer reviews about the specific make and model of your PSU. If that’s not possible, get a hardware technician’s expert opinion.

Choosing the right hardware can be extremely difficult, especially if you don’t have the technical know how. So if you need more guidance about all things related to hardware, call us today. We’re more than happy to answer any of your questions.

Published with permission from TechAdvisory.org. Source.

How do I kickstart my Facebook ad?

October 11, 2017 admin Social Media 2017october11social media_c, facebook, online advertising, social media, social media advertising

Facebook’s not only for posting cat photos, complaining about restaurants, or stalking your ex, it’s also an incredibly effective advertising platform. From small businesses to big corporations, anyone can benefit from Facebook’s marketing tools. Read on to leverage Facebook to your advantage.

Why advertise on Facebook?

Above all else, the cost-effectiveness of Facebook advertising sets it apart from other marketing channels. The starting cost is as low as 1$ per day, which is ideal for SMBs that want to test small campaigns before investing more.

Beyond its affordability, Facebook advertising is also extremely effective. With 2 billion monthly active users and the ability to nail down your audience to the most specific details — including their interests and online behavior — it’s no surprise that Facebook advertising had the best return on investment compared with other social media platforms according to a survey of social media marketers worldwide.

Before you get started

As with other traditional marketing campaigns, before beginning a campaign, you need to determine your marketing objectives, audience, budget, and how you want your ads to look. Once you have the answers to all those questions, you’re ready to go.

A step-by-step guide to creating a Facebook ad:

1. Choose your marketing objective

  • From your your business’s profile page, click on “Create Ads” from the dropdown menu in the top right corner.
  • Enter your campaign name and choose your “marketing objective,” which is what you want people to do when they see your ads. It could be increased brand awareness, lead generation, or store visits. You can pick only one from three categories.
  • Set up your advert account by selecting your account country, currency, and time zone.

2. Nail down your audience
You can tailor your audience based on locations, ages, genders, languages, their interests and behavior, and the kind of relationship they already have with your page, app, or website. It’s best to be as specific as possible when selecting your audience.

  1. Set up your budget and posting schedule
    Facebook allows you to set up a daily or a lifetime budget. The latter is the maximum amount you plan to spend for an entire ad campaign. Then choose the frequency or the start and end dates in which your ads will appear.

  2. Design how your ads will look
    You can choose how your ad posts will look like to your audience, such as whether they will appear as an image carousel, a single image, a video, a slideshow, or a “collection” (a new ad format designed especially for Facebook mobile). Note that your ad will consist of five parts: an image, a headline, a block of text, a link description, and a call to action button.

    Tips on designing facebook ads that grab people’s attention

    Your ads will appear in people’s newsfeeds, so make sure your content is interesting and succinct enough to grab their attention as they scroll past it. Each component of your ad — the image, headline, link description and call to action — must stand out when surrounded by vacation photos that rarely receive more than a few seconds of attention.

Creating a Facebook ad is simple, yet the beauty of it is that Facebook also allows for more advanced targeted advertising if you know how to take advantage of what the platform has to offer. Talk to our specialists today; they’ll be happy to share a few pointers on how to help you achieve optimal results from your campaigns.

Published with permission from TechAdvisory.org. Source.

Equifax sheds light on incident response

October 3, 2017 admin Security 2017october3security_c, cybersecurity, data breach, equifax, incident response, security

What would you do right now if you discover that your business’s database is hacked and a huge number of your customers’ data gets leaked? Speechless, with dismay, but you need to act, decently. In this case, it helps to have a good incident response plan in place, so your business won’t suffer the same fate as Equifax, which is an interesting story we’re about to tell.

What happened to Equifax?

Equifax, the huge American credit agency announced in September 2017 that its database was hacked, resulting in a leak of tons of consumers’ private data, including personally identifiable information of around 143 million US citizens. It included names, social security numbers, addresses, birthdates, and credit card and driver’s license numbers.

Equifax responded by setting up a new site, www.equifaxsecurity2017.com, to help its customers determine whether they had been affected and to provide more information about the incident.

Soon after, Equifax’s official Twitter account tweeted a link that directed customers to www.securityequifax2017.com, which is actually a fake site.

Fortunately for Equifax’s customers, the fake phishing site was set up by a software engineer who wanted to use it for educational purposes and to expose flaws in Equifax’s incident response practice. So, no further harm was done to the already-damaged customers, and Equifax is left with even more embarrassment.

So what did Equifax do wrong?

One of the huge mistakes Equifax made in responding to its data breach was setting up a new website to give updated information to its consumers outside of its main domain, equifax.com.

Why? You first need to know that since the invention of phishing scams, phishers have been creating fake versions of big companies’ websites. That’s why so many major corporations buy domains that are the common misspellings of their real domains.

You should also know that phishers can’t create a web page on the company’s main domain, so if Equifax’s new site was hosted there, it’d be easy for customers to tell whether the new page was legitimate and not be fooled by a fake domain name.

What’s obvious from this embarrassing misstep is that Equifax had never planned for a data leak. And this is an unforgivable oversight by a company that handles the information of over 800 million consumers and more than 88 million businesses worldwide.

Don’t repeat Equifax’s mistake

Whether your business is a small startup or as big as Equifax, it needs to prepare for a data breach. Besides having a comprehensive network defense plan, you also need to have the right incident response plan in place.

So what you should do after you’ve discovered the leak is, first of all, be upfront with your customers and notify them as soon as possible.

You also need to establish a message that includes the following information:

  • How the leak occurred
  • How the leak could affect your customers
  • How you will prevent future attacks
  • What your company will do to support affected customers

You should also create a web page to keep your customers up to date. But remember, the new web page should be under your company’s primary domain name.

As we’ve seen from Equifax, an incident response plan that’s robust is a must. Feel free to talk to our experts about how you can come up with an acute one — so you won’t have to repeat Equifax’s apologetic statement, since it doesn’t help the company redeemged reputation at all.

Published with permission from TechAdvisory.org. Source.

Recent Posts

  • Can AI empower customer service agents?
  • Leave no room for hackers to operate
  • Keep your laptop from overheating

Recent Comments

    Archives

    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015

    Contact Us

    • Email
      billing@braintrusttechnologies.com
    Brain Trust Technologies LLC

    6749 S. Westnedge Ave

    Suite K, #128

    Portage, MI 49002-3556

    Southwest Michigan: (269) 290-7137

    St. Louis: (314) 558-0623

    Toll Free: (877) 288-5527

    © 2022 Brain Trust Technologies, LLC. All Rights Reserved