Windows Server 2003 end of support is coming – are you ready?

TMD Technology Services can help you migrate, mitigate risks and reduce costs.

2003serverMicrosoft extended support for Windows Server 2003 and Windows Server 2003 R2 (WS2003/R2) is scheduled to end on 14 July, 2015.  No patches to fix security exposures.  No corrections to repair any defects in code and no assistance with problems encountered in operation.

If you rely on these solutions for business-critical applications, it should be clear that completing a migration before mid-2015 needs to be a high priority!  If you don’t know where to begin or have already started but not sure you can make the deadline on your own, TMD Technology Services can help.

TMD Technology Services has the expertise to help ensure a successful transition from Windows Server 2003 or SBS 2003 to Windows Server 2012 R2, Azure, or other destinations.   We will help you choose the path that best fits your environment and budget needs. Whether you choose to migrate and modernize your server OS or capitalize on this opportunity to transform your IT and transform your business – TMD Technology Services can help.

Don’t delay, give us a call to discuss how TMD Technology Services can help you plan and deploy a solution tailored to your organization’s unique needs. www.TMDTechnology.com

10 Hidden IT Risks That Might Threaten Your Business

Your business depends on intelligence. But can you count on your technology?

You may not be in the intelligence technology business, but it’s probably impossible to imagine your business without IT. Today, computing technology plays a vital role in the way you serve, work with, and communicate to your clients. Thanks to advances that have made technology more powerful yet less expensive, even
the smallest practice can enjoy capabilities – in everything from marketing and sales to delivery and fulfillment – that were once the sole domain of large enterprises.

But today’s big IT advantages come with major risks. Your networks and systems serve as your silent partner in operations. Should they fail – and when they do, it’s usually without warning – you’re exposed not just to an IT problem, but to a potentially large business problem.

This brief paper exposes 10 silent threats that might be quietly undermining your operations now.

Risk #10: Wrong keys in wrong hands

It’s just common sense: you restrict crucial information, such
as bank accounts and inventory access, to carefully designated employees. Yet many businesses have lost control of their network’s user level access privileges, exposing vital company and client data to people without authorization. One of the first steps toward security is to be sure the right people have the right level of access to appropriate applications and data.

Risk #9: Bring your own headache

On the one hand, new devices such as smart phones and tablets can increase employee productivity – and when employees use their own devices, save the company money. But this new “bring your own device” (BYOD) environment brings new headaches, too. These devices are easily lost and stolen. When they are, any information available to the device – including confidential practice and client data – may be vulnerable to illicit access. Yet fewer than 50% of businesses report the ability to use data encryption and/or remote data wiping to protect their assets. Take stock of your data inventory: you need to share permissions reports that reveal which devices and users have access to which files and applications.

Risk #8: Who’s knocking at your backdoor?

Your business isn’t limited to your own systems. Thanks to access to outside servers and systems, you can leverage potent tools like Gmail and Dropbox to communicate with customers, share files and more. While these cloud services increase your capabilities without busting your IT budget, it’s important to remember that every connection that reaches out from your network may open an opportunity for someone else to reach in. Protect your portals: run an external vulnerability scan that reveals every “backdoor” through which an intruder might break into your network.

Risk #7: “Wet paper bag” passwords

Your password protections are only as strong as the passwords themselves. Having no passwords – or using obvious passwords such as “12345” – undermines the very protection you seek. Yet employees often fail to establish passwords or, when they do, frequently use ineffective ones. Review your passwords’ strength to identify weak spots any unauthorized user could punch through.

Risk #6: Whoa, back up

If you lost a significant chunk of your data right now, how much business would you lose as well? Too many businesses run without sufficient policies, plans and procedures for backing up critical data essential to their ability to operate. If your business depends on manual procedures that are executed inconsistently, you’re exposed to unnecessary losses; it’s time to look for automated backup solutions that are always at work – even when employees might be forgetful.

Risk #5: Show me the compliance

Sensitive data demands special attention. In many businesses, the law obliges you to preserve client confidentiality – and demonstrate that you have processes in place to ensure compliance. The best way to prepare for a regulatory audit is to run regular compliance audits of your own that allow you to take corrective actions before your operation is called into account.

Risk #4: Printing (lost) money

Despite high hopes for the “paperless” office, the reality is that businesses spend lots of money printing, faxing, copying and scanning paper documents. Consider the math: paper plus
toner plus maintenance plus employee time, etc. It’s possible
to bring these printing costs under control, but the first step is
to discover who prints what, how often, and why. By monitoring your multi-function printers, you can limit access to authorized users, discourage unnecessary or wasteful usage, and encourage less-expensive options – such as scan to email or scan to file directories – that save time and money.

Risk #3: “Ghosts” in the machines

There may be “ghosts” haunting your networks – inactive users or inactive computers that remain part of your system, even if they are no longer contributing to your productivity. While the threat may not be immediately obvious, defunct computers represent an expense you don’t need to carry. Worse, inactive users may reflect open accounts (perhaps of people who are no longer employed by your business) that could present security holes for unauthorized access. Run audits that show you what’s active or not, then clean house – and close security loopholes – by burying the “dead” devices and accounts.

Risk #2: When IT can’t keep up, your business goes down

Smart businesses and wise managers protect their critical networks with redundancy: backup servers and routers that are designed to kick in should the main system go down. But the contingency plan is only as good as the processes and practices behind them; should these be inoperative, your business will not maintain continuity in an emergency. To safeguard your business, analyze your network before disaster strikes to be sure that your contingency technologies – such as your backup designated router or alternate domain control – are online and ready for action.

Risk #1: Hiding in the dark

You want to run your businesses, not an IT department. While IT may not be top of mind, it should never be out of sight. Lack of vision into the true status of your technology, and the quality of your defenses against attack or failure, may leave your business vulnerable to disruption, legal consequences and loss of revenue. By implementing regular monitoring and review procedures, however, you can anticipate challenges before they become problems, and take adequate measures to ensure the smooth conduct of your firm.

Give yourself, and your business, a vote of confidence by requesting a computer network assessment. Your network assessment will give you insight into the true status of your IT system, and point the way to appropriate corrective actions you can make to secure your business effectively and efficiently.

Contact TMD Technology Services at (561) 404-9251 or info@TMDTechnology.com

www.TMDTechnology.com

 

July 4th 2014 Celebration in Delray Beach

4th-july-delray-beachThis is one of our favorite events of the Summer in Delray Beach!  We encourage everyone to enjoy the fantastic 4th of July firework display in Delray Beach!

Be HOT at Delray Beach’s coolest event of the year, the July 4th Celebration. Located on A1A and Atlantic this FREE event will feature back to back live music from The Kinected, Mike Mineo, and The Petty Hearts (Tom Petty Tribute Band).

Family activities will include the Remax Splash Zone presented featuring water slides, water games, and did we mention…. WATER, a Kid’s Corner hosted by the Avenue Church with face painting, craft activities, a photo booth, sidewalk chalk, and much more. For the adults who want to kick back a Beer Garden hosted by Burger FiCaffe Luna Rosa, and Boston’s on the beach will provide the refreshments to keep you cool including Burger Fi’s food truck giving out free custard samples. Plus custard eating contest for kids and a burger eating contest for adults!

Make sure to visit the professional sand sculpting artist, grab food from the vendors and restaurants, and challenge your friends to a game of putt-putt at the Putt’n Around mini golf course. As the night wraps up remember to count down with Mayor Cary Glickstein and the No Bodies Crew performance for the fireworks show which launches from the North end of the beach. The activities are endless just like the fun so bring your suits and sunglasses and enjoy the coolest event of the year, Delray Beach’s July 4th Celebration!

July 4th Schedule Delray Beach
8 am- Noon- sand Sculpting contest
3:30 pm – Flag raising
4 pm – 9 pm – Non-Stop entertainment on the main stage
4 pm – 8 pm – Family activities – Splash Zone, Kid’s Corner, Putt n Around mini golf
4 pm – 9:30 pm – Beer Garden
9 pm – Fireworks by Zambelli simulcast by Wild 95.5 from the north side of the beach.

www.TMDTechnology.com

The 2014 hurricane season is here, are you prepared?

HurricaneThe 2014 hurricane season is here, are you prepared? What about your business? Let us review your backup and disaster recovery plans.  We can perform a review of your infrastructure design and make recommendations on procedures and technology solutions that match your needs.

 

Hurricane Tips

  1. Watch the weather and listen to the authorities for evacuation notices and other warnings.
  2. Keep important documents and information together in one place and store in a waterproof bag or container.
  3. Inform your friends and family  during the storm and where you are going to be after. Check in with them to let them know that you are safe.
  4. Document your house and business. Take photos and/or video of your belongings and keep an inventory of all your belongings.
  5. Check and secure all openings to the house (windows, doors, etc.)
  6. Listen to evacuation notices.  Authorities will not be able to help you during a storm.

Hurricane Preparedness Checklist

  • Bottled water (enough for a week)
  • Canned and dry food; Non-perishable
  • Manual can opener
  • Paper products, plates, cups, utensils
  • Gas/charcoal grill
  • Lighter or matches (be careful of open flames)
  • Plenty of Batteries
  • Flashlights
  • Battery powered radio
  • Fill your vehicles with gas
  • Charge Your Cell Phone

Want to know more about protecting your businesses critical data?  Contact us today.

Fix For Internet Explorer Bug Has Been Released

 

In a follow-up to our previous post, Homeland Security: Don’t use Internet Explorer due to bug.

Microsoft has released a fix.

Summary

 

This security update resolves a publicly disclosed vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using an affected version of Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

 

This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers. For more information, see the subsection, Affected and Non-Affected Software, in this section.

 

The security update addresses the vulnerability by modifying the way that Internet Explorer handles objects in memory. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry later in this bulletin.

 

This security update addresses the vulnerability first described in Microsoft Security Advisory 2963983.

 

Recommendation. Most customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. For information about specific configuration options in automatic updating, seeMicrosoft Knowledge Base Article 294871. For Customers who do not have automatic updating enabled, the steps in Turn automatic updating on or off can be used to enable automatic updating.

Security Update for Internet Explorer (2965111) 

This security update resolves a publicly disclosed vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using an affected version of Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

www.TMDTechnology.com