November 2013
In this issue

> Cryptolocker Virus
> Cloud Services You Can Trust
> Choosing Technology
> A Great Network
> Business Continuity Tip
> Cartoon/Quote

Behind Every Great Device is a Great Network
used with permission from Cisco

Exponential growth in the use of smart devices has led to significant and increased demand for bandwidth across 84 per cent of organisations surveyed globally, according to new research commissioned by BT and Cisco. More than half (56 per cent) of IT managers have also noticed a resulting performance decline in some applications, which impacts negatively the productivity gains promised by smart devices. Almost half (46 per cent) of workers with Wi-Fi access in their office have experienced delays logging on or accessing an application, while 39 per cent have noticed they are running more slowly now than before.

The research, which surveyed attitudes towards workers' use of their own smart devices (laptops, tablets and smartphones) in 13 regions, reveals 76 per cent believe their organisations need to take further steps to fulfill the potential productivity gains that smart devices offer. Increased use of cloud solutions (33 per cent), greater use of specialist software (32 per cent) and greater support for smart device users (32 per cent) are what is needed to seize the opportunity.

Read more

Business Continuity Tip
Holiday Fire Safety

Decorating homes and businesses is a long-standing tradition around the holiday season. Unfortunately, these same decorations may increase your changes of fire. Keep these decorating tips in mind for a safe holiday!

>Only use non-flammable or flame-retardant decorations

>Check holiday lights each year for frayed wires or excessive wear

>Do not link more than 3 strands of holiday lights

>Never leave a burning candle unattended, and consider using battery-powered flameless candles

>Keep natural trees away from any heat source or exit, and water it daily

Please forward this newsletter to anyone else in your organization who might be interested!



Thursday, November 28
Friday, November 29
Wednesday, December 25 Wednesday, January 1

Cryptolocker Virus
used with permission from ezMicro

There is a new and very serious virus named CryptoLocker that is currently circulating the Internet. The threat involves an e-mail attachment that, if opened, will evade most anti-virus and anti-spyware software and encrypt data on your individual computer and your network, making it appear to be inaccessible. Please inform everyone to be extra vigilant about not opening attachments from questionable sources. The delivery is very clever and very malicious.

CryptoLocker currently has three infection vectors

  • This infection was originally spread via sent to company email addresses that pretend to be customer support related issues from FedEx, UPS, DHS, etc. These emails would contain an attachment that when opened would infect the computer
  • Via exploit kits located on hacked web sites that exploit vulnerabilities on your computer to install the infection
  • Through Trojans that pretend to be programs required to view online videos

You should NOT open any attachment you are not 100% confident is safe. These messages should be deleted immediately, if received.

Read more

Cloud Services you can trust: Security, Compliance and Privacy in Office 365
used with permission from Microsoft

When you make a decision to place your trust in a cloud services provider for productivity services, security, compliance, and privacy are top of mind. With over a billion customers on Office and decades of experience running online services, we understand what it takes to earn and continue to maintain your trust and confidence in Office 365.

Our construct for security, compliance and privacy in Office 365 has two equally important dimensions - Built-in capabilities that include service-wide, technical capabilities, operational procedures and policies that are enabled by default for customers using the service and Customer controls that include features that enable you to customize the Office 365 environment based on the specific needs of your organization.

We will look at Built-in capabilities and Customer controls for each of the key pillars of trust - Security, Privacy and Compliance - in more detail below.

Read more

3 Things You Need to Do When Choosing Technology for Your Business
used with permission from Microsoft Business Hub
by Cindy Bates

You want to save money. You want to get more done in less time. And you want technology that just does what it€s supposed to do. Here are three ways you can ensure you€re making the right technology decisions for your business.

Know that "free" often comes at a cost. The old saying is true: there€s no such thing as a free lunch. Saving money in any way possible is a top priority for most small business owners, but when it comes to choosing technology, it pays to think through the downsides of free solutions before they end up costing your business in the form of frustration and lost productivity. A free software program may have some of the features you need, but getting it to interface with separate business applications can be a huge challenge.

Read more


Quote of the Month

"Sometimes our light lgoes out but is blown into flame by another human being. Each of us owes deepest thanks to those who have rekindled this light."

- Albert Schweitzer

Databranch, Inc.
132 North Union Street, Suite 108    |     Olean, New York 14760
(716) 373-4467 - Olean    |    (607) 733-8550 - Corning/Elmira

Databranch does not knowingly participate in SPAM.   If you wish to be removed from this list, please follow the link below and you will be taken off this list.  Thank you for your interest in our e-newsletter.