Brain Trust Technologies LLC
TOLL FREE: (877) 288-5527
  • Home
  • Why Brain Trust
    • Partners & Certifications
    • Affiliations
  • Services & Solutions
    • Managed Services
    • Hosted Solutions
      • Business Solutions
    • Hardware & Software Sales
    • Professional Services
    • Business Continuity
  • Blog
  • Resources
    • White Papers
    • Brain Trust Reports
    • Case Studies
    • Newsletter Archive
  • About Us
    • Referral Program
    • Contact Us
  • Support

Interruption insurance for businesses

December 22, 2015 admin Business Continuity 0 Comments 2015dec22_businesscontinuity_c, business continuity, business insurance, disaster recovery, file storage, interruption insurance, protection, QS_3

BusinessContinuity_Dec22_CNatural disasters have increased exponentially in the last few years – something that has resulted in a number of small and medium-sized business owners turning to business interruption insurance for protection. Covering many scenarios that regular business insurance simply ignores, adequate protection can be the make-or-break factor when it comes to surviving a natural or manmade catastrophe.

So why do small and medium-sized organizations tend to forego business interruption insurance policies? Chances are it, like so many things, comes down to cost. But can you really afford to ignore the additional protection that interruption insurance offers, or is it safe to cut corners and hope that your regular business insurance will have you covered in the event of a disaster?

While an interruption insurance policy may cost you anywhere from $750 to $10,000 or more (the cost is normally dependent on the size of your business), the fact is that your standard insurance policy will not cover you completely when a catastrophe strikes.

Take for example the spate of superstorms that have ravaged the United States over the past decade. From Hurricane Katrina to the more recent Sandy, small businesses and enterprises throughout the US have been left devastated after feeling the wrath of Mother Nature. While a best-case scenario may entail losing a few days sales during a power outage, at the other end of the scale you could find yourself dealing with a destroyed warehouse, an office that no longer has a roof, or thousands of dollars worth of stock destroyed by flooding.

And the reality is that your regular insurance is probably not going to reimburse you for storage or relocation costs if you need to move operations elsewhere, temporarily or otherwise. The majority of policies will only cover the loss of, or damage to, physical items like stock, equipment and property. They will usually not cover you for any loss in profit if a disaster means that you need to temporarily cease trading. On the other hand, tightly drawn up business interruption insurance should cover you in the event you need to move. It should also cover a decrease in sales due to power failures that shut your communication lines down, as well as a drop in profits due to delays in the delivery of stock or equipment.

Think the chances of a natural disaster affecting you are still slim despite the scenes of chaos and devastation reported in the media? Consider that a recent survey conducted by insurance giant Allianz found that there are now typically 600 major incidents per year – compare that to the previous 400 per annum and it doesn’t take a mathematician to figure out that disasters are on the rise.

So, as a small or medium-sized business owner, what do you need to know before you consider purchasing interruption insurance? If you’re thinking of adding interruption coverage to your existing policy, first record your current net income – but watch out because, if your net profit is high, you might be hit by a low per-incident limit. You could find your insurer has limited your coverage and left you inadequately protected.

Is business booming? If you are undergoing rapid growth, keep records spanning many months so you have proof of revenue increase. Without this, you will not be able to forecast month-on-month profit growth and your insurer might cap coverage at the rate of the previous year’s profit, not at your accelerated one. Be aware, too, that the type of interruptions you want protection for should reflect the areas covered in your general business policy. If your existing policy doesn’t include coverage for fire damage, neither will your interruption insurance.

There are many other aspects of an interruption policy to take into account – such as add-ons that protect you in the event of a power outage (something that standard policies normally don’t normally cover), and knock-on effects caused by a disaster at your supplier’s end.

Once you have taken out interruption insurance, should you have to use it then the most important aspect for you will be getting reimbursed. Crucially, you need to be able to provide your insurer with as many details concerning profit loss as possible. Consider storing files electronically, either offsite or in the cloud. That way, if your office or store is destroyed, you’ll still have access to your documents – and a far greater chance of recovering your losses.

If you’d like to learn more about protecting your data, files and documents, as well as about business continuity planning to help you get back up and running should disaster strike, please get in touch with our team today.

Published with permission from TechAdvisory.org. Source.

Twitter alerts users to cyber attacks

December 18, 2015 admin Security 0 Comments 2015dec18_security_c, cybercrime, cybersecurity, QS_3, security, social media, twitter

Security_Dec18_CSomething known as “state-sponsored cyber attacks” may not be something you have heard of until now. But with both Facebook and Google viewing the problem as serious enough to warn their users about, it seems this is an issue that could be here to stay. And now with Twitter also recently taking steps to alert their users about possible account hacking attempts, this may well be something that many of us should be concerned about.

But how at risk actually are you from a state-sponsored cyber attack? Is your small or medium-sized business in danger of being targeted? And who is behind these hacking attempts? Well, going by the warnings recently issued by Twitter, reports so far suggest that people, companies or organizations connected to internet security and freedom of speech are currently most likely to be at risk. But ‘currently’ is somewhat ambiguous, for in the world of cybercrime things can happen at lightning speed, and someone who is a target today might be deemed out of danger tomorrow – and vice versa.

As always, the best form of protection is to be forewarned, and you can only do that by learning as much as you can about the latest threats, scams and attacks. If you are a Twitter user, be it personal or for business use, you may be wondering why you have not yet heard of these alerts. That’s because Twitter’s messages were only sent to a small, and mostly rather niche, group of users. The email informed these users that Twitter was contacting them as a precaution due to their accounts “possibly” having been hacked by the state-sponsored actors. The email also stated that they believed that the actors may (or may not) be associated with a government, and that those involved had been looking to obtain personal information such as email addresses, phone numbers and/or IP addresses. So far, so vague!

Twitter then goes on to say that, although they have no evidence that any accounts were compromised or any data was stolen, they are actively investigating. They also lamented the fact that they wished they could say more…but that they had no additional information at that time. The email goes on to attempt to reassure users that their accounts may not have been an intentional target, but admits that if a user tweets under a pseudonym, that Twitter understands they may have cause for concern. But with so many Twitter users tweeting under a different name – and perfectly innocently, at that – what’s the real cause for concern here?

The issue lies with the type of accounts that were mostly targeted. The majority of these belonged to people or organizations connected to, or concerned with, cyber security. In fact, Twitter even offered some handy advice on protecting your online identity, suggesting users read up on the subject at the Tor Project website. Somewhat coincidentally, one of the victims of the attempted Twitter account hack is an activist and writer who currently educates journalists about security and privacy – and who used to work for the Tor Project. Another is a Canada-based not-for-profit organization involved with freedom of speech, privacy and security issues, and one of its founders is a contractor for the Tor Project.

Other Twitter users who received the email are also involved in some way or another in cyber security, albeit as self-described “security researchers” or simply by way of following or engaging with the online security community. This might lead you to the conclusion that, if you’re not in the business of security and instead keep your tweets to sport, entertainment, and the latest must-have gadgets, you are not at risk. But we urge you not to be so hasty. That’s because, within that small group of people who were contacted by Twitter, a large proportion of them had nothing to do with activism, freedom of speech, calls for greater privacy, or anything of the sort.

This means that, far from brushing this latest round of cyber threats under the carpet, individuals and business owners – whatever industry they are in – do have at least some cause for concern. As yet Twitter has not released details of the state the “actors” are sponsored by, so for now we are none the wiser as to whether it’s a homegrown issue or one from further afar – say North Korea or China.

What does all this mean for you as a business owner or manager? It means that you should be taking your online security more seriously than ever. It’s no longer just your network that is at risk; now simply having an account on a social media site such as Facebook or Twitter could be providing less-than-desirable third parties with the portal they need to access your company’s private information.

If you’d like to know how to ensure the online safety of your organization, give us a call today. Our experts have experience in everything from securing your computer network to increasing safety when it comes to sending out those all-important tweets!

Published with permission from TechAdvisory.org. Source.

How Google overcomes secure browsing issues

December 17, 2015 admin Security 0 Comments google, incognito, privacy, private browsing, QS_3, security

Security_Dec17_CIt’s safe to say that malware attacks, phishing scams, and social media engineering practices are going nowhere fast. That means that, whether you are a home user or the owner or manager of a small or medium-sized business, if you choose to ignore safer online security practices you are putting your identity and the security of your company at serious risk. But what are big providers like Google doing to stop cyber threats in their tracks? After all, surely the onus is on them to provide a service that is secure as it possibly can be?

With more than one billion people using Google’s search engine on their desktops, and over a billion more accessing it through mobile devices, it is clear that security is – or should be – paramount. Google already claims to protect desktop users with its Safe Browsing service, but what about its mobile users?

With cyber threats ranging from the annoying, such as adware, to the unsavory – hello spyware – and the downright terrifying (ransomware, we’re looking at you), mobile device users are increasingly demanding to know that they are being adequately protected when using Google’s products, tools and services. So in order to protect the mind-bogglingly large number of people who are using Google on their smartphones, laptops, notebooks and tablets, Google recently unveiled plans to extend its Safe Browsing service to mobile users – or at least to who are using Chrome on an Android device.

Whether you regard this as a blatant ploy to get users to switch to Android is something we’ll let you decide for yourself, but the fact is that Google is taking steps to protect its users. Back in August 2014, the company bolstered its Safe Browsing warnings with messages alerting users to unwanted software programs trying to sneak onto their computers by attaching themselves without warning to a legitimate download. In addition, both the Android platform and the Google Play Store have security measures in place to weed out potentially dangerous apps.

However, not every cyber security threat comes from an app or installation so, while Google is doing the right thing by guarding against threats in these areas, there are other issues that require a different means of protection. Enter social engineering, and phishing in particular, which can cause untold harm – such as data or identity theft – to a business or individual.

In order to protect against social engineering, an up-to-date list of malicious websites needs to be stored upon the device – this enables Google to send an alert to the user before they get ambushed. But there are problems with this which Google has had to overcome, not least of which is how to keep the list updated in the face of new threats. Compounding this issue further are factors that are unique to mobile browsing: mobile data speeds can be slow and connectivity patchy, depending where the user is. A fast, stable connection is crucial when the timing of an alert is paramount. Not only that, but using mobile data costs the end user money!

Bandwidth (and battery) limitations mean Google has had to find a way to ensure the data they send to users is as small as possible. Protecting their customers is crucial – but so too is not sapping battery life and data plans. Because this boils down to connectivity and speed factors, a device’s location is now taken into account. For example, if a known phishing scam is only affecting certain locations, only devices that are in that part of the world receive a warning.

Google also prioritizes data by sending information on a need-to-know basis – in other words, bigger threats take precedence over more minor issues. They have also designed the software to limit network traffic, and to be as light as possible on memory and processor usage.

Since its announcement in early December, Google is now protecting all Chrome users on Android devices as default, making Safe Browsing part of their Play services from Version 8.1 onwards. Chrome Version 46 is also the first app to initiate Safe Browsing.

How do you know whether you are protected by Safe Browsing mode? Go to your settings in Chrome, and check your Privacy menu. How do you know if your small or medium-sized business stands the best chance of survival in the face of a cyber attack or phishing scam? Talk to us today and we’ll be more than happy to share our up-to-date knowledge with you.

Published with permission from TechAdvisory.org. Source.

«‹ 67 68 69 70›
Brain Trust Technologies LLC

6749 S. Westnedge Ave
Suite K, #128
Portage, MI 49002-3556

Southwest Michigan: (269) 290-7137
St. Louis: (314) 558-0623
Toll Free: (877) 288-5527

SMS Terms of Service | SMS Privacy Policy

© 2025 Brain Trust Technologies, LLC. All Rights Reserved