513-239-PROS (7767)
Go2 Pros, LLC Logo

We offer remote and on-site support services

CALL US
(513) 239-PROS (7767)
  • Home
  • About
  • Services
  • Testimonials
  • Blog
  • Contact

What is the Best Way to Back up?

April 8, 2019 by Dave Collins

What is the Best Way to Back up?

“That will never happen to me.” We get through our lives telling ourselves the worst won’t happen to us. It’s the same with business: “We won’t need this data backup.” Yet, whatever your industry, secure, reliable backup ensures business as usual. So, what’s the best way to back up? Here’s help.

Why You Need to Back up

  1. Business disruptions of any kind can be costly. The disaster might take one of several shapes:
  2. Natural (e.g. wildfires, floods, earthquakes, or hurricanes)
  3. On-site (e.g. hardware/software failure, power outage, inability to access building)
  4. Employee driven (e.g. damaging mistakes or intentional sabotage by a disgruntled employee)
  5. Cyber-attack (e.g. data breach, ransomware, or distributed denial of service attack).

Regardless, the best backup solution can help reduce downtime and damage.

Plan B: Approaches to Backup

There are several off-the-shelf backup options your business can use. Let’s consider the pros and cons of the most popular ones.

USB Thumb Drives — Also known as “flash drives,” “pen drives,” or “memory sticks,” these thumb-sized devices are compact and portable. But they have size limitations compared to hard drives. Also, the mobility makes them easy to lose (which can actually set the disaster scenario in motion).

Additionally, a USB thumb drive is robust when not plugged in, but more vulnerable when attached. If someone inadvertently snaps the drive or employs too much force, they can put the data on that backup at risk.

The cheap ones also tend to be slow, which can make backing up sluggish.

USB Hard Drives — Portable hard drives increase the data storage available, often at a decent price. They are designed to be compact and mobile. You can prioritize durability, processing speed, storage volumes and more.

Hard drives are less likely to get damaged than a thumb drive. If knocked or jostled, the cables are flexible. Still, a hard drive can be prone to physical failure. Selecting an external solid slate drive (SSD) can help since it has no moving parts. Information is stored instead in microchips.

Cloud Storage — Backing up to the cloud stores data on an external, secure server. If thieves take your computers and USB backup, you can still access your data on the cloud. Cloud storage providers build in redundancy to ensure your backup remains safe.

Most cloud storage services back up to secure centers with thousands of servers storing data. Oh, and they’ll have their own server backups too, just in case they’re the ones hit by a disaster. The providers also encrypt data during transit to further ensure compliance and security.

Migrating to a third-party cloud storage service also cuts the clutter at your premises. You can count on expert help to ensure security and compliance. Plus, you can cut operational costs by offloading in-house storage or external hard drive expenses.

OK, What’s the Best Answer? 

Don’t think disaster won’t strike your business. Research has found data loss and downtime are most often caused by:

  • Hardware failures (45% of total unplanned downtime)
  • Loss of power (35%)
  • Software failure (34%)
  • Data corruption (24%)
  • External security breaches (23%)
  • Accidental user error (20%).

We recommend the 3-2-1 backup strategy. This means having 3 copies of your data. Two (2) of these would be located on different devices (e.g. on your computer and on a backup drive). The other remaining backup copy (1) would be secured offsite, in the cloud.

Want to secure your data for the worst? Give us a call at 513-239-PROS (7767) to set this up. 

Filed Under: Uncategorized

Share:

Don’t Fall Victim to Webcam Blackmail

April 7, 2019 by Dave Collins

Don’t Fall Victim to Webcam Blackmail

Many users have reported recent scam messages from individuals claiming to have intercepted their username and password.  These messages often state they have been watching your screen activity and webcam while you have been unaware.

Typically, attackers threaten to broadcast footage to your contacts, colleagues, or social media channels.  Demanding payment in Bitcoin, malicious hackers blackmail their victims to keep confidential information private.

Where Have the Attacks Come From?

In many cases where hackers have claimed to have a victims’ password, this has turned out to be true.

In the last few years alone, many large websites have suffered enormous hacks which have released confidential details on many of their users.  LinkedIn, Yahoo, and Myspace all suffered massive and devastating hacks.  Some users of these services are still feeling the consequences today.

The details leaked from these sites, and others facing the same issues, are sold online for years after the initial breach.  Hackers buy username and password combinations in the hopes of reusing them to access services, steal money, or blackmail their owners.

How to Respond

If you have been contacted by one of these hackers, it is a scary reality that they could have access to your credentials, data, and online services.

The only thing you can do in response to this type of email is to ignore it. This “we recorded you” email is a scam made much more believable because they probably do have one of your real passwords gained from a site hack.

That said, accounts that share the same password should be changed immediately.  Security on additional services you use should be updated too.

Self Defense on the Web

When using online services, a unique password for every site is your number one defense.  A good password manager makes this practical and straightforward too.

Using a different password for each site you use means that hackers can only gain access to one site at a time.  A hack in one place should never compromise your other accounts by revealing the single password you use everywhere.

Often, people think that maintaining many passwords is hard work or even impossible to do.  In truth, it’s almost always easier to keep tabs with a password manager than it is to use the system you have in place today.

A high quality and secure password manager such as LastPass, or 1Password, can keep track of all your logins efficiently and securely.  They often offer the chance to improve your security by generating random and strong passwords that hackers will have a tougher time cracking.

Password management services offer a host of features that help you log in, remind you to refresh your security, and make your safety a number one priority. After using a manager for just a short time, you can be forgiven for wondering how you managed without it.

If you think you might have been hacked already, or want to prevent it from ever happening, give us a call to at 513-239-PROS (7767) to update your security.

Filed Under: Uncategorized

Share:

FOLLOW US

FOLLOW US

We offer on-site services with free pick-up and return by appointment only.

Copyright © 2025 · Go2 Pros, LLC · 1081-B St. Rt. 28 Bypass #266, Milford, OH 45150