I.T. Deidre Frith I.T. Deidre Frith

FIVE REASONS FOR YOUR OWN PRIVATE CLOUD

With the rise of ransomware, cyber crime and just basic disasterous situations, having a reliable backup is essential to maintaining and protecting your company data. As if you needed more than one simple reason (losing ALL of your data if it's not backed up), we have listed five really good reasons why you should use a Cloud Backup. 

 

WHY CLOUD BACKUP?

5 NO-BRAINER REASONS TO USE THE CLOUD FOR YOUR BUSINESS

Cloud Backup Realtime.png

With the rise of ransomware, cyber crime and just basic disasterous situations, having a reliable backup is essential to maintaining and protecting your company data. As if you needed more than one simple reason (losing ALL of your data if it's not backed up), we have listed five really good reasons why you should use a Cloud Backup. 

1.     Cloud Standup

In the event of total failure, our solution offers the ability to activate aka "standup" your servers in the Cloud giving you time to address hardware/software failures.

2.     Multisite Replication

Multisite refers to the three or more data storage locations to which the Cloud Backups replicate. This gives you peace of mind knowing that your data is safe three-times-over and recoverable no matter the cause. 

3.     Ease of Scalability

Being able to scale your business when the time comes easily is important. Here, you can grow your backup without worrying about server sprawl; utilization rates or unnecessary lead time to add new equipment.

4.     Speedy Recovery

Things happen unexpectedly so being able to restore backup drives from any location provides fast recovery when you need it the most.

5.     Offsite Access

Offside access couples with speedy recovery, so being able to access your data from any location makes Cloud Backup hassle-free.

What questions do you have about private cloud hosting?

Maybe your business has already decided that it needs cloud backup and data protection? How do you do it? RealTime IT can walk you through the process and get your business setup with your own private cloud. Email us now to get started.

Read More
I.T. Deidre Frith I.T. Deidre Frith

Smishing...

SMishing is any type of phishing attempt that involves text messaging. As consumers, we tend to be more trusting on our cell phones, but this is very dangerous. Cyber criminals are able to mimic sms (text) messages making it look like it's from someone you know and asking you to click on a link. If for some reason you do this, ransomware could possibly be downloaded on your device and could compromise your sensitive information like credit card, social security and account numbers.

What is Smishing?

sms-phishing.png

SMishing is any type of phishing attempt that involves text messaging. As consumers, we tend to be more trusting on our cell phones, but this is very dangerous. Cyber criminals are able to mimic sms (text) messages making it look like it's from someone you know and asking you to click on a link.  If for some reason you do this, ransomware could possibly be downloaded on your device and could compromise your sensitive information like credit card, social security and account numbers. 

Almost everyone has encountered phishing scams that arrive via spam emails. Someone might claim to be from your bank or pretend like they’re from your phone company looking for personal information like passwords.

Basically, Smishing is the SMS (“SMS” stands for “short message service” and is the technical term for the text messages you receive on your phone) version of phishing scams. Instead of a spammy email, you get a text message on your smartphone.

Now, a lot of people are receiving text messages claiming to be from FedEx or other delivery serviceswith a tracking code and a link to “set delivery preferences.”

Don’t click the link!

If you tap that link on your phone, you’ll end up on a fake site (a phishing site) with a fraudulent “free reward.”

Watch our latest IT Shorts on SMishing now. 

 

Read More
I.T. Deidre Frith I.T. Deidre Frith

Tips to Ensure your Business Can Weather Any Storm E-Book

Fires, floods, hurricanes, tornados - Any one of these natural disasters can impose serious damage to the livelihood of a business. Depending on your business type and location, the risk attached to these natural disasters can vary. Here’s a quick Disaster Survival reference guide to ensure your business can weather any storm. Download today.

Fires, floods, hurricanes, tornados - Any one of these natural disasters can impose serious damage to the livelihood of a business. Depending on your business type and location, the risk attached to these natural disasters can vary. Here’s a quick Disaster Survival reference guide to ensure your business can weather any storm. Download today.

In this guide you will learn:

·       About various naturals disasters & risk levels

·       The potential impacts of each disaster

·       How disaster recovery planning can keep businesses running

·       And more!

Download your free Natural Disaster Survival Guide for Businesses by clicking on the image above. 

Download your free Natural Disaster Survival Guide for Businesses by clicking on the image above. 

 

Read More
I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Protect yourself on Cyber Monday

If you're planning on making some Cyber Monday purchases, here are a few tips to keep you safe.

If you're planning on making some Cyber Monday purchases, here are a few tips to keep you safe.

  • Use a clean machine – make sure all your software, apps, and virus protections are up to date before starting your online purchases. This helps keep malware from stealing your account information.
  • Watch out for phishing emails claiming unauthorized account activity or the need to verify details. Always contact the financial institution directly.
  • Another phishing attempt may come in phony ads and offers that appear to be from companies you already shop with. A few letters off in the address bar can lead to Identity Theft. Be extra careful when clicking links in emails. When in doubt contact the company directly to verify the deal.
  • Only enter your personal info into websites that begin with https://. This indicates the site offers a secure connection for the transfer of sensitive information.
  • If you find an incredible deal on a new website – do some research and check reviews before shopping with the site.
  • Only give the information needed to complete the transaction, the required fields.
  • Don’t make purchases or login into financial and other sensitive accounts over public Wi-Fi Hotspots.
  • Use two-factor authentication on your accounts – Remember to Lock Down Your Login.
*Ref: Call For Action
Read More
Social Media, Blog, I.T. Deidre Frith Social Media, Blog, I.T. Deidre Frith

RealTime team creates Ransomware awareness

This isn't our normal blog post, but this short 'Live' Facebook video gives heart and humor to the serious subject of Ransomware. 

RealTime educating the general public on Ransomware during the 2017 Foster Fest in downtown Dothan, AL. 

This isn't our normal blog post, but this short 'Live' Facebook video gives heart and humor to the serious subject of Ransomware. Watch this brief video showing some of our RealTime team in action. If you have a question about how Ransomware can affect your business, email us at info@realtime-it.com or call (334) 678-1417. 

*Also, don't forget to follow us on Facebook! Look at what you're missing... 

Read More