ERP News Magazine September 2020 – Issue #11

ERP-News-Magazine-September-2020-issue-11-header

ERP News Magazine September 2020 – Issue #11Download Here (PDF)

Hello everyone from the 11th issue of ERP News Magazine,

The increasing number of alternatives in the ERP Industry triggers the question of how to choose the right system for your business through these troublesome times especially for those who have realized the necessity of digital transformation and getting ready to take the first step. Then, it all comes down to the critical decision that should be made: Should you go with a generic ERP solution, or are you looking for industry-specific ERP software? Many of both preferences are widely available in the market. It is all about analyzing your needs correctly!

In this issue, we asked the question of “How to Choose Between Generic and Industry-Specific ERP Systems?” to the industry professionals.  We hope their answers will enlighten your journey to digital transformation in which you will find all the advantages and disadvantages of both industry-specific and generic ERP systems.

Also, as always, you will find the latest news, articles, and interviews about the ERP industry through the pages of our new issue.

See you in our next issue …

The post ERP News Magazine September 2020 – Issue #11 appeared first on ERP News.

Sage Launches First AI-Powered Timesheets App Built Directly into the Sage Intacct Cloud Financial Management System

Sage Intelligent Time enables service businesses to leverage artificial intelligence to automate time entry, reduce revenue leakage, and improve employee utilization

ATLANTA – Sept. 21, 2020 – Sage (FTSE: SGE), the market leader in cloud business management solutions, today announced the first artificial intelligence (AI) powered application developed for Sage Intacct. Sage Intelligent Time, built directly into the Sage Intacct cloud financial management system and available online or via a mobile app, provides continuous, timely, and more accurate insights to better manage billable time in services-based businesses.

Built-in collaboration with Sage Artificial Intelligence Labs (SAIL), Sage Intelligent Time uses the power of AI to automate time entry, helping services professionals to quickly reconstruct their workday. The personal time assistant aims to collect every billable minute – gathering and presenting the activities to the user to add to their timesheet with any necessary adjustments.

Reducing leakage from either not billing, or under-billing, customers for services provided enables firms to improve project profitability and increase revenues. For example, by properly accounting for billable work and eliminating just one hour of lost billable time per week, based on a $200/hour billing rate, a firm could generate up to $10,000 in additional revenue annually – per billable employee.

“For service professionals who work on multiple projects, multi-task, and are always on the go, timesheets are a dreaded process often saved for Friday night or weekends. Reconstructing the week’s activities for time entry often results in untimely, inaccurate, and incomplete timesheets,” said Erik Zahnlecker, principal product manager for AI and Machine Learning at Sage. “We developed Sage Intelligent Time to enable services-based businesses to more accurately collect the critical information needed to manage profitability and close the books on time while securing revenue often lost due to unlogged, billable activity.”

“AI-powered timesheets can provide a much-needed boost to professional service organizations that are trying to find ways to reduce revenue leakage that is commonly seen with traditional time entry,” added Brian Siefkes, director of professional services industry marketing for Sage Intacct. “At a time when capturing all billable activity is paramount, Sage Intelligent Time is a critical tool to solve the age-old problem of inaccurate time entry. It’s not a stretch to state that Sage Intelligent Time is the biggest advance in time entry since moving from paper time slips to digital.”

Continuous Visibility into Resource Management and Project Profitability

Automated time entry based on activity means time is continuously collected and offers the ability to include smaller activities, such as email, that are often too time-intensive to track manually. The role of the service professional shifts from reconstructing their time to reviewing
it—an easier task that, when done consistently, provides project managers with continuous
visibility into project hours, including real-time project status and profitability information. Armed
with these insights, managers can more accurately guide future project resourcing and pricing to
optimize profitability as well as provide more precise forecasts.

One early adopter, Sheri Petras, CEO, and partner at CFI Group, a leader in customer experience measurement and business insight services, noted: “We bill our projects on a fixed- fee basis, so accurate project cost data is critical for us to understand how we’re performing and how to price future work. Getting dependable project labor costs can be difficult when our team is working on 10-15 different projects in any given week, often spending time on unscheduled tasks. With Sage Intelligent Time, we are much more confident that we have the most accurate understanding of our project status and costs, so we can make financially sound decisions about current projects and better price future work.”

Intelligent Timesheets Streamline Data Entry and Accelerate Timesheet Submission

Sage Intelligent Time features a user-friendly mobile application, enabling service professionals
the ability to review and record billable time while working on the go. This can eliminate the
usual process of project staff spending 1-2 hours of their weekend attempting to reconstruct the
last week (or two) for their timesheet and helps get timesheets completed in a timelier manner.
The personal time assistant also gets smarter with every activity review, saving users even
more time as it learns.

Streamlining and accelerating the timesheet submission process also helps the finance team by
eliminating the need to play “timesheet cop” and track down overdue timesheets, so they can
close the books on time. In addition, as timesheets are more complete, client invoices are more
accurate and specific. Clients know exactly what they are paying for, which accelerates
payments and cash by reducing the likelihood of invoice disputes and trimming.

Another early adopter, Patricia Wakim, SVP of finance for M/A/R/C Research, a marketing
research firm, commented: “Our project managers are typically very busy and required to juggle
multiple projects, which can make time entry delayed and often less accurate. We depend on
that time entry to get an understanding of the financial performance of our projects and catch
any revenue leakage before it gets out of control. To streamline the process, Sage Intelligent
Time helps suggest what should be entered instead of forcing our project managers to dig
through their calendar and email to reconstruct the workweek. The automated alerts are also
helpful for me, so I don’t have to play ‘timesheet cop’ as much – but I will miss the opportunity to
wear the badge every Friday.”

Maintaining Privacy and User Control

User privacy is built into Sage Intelligent Time. The user is in complete control of what types of information to provide to their personal time assistant. The activity data collected by the time assistant is visible only to the user. Once Sage Intelligent Time suggests a time entry, the user can review and adjust it before applying each suggested entry using a simple drag-and-drop interface.

Delivering the Future of AI for Finance

Sage AI Labs (SAIL) is a cross-functional group that drives the development of AI and machine learning services, infrastructure, and strategy at Sage. The SAIL team is comprised of top finance technology and AI experts intensely focused on revolutionizing the role of finance. The SAIL team has a visionary approach to deliver a continuous close so that finance has continuous trust in their numbers and continuous insights without the pain of the traditional close process. SAIL is helping Sage customers leverage AI to free their finance teams from repetitive tasks and empower them with actionable insights, so the CFO can be a more strategic leader to the business.

To learn more about Sage Intelligent Time, watch this short overview video and visit the Sage Intelligent Time product page.

Availability

Sage Intelligent Time is currently in the Early Adopter phase. It will be generally available from Sage Intacct and its network of channel partners in the U.S. in the next quarter.

The post Sage Launches First AI-Powered Timesheets App Built Directly into the Sage Intacct Cloud Financial Management System appeared first on ERP News.

Everything You Need to Know About Hiring a Maritime Lawyer

Maritime injury cases generally involve marine vessels. You are likely to encounter most water injuries due to recreational boating accidents or if you work in the maritime industry. In some cases, the injuries might emanate from some time of negligence on the part of the maritime company you work for. That is why it is necessary to understand the steps to protect your rights after a maritime accident. Let us cover what you need to know about maritime accidents, including hiring a lawyer.

maritime

Types of maritime injuries

Well, it is appropriate to understand the kind of maritime
injuries if you are to take the first step to protect your rights. Let us look
into some of them:

  • Slips
    and falls
    : You can get injured if the boat’s deck, stairs, and the likes
    were wet
  • Collision
    and bumps
    : You may sustain injuries due to improper safety
    precautions
    taken with cranes, dollies, carts or the
    machines on-board your water vessel.
  • Heavy
    lifting
    : A maritime lawyer will also represent you if you sustained
    injuries for lifting a heavy object at a long time. For example, if the boat’s
    deck tilts unexpectedly, then you lose control and sustain injuries. 
  • Sickness: if the company you
    work for didn’t follow sanitation and health guidelines, you might fall sick.
    In this case, you can hire a lawyer to seek compensation for negligence.

Now that you are well aware of the cases that you can hire a
maritime lawyer to help you settle, it is important to understand the maritime
law process and find a lawyer.

The maritime law process

After establishing that your injury falls under the maritime
injury category, the initial step is to reach out to the maritime lawyer. Speak
to a maritime injury lawyer who will discuss your case and
investigate the factors contributing to the injury. The next course of action
is to determine the case and see whether your lawyer will enter into
negotiations with your employer or an insurance adjuster, begin state or federal
legal proceedings or file a lawsuit on your behalf. Again, it is best to talk
to a maritime lawyer who will help establish the best course of action for your
case.

Why do you need to hire a maritime lawyer?

It would be best if you spoke to find a lawyer with a track
record handling similar cases. The following are the benefits of hiring a
qualified maritime lawyer:

  • They have vast
    experience as maritime accident attorneys, meaning that they have developed
    legal resources specific to maritime law.
  • They have resourceful
    networks of medical, engineering, and maritime industry experts. Hence they can
    easily get outside opinions that will help build a stronger case.
  • They make excellent
    witnesses who will testify before a judge on your behalf.
  • They understand the
    process and hence, will do the legwork for you as you focus on recuperating.

Final remarks

Accidents are sometimes inevitable. In a maritime
environment, you could easily get injured in the line of duty. It is crucial to
understand the legal process to protect your rights. Speak to a maritime lawyer
to help seek compensation for the injuries sustained.

The post Everything You Need to Know About Hiring a Maritime Lawyer appeared first on ERP News.

Oracle Helps Customer Service Teams Embrace Change

Over the past few years, customer service organizations have undergone significant changes to meet evolving customer expectations, and the events of this year have understandably accelerated many of those trends.

If 2020 has taught us anything, it’s the importance of being resilient in the face of constant change. The pandemic turned service departments on their heads, shutting down at a moment’s notice and reopening with remote workers. At the same time, many service departments had been overrun with requests and have had to rethink how they operate in order to answer customers when and where customers want.

As service professionals look to the future – and in many cases, consider reinvention of their entire service departments – Oracle is here to help. To guide customers through these shifts and prepare them for the future, we have introduced a series of updates to Oracle CX Service within Oracle Cloud Customer Experience.

  • New Digital Customer Service Tools: Context and understanding are everything in today’s environment. To help customer service teams meet these demands, we have introduced a series of new digital customer service tools.
    • Automated Service “Digital Trifecta”: Helps service teams deliver accurate service at scale by automating service 24/7 through the integration of our Knowledge, Intelligent Advisor, and Digital Assistant products.
    • Intelligent Advisor: An enhanced advisor helps enhance the customer experience with visuals such as uploading an ID, seeing a house on a map, and more, while also helping agents come to decisions faster with new real-time insights.
    • “Service at the Point of Need” Inlays: New inlays or “pop-ups” monitor digital behaviors to read signals when someone might need service, and then offer service proactively. Inlays are context sensitive to ensure personalized and intelligent interactions.
  • New Service Center from Home Capabilities: As service departments stay remote during the pandemic – and look to maintain increased work-from-home programs afterward – we have introduced a series of new remote work tools.
    • Agent Experience Upgrades: To help service teams operate from anywhere and maintain productivity at scale, we have improved agent experience in the Oracle CX Service browser user interface. This allows agents to provide service from home or any location, via any browser or device, through an intuitive and customizable system.
    • New Slack integration: A new Slack integration with Oracle CX Service gives agents a familiar tool to collaborate and resolve customer cases faster. Teams can drag and drop cases and stay better connected with teams while remote.
  • New Field Service Capabilities: Field service is vital in maintaining essential infrastructure (power, water, internet, etc.) as well as lifesaving equipment (MRI machines, ventilators, etc.). To help organizations enhance field service capabilities, we have introduced new collaboration, digital assistant, and advisor capabilities.   
    • New “Where’s My Technician?” feature: Helps customers follow the progress of their service appointments and engage directly with the field service teams in a style similar to an Uber app experience. Customers will also be able to confirm and change appointments, watch a vehicle pull up on a map, and more.
    • New Field Service Digital Assistant: A new digital assistant helps customer service teams save time by answering questions for technicians in the field.
  • New Customer Data Management Enhancements: Customer service data is a critical source of customer information that is often inaccurate and difficult to share with the rest of the organization. New features in B2C Service Customer Data Management validates and de-duplicates customer data to ensure accuracy and completeness while making it easier to share customer data across the organization.
  • New Knowledge Management Capabilities: To help agents navigate massive knowledge databases and quickly discover the best content, we are introducing artificial intelligence advancements. New artificial intelligence capabilities will proactively show agents the best answers, as well as help agents, write, and search for informative articles.

The post Oracle Helps Customer Service Teams Embrace Change appeared first on ERP News.

The seven most inspiring TED Talks for female entrepreneurs

While there are more women than ever starting and leading businesses, female entrepreneurs still face some unique challenges. Fortunately, there are lots of supportive, inspirational women around the world who share strong, empowering wisdom to help aspiring female entrepreneurs push through and succeed.

So, no matter what challenges and obstacles you’re dealing with while trying to start or grow your business, we’re here to help. In this post, you’ll find seven inspiring TED Talks to support, delight and motivate you to keep going, no matter the daunting setbacks you may be facing now or in the future.

Editor’s note: Looking to launch a new online business but don’t know where to start when it comes to getting a website?  123 Reg will be explaining how to create a business website at this year’s Women In Business Expo. The event takes place virtually on the 14th and 15th of October 2020. Head here to book your Women In Business Expo ticket. You can learn more about the event and the other exhibitors here.

At age 64, Diana Nyad became the first person to swim from Cuba to Florida. It wasn’t her first but fifth attempt. And it was a dream 30 years in the making that she never gave up on.

In this talk, Diana talks about persevering, never abandoning your dreams, and finding ways to power through obstacles, no matter what they are.

Hear her story as she shares three key messages you’ll want to remember: one is you should never, ever give up; two is you are never too old to chase your dreams; and three is it takes a team to succeed so don’t go it alone.

If you’ve never watched Dame Stephanie’s Ted Talk, you’re in for a real treat. She is a British information technology pioneer, businesswoman and philanthropist, and one of the most successful tech entrepreneurs you probably never heard of.

In the 1960s, she founded an all-woman software company in the UK, which was ultimately valued at $3 billion. In this amazingly inspirational and fun talk, she tells her story and explains why she went by the name of “Steve” as well as why it’s critical that you partner with the right quality people.

In business, the journey is often more fulfilling than achieving a goal because of the mistakes you make and learn from, the knowledge you gain, and the experiences you have along the way.

In this talk, art historian Sarah Lewis explains how not every piece of artwork from great masters was considered a masterpiece at first. So she asks everyone to consider the role of near failures or near wins in our own lives and journeys.

No matter where you are in your entrepreneurial journey, don’t forget to also celebrate the process as you move one step closer to success. And that process include both the small wins as well as the small failures you can learn from.

Marisa Peer is a world-renowned speaker, Rapid Transformational Therapy trainer and best-selling author. She has also been named Best British Therapist by Men’s Health magazine, and if you watch this talk you’ll see why.

Marisa has an amazing ability to empower women by sharing practical strategies for succeeding, and not just the theory behind it. Watch this talk as she walks you through a few strategies to train your mind to achieve higher success levels, an essential skill for any female entrepreneur.

If you want to start a business but are always finding excuses to put it off another month or year, or waiting for the “perfect moment” or the “right” thing to happen to get started, this is the Ted Talk for you.

In it, clinical psychologist Meg Jay has a bold message for twentysomethings: contrary to popular belief, your 20s are not a throwaway decade. Just because marriage, work and kids are happening later in life, that doesn’t mean you can’t start planning now. Watch this talk to learn how to bring about the success you want in life starting now.

Balancing motherhood and a career is not easy but it can be done, and successfully. In this talk, Irene Mora, a part of Tommy Hilfiger’s Spanish merchandising team, credits her mother – who was the CEO of a multinational pharmaceutical company – for her ambition and drive.

So whether you’re a new mum, a seasoned veteran or years away from motherhood, you’ll find lots of useful advice and inspiration in this talk.

Entrepreneurship is time consuming, which means you’ll likely find yourself working relentlessly hard and sacrificing not only family and social life but also sleep. At least that’s the picture that’s often being portrayed as entrepreneurship.

In this talk Arianna Huffington explains we may have it all backwards, and why the key to success is in fact working less and getting more rest.

Wrapping up

Starting a business can be tough and scary. There are many challenges and obstacles you may have to face along the way. So whenever you feel stuck or need a little inspiration and motivation to keep going, watch these TED Talks to help you push through.

Now, if the thought of quitting your 9-5 job and going all in is just too scary, there are other options too. You can always start small, with a side hustle that’ll give you the chance to try out entrepreneurship and see if you have what it takes to become a full-time business owner.

And don’t forget, when you’re ready to start a new business 123 Reg has everything you need to build your own website.

The post The seven most inspiring TED Talks for female entrepreneurs appeared first on Better business online: Tips, insight and advice.

Top organisations and resources for female entrepreneurs in the UK

Editor’s note: Looking to launch a new online business but don’t know where to start when it comes to getting a website?  123 Reg will be explaining how to create a business website at this year’s Women In Business Expo. The event takes place virtually on the 14th and 15th of October 2020. Head here to book your Women In Business Expo ticket. You can learn more about the event and the other exhibitors here.

Women are rising to the top of the startup scene. According to a report by Crunchbase, the proportion of female co-founded companies worldwide has doubled since 2009.

Simply put, there’s no better time like the present to be a female entrepreneur in the UK and the world. And it’s not just because there’s an abundance of tools that make it easier to start a business. It’s also because these days, there’s a plethora of organisations, groups, communities, and resources designed to encourage and boost female entrepreneurship, better your professional self and find support along the way.

So if you’re looking to launch or grow an existing business, you no longer have to go it alone. Check out this list of incredible resources you can take advantage of to get all the knowledge and support you need to thrive as a businesswoman in the UK or anywhere else in the world.

Women Entrepreneurs UK is a website dedicated to women who aspire to start their own business. You’ll find here lots of useful information on the challenges facing businesswomen today as well as tips and advice on how to raise money for your startup.

If you’re looking to start a business from home, there’s also a section dedicated to that topic with ideas you can use to get started.

Click on “Entrepreneur Articles” in the menu and select between different categories depending on the topic you’re interested in, from “Black women entrepreneurs” to “Mumpreneurs” and “Best home businesses for women”.

The Businesswoman’s Network holds a variety of events (currently virtually) where women can learn the tricks of the trade, from how to make a good first impression to how to raise visibility for your business with Facebook Ads.

Here’s how one of the members describes this network:

“​BWN has been a fantastic source of inspiration to me and I look forward to each event. The BWN is a great tool to network and meet other business women who have opportunities to offer. […] I had a call from a business woman who needed a database and had found me on the BWN website. This network certainly works for me.”

Start by checking out the events calendar to see if there’s any event you’d be interested in attending.

Women Mean Biz (WMB) was founded by Philippa Constable, a networking expert, trainer, speaker and businesswoman who’s taken two start-ups from zero to success.

It’s a network of businesswomen and entrepreneurs working in all sorts of businesses from start-ups to established companies and large corporations. The group is currently holding weekly online networking meetings. You need to be a member to take part, but there are offers available, including a one-month trial membership.

Everywoman was founded in 1999 by Karen Gill and Maxine Benson, who have both been awarded MBEs. The group is dedicated to helping businesswomen grow their skills and thrive in business.

You’ll find here lots of valuable tools, services, events and information that you can use to boost your career as a female entrepreneur.

The Women in Business Network (WIBN) is another membership and networking organisation where women meet (currently, meetings are online) to connect and swap advice and knowledge on how to thrive in their chosen field.

It’s described as a “membership organisation for women who wish to gain new business opportunities through word of mouth. Whether employed or a business owner the network has a huge diversity of businesses involved. Our members support and encourage each other through collaboration and the sharing of business contacts and opportunities.”

Members can also use the platform to share business advice, tips, articles, useful blogs and information as well as to publish any press coverage they’ve received.

Prowess is an online hub that supports women in business, specifically those in the UK, with information, resources and inspiration.

There’s lots of advice on this site coming directly from professional advisors that you can take advantage of to start or grow your existing business. And if you need a little inspiration, you can also find many stories from women who’ve made their own way in business.

She Means Business is a popular Facebook Business page where you can find many valuable communities, resources, tools and inspiration that you can use to grow your business.

The page is supported by the Federation of Small Businesses (FSB) which aims to protect the interests of the 5.4 million SMBs in the UK.

So if you’re looking for groups on Facebook that discuss a specific topic like how to start a business or how to get funding, all you need to do is run a quick search on the site and then join the Facebook groups you’re interested in.

Need some inspiration? Check out the “Inspiration” section on the site to learn how other female entrepreneurs have built successful brands and the struggles and obstacles they’ve had to face along the way.

The Female Entrepreneur Association is a global community dedicated to helping female entrepreneurs turn their ideas into the businesses of their dreams. The organisation currently has 650,000 members from 67 countries.

You can watch a weekly video with advice on how to grow your business or read the monthly magazine with interviews and inspirational stories from female entrepreneurs around the world.

There are also lots of other resources you might find useful, such as the blog which is regularly updated with great business tips and advice as well as masterclasses, live Q&A sessions and more.

Wrapping up

There are many amazing organisations and resources in the UK and globally that encourage, support and provide female entrepreneurs with all the resources they might need to start a business and make it successful. Make sure you take advantage to get inspired and better your professional self as you embark upon your entrepreneurship journey.

The post Top organisations and resources for female entrepreneurs in the UK appeared first on Better business online: Tips, insight and advice.

What is Cloudflare and How Does It Work?

what is cloudflare

Three things are crucial when you’re hosting a business online:

  1. Having a fast site
  2. Staying safe from attackers
  3. Scaling up along with your traffic

Cloudflare can help with all three. But what exactly is Cloudflare and how can a CDN help speed, security, and scalability?

What is CloudFlare?

At the core, Cloudflare is a Content Delivery Network (CDN) composed of hundreds of data centers located in more than 100 countries. Founded by Matthew Prince in 2009, Cloudflare has grown to handle five to ten percent of the global internet traffic, making Cloudflare one of the largest CDNs in the world.

Cloudflare cdn

Image source

How Does Cloudflare Work?

Caching

A CDN like Cloudflare makes use of a process called caching. A cache is a place where frequently-viewed data is stored to make it faster to retrieve.

Think about checking the time – if someone asks you what time it is, it will take some effort to pull your phone out of your pocket and check. However, if someone else asks you about it a few seconds later, you can just say the time you remember seeing. In that case, the time you remember is the cache. Of course, after time passes this cache will not be accurate anymore, so it’s important to refresh it as needed.

Cloudflare will check on your website (also known as the origin) every so often to keep its cache up-to-date. The Cloudflare CDN will then serve that cache to any visitors requesting your website. The main benefit of using Cloudflare is that visitors around the world will be downloading your website from a location that’s physically closer to them, giving them faster loading times. However, it also means that since some of the requests are handled completely by the CDN, your server will experience a lower load, and more visitors will be able to look at your website at the same time.

Filtering Incoming Traffic

Another capability that content delivery networks offer is filtering incoming traffic. This acts as another layer of protection to outside threats, along with your firewall and other security measures you may have implemented. Cloudflare is known for implementing some of the most powerful filtering techniques on their network, which your site can take advantage of.

How does a cdn work

DNS Network

Cloudflare is not only a CDN – they also operate the world’s highest-performance Domain Name System (DNS) network.

The DNS system is what translates your domain name into an IP address that a computer can understand and use to talk to a server. Your domain registrar first specifies an Authoritative Name Server (usually called nameserver), which stores all the relevant DNS records.

The DNS resolution process happens before a connection can be established, so it’s another important factor on the loading speed of your website.

In the default configuration, Cloudflare is set up as your domain’s nameserver, so your visitors will enjoy the quick DNS resolution provided by the Cloudflare network.

Time to first byte with major dns providers

Image source

What are the Benefits of Cloudflare?

Cloudflare has a free plan that lets you try many of their benefits without an upfront commitment. The only change you need to get started with is to change your nameservers to point to Cloudflare, which allows them to provide you with their fast DNS resolution and to proxy your web traffic through their network. Even in the free tier, Cloudflare gives you valuable improvements to both performance and security.

Here are four key benefits of using Cloudflare:

Protection Against Malicious Traffic

Since all traffic to your website first passes through the Cloudflare network, malicious traffic such as DDoS attacks, comment spam, or content scraping can be detected and filtered or rerouted without ever reaching your server in the first place.

Malicious agents are detected using a variety of identifiers, including previous known malicious IP addresses, the type of requests made, any malicious payloads that may be included in the request, or even the timing and frequency of their connections. This is weighed against the security level you’ve set up on your site to determine whether a visitor is let through, if additional verification on the visitor’s browser is required, or if the visit is blocked entirely.

Reduced Latency

Since your website’s data is cached across the Cloudflare network, site visitors will load your site from their nearest Cloudflare data center which will reduce latency, instead of having to load it directly from your server.

Reduced Server Load

Another benefit of caching is that your server won’t need to handle all of its web traffic. Instead, it provides the Cloudflare network with an up-to-date copy of the site as needed, which is in turn served to your visitors.

Universal SSL Certificate

Setting up an SSL (Secure Sockets Layer) can be trivial, or can be quite a bit of work; depending on your webserver and your domain setup. Cloudflare automatically provides you with an SSL certificate on any proxied domain, so your visitors can enjoy a secure connection even if SSL is not set up at your server. You can also set up a flexible SSL setup, so a self-signed certificate can still secure your website in addition to the one Cloudflare provides.

What Other Protections Does Cloudflare Provide?

One of the most useful features that Cloudflare has is the Under Attack Mode, which can be enabled when needed through the Cloudflare control panel. This is designed to be used only when your site is under an active DDoS attack, and it gives every visitor a JavaScript challenge that their browser must complete before they can proceed to your site. Fortunately, this whole process happens in a few seconds without the user’s intervention, to minimize the impact on genuine visitors while still stopping as many automated bots as possible.

The “Under attack mode” is actually one of five security levels that you can set on your site, with the other four being off, low, medium and high. This granularity is useful to mitigate any problems your site may have with bot traffic, even if it doesn’t get to the point of a DDoS attack. You can also set custom security levels for individual pages using Page Rules.

Business and Enterprise Plans

Changing your nameservers may not be ideal if you already have a custom DNS setup, such as for an external mail exchanger. If you are using a custom DNS setup, you can use the Business or Enterprise plans to set up your custom nameservers while still taking advantage of the Cloudflare CDN. Besides custom nameservers, there are other specialized features provided by the Business and Enterprise plans, such as additional page-by-page rules and custom SSL certificates.

You can learn more about them on the Cloudflare Plans page.

What are the Limitations of Cloudflare?

Content delivery networks such as Cloudflare are not a magic wand, and being aware of their limitations can help you make more effective use of them.

Here are two cases when you may not want to have Cloudflare enabled:

During Development

One of the main features of Cloudflare is caching your website data to allow faster loading. This, in turn, means that changes you make to your site may not show up immediately. Thankfully, Cloudflare has the option to disable cache for any domain when needed. Keep in mind that this will affect all visitors to your site. One option to get around this without having to disable cache completely is to use your DNS hosts file to access your server’s IP directly, instead of going through the Cloudflare network.

For Real-Time Data

Just like before, the cache can work against you if your website’s data changes continuously, and you’d like to avoid having your visitors see stale data. Instead of having to disable Cloudflare for your entire site, you can use cache-control directives to tell Cloudflare how long to keep your site’s resources.

How Do I Get Started With Cloudflare?

Setting up a Cloudflare account is free and easy to do. The only requirement to add a domain to that account is to be able to change the name servers that are set up at your domain registrar. This ensures that anyone going through your site passes through the Cloudflare network instead of going to the server directly.

We have partnered with Cloudflare to provide several of their products to our clients. If your domain is registered with Liquid Web, then we can take care of the nameserver change for you. Regardless of whether the domain is registered with us or not, we can help you get Cloudflare set up on your account and point you in the right direction to finish the process.

Tired of a Slow-Loading Site for Global Customers? Try Cloudflare Today

If you are interested in getting started with Cloudflare right now, you can simply head over to our Cloudflare add-ons page to set it up in a few clicks, Live Chat our team, or call us at 1-800-580-4985.

The post What is Cloudflare and How Does It Work? appeared first on Liquid Web.

2020 Q3 Affiliate Partner Contest Winners

affiliate partner contest

In Q3, to help our affiliates fill their calendar with content, we pitted our affiliate partners against each other in a friendly contest to see who could create the most engaging, enlightening, invoking, and amazing article about why to choose Liquid Web for VPS Hosting.

The Prize: Winners were awarded with some cash bonuses—but more importantly—bragging rights as Q3 Affiliate Contest Winners.

We received a great amount of participation among our affiliate partners, and we were really excited to read all of the articles. We have some really amazing affiliate partners (humble brag)!

Each piece submitted was judged based on the content’s overall quality, length, design, and accuracy of information.

Here are the affiliate partner winning articles for 2020.

Fall 2020 Affiliate Contest Winner: Hosting Pill

Hosting pill

What did we love about it?

The article offered a great introduction of Liquid Web along with exceptional readability. The overall design and images balanced well, covering the products and services that Liquid Web offers holistically. And it really highlighted the ideal customer/solution match, helping readers connect with what they need. Check out this excerpt:

While a typical hosting company is a sort of jack-of-all trades that offers a basic range of hosting, particularly shared web hosting, Liquid Web specializes in managed, high-quality solutions.”

Read the full article: Liquid Web VPS Review (2020): Worth Signing Up With Them?

The article was written by Chris Wagner. Follow HostingPill on Twitter @hostingpill

Fall 2020 Contest Runner-Up: WP Mantis

WP mantis

What did we love about it?

The article had an easy-to-understand comparison between each of the types of hosting products. It also mentioned the InterWorx control panel, and highlights the amazing support team at Liquid Web nicely. Here’s an excerpt:

To outperform AWS is saying a lot about the solutions Liquid Web offers. And as the chart shows, to outperform all the top competitors is incredible.”

Read the rest: VPS Hosting – What You Need to Know

The article was written by Chris Eggleston.

Fall 2020 Contest Third Place: Blogging Beats

Blogging beats

What did we love about it?

The article featured a nicely created infographic that really highlights the top reasons why you need to consider hosting with Liquid Web. It also walks you through the cart checkout process, which is an extremely nice addition. An excerpt from the article:

With Liquid Web’s Virtual Private Server, you can enjoy the power of a dedicated server and the flexibility of cloud hosting hassle-free.”

Read more: Liquid Web VPS Hosting Review 2020 (A Brand You Can Trust Blindly)

The article was written by Amit Garg. Follow Amit on Twitter @bloggingbeats

Fall 2020 Contest Honorable Mention: Web Hosting Cat

Web hosting cat

What did we love about it?

It provided readers with an awesome comparison to web hosting competitors they might be evaluating. See this excerpt:

You’ll be pleased to know that Liquid Web has a 100% Network and Power Uptime SLA Guarantee. If you have a mission-critical site that needs to be available to your customers, I would definitely look for this type of uptime feature.”

Read more: Is It Time for You to Upgrade to VPS Hosting?

The article was written by Michael James.

Fall 2020 Contest Honorable Mention: Medium.com

Medium

What did we love about it?

The article provided a great overview of all features offered by Liquid Web VPS Hosting. The information is present in a nice topical fashion. See this excerpt:

It is more than a hosting service or hosting on a server. It is a company that develops high-level digital solutions.”

Read more: Liquid Web Review: Analysis, Opinion, Ranking & Prices

We really appreciate the amazing interest we had in the contest, and really enjoyed reading all the great articles. A big thanks to everyone that entered and participated.

We have the best affiliate partners on the planet.

Don’t forget to subscribe to The Liquid Web Blog for more news from our affiliates, or sign up for the affiliate newsletter to compete in the next event!

The post 2020 Q3 Affiliate Partner Contest Winners appeared first on Liquid Web.

A Complete Guide to Server Migration

server migration steps

Getting ready for another server migration and unsure of what steps you need to take?

If your website or application is changing or growing over the months and years, then it is nearly inevitable that at some point you’ll need to change servers.

When the time comes, be prepared with the following guide on preparing your server and team for migration day and beyond.

A server migration is copying or moving critical data from one server to another, as well as configuring that target server to replace the first.

What is a Server Migration?

A server migration is the term used to describe copying or moving critical data from one server to another, as well as configuring that target server to replace the first. Server migrations in the context of web hosting might revolve around setting up web server and database software, copying over websites and their configurations, and changing DNS to direct visitors to that new server.

Why Should I Consider a Server Migration?

Server migrations may need to happen for a number of reasons. Organizations may migrate to:

  1. Take advantage of new technology or better service, or to ensure that the operating system (OS) and the hardware beneath it stay up-to-date with current technology.
  2. Move to the cloud for increased flexibility or scalability.
  3. To economize and consolidate hosting and reduce CapEx.
  4. Replace aging infrastructure at the end of its lifecycle.
  5. To expand and distribute hosting to help reduce load at a single point and achieve high availability.

Migrations should be handled with utmost care. You could sink hours of time, effort, and money into a migration only to find yourself onto the wrong server solution, or worse, with downtime and profit loss. It takes considerable planning and forethought to migrate your data onto an optimized server that is right for you. After all, on-average downtime can cost an enterprise $686,000 an hour, so your organization’s success absolutely depends on a successful migration.

How Do I Plan for a Server Migration?

Despite the fact that server migrations are quite common, even the most experienced IT professionals experience nervousness when it’s time to actually make a move. With so many moving parts and required precision, it is very easy – and very common – for migrations to be approached with at least a little anxiety.

Alleviate tension by planning ahead for the migration.

It is important to think about data migrations early, because planning ahead is particularly critical for ensuring smooth, fast migrations that deliver the intended benefits without causing a lot of headaches along the way.

While a checklist is important to have, moving to a new environment is a complex procedure, and even knowing what belongs on the migration checklist requires careful consideration.

Organizations that do not leave a long enough lead time for their migration project often find that they experience business disruptions or unexpected costs, even if they do everything else right.”

A clean data migration plan requires extensive system exploration and preparation by the company’s IT personnel, but even after the most diligent preparation, surprises are possible. Because several of the steps require the attention of IT teams or may consume a large amount of bandwidth, those steps should be carefully scheduled.

A complete and accurate picture of your existing infrastructure, including all data, hardware, software, and network components is necessary for a successful data migration. A full documentation of your infrastructure is used to properly architect your new environment before the migration even begins, and enables you to avoid missing anything when the migration is performed.

This resource also informs the rest of the planning process. Performing a thorough discovery can also have the side benefit of uncovering potential future problems, like forgotten web applications running an unsupported scripting language.

Preparation takes many forms beyond the initial exploration phase, including scheduling, communicating with staff, and technical measures such as updating the LAMP stack if necessary, along with code and plugins.

5 Step Server Migration Plan

  1. Preparing Your New Server
  2. Assess Data Fidelity
  3. Data Transfer
  4. Testing (QA/QC)
  5. Changing DNS and “Going Live”

As we mentioned, a complete and successful migration is made up of a number of steps that can be performed sequentially. Those steps tend to fall into one of five primary categories that make up the overarching process of a migration.

Understanding how these broader steps fit together, and what is included in each, is critical to developing your exact migration strategy in the future.

1. Preparing Your New Server

In the simplest terms, think of a server migration as moving from one home to another. If you want to bring all of your possessions with you, then your new home needs to have enough space for all of your furniture, right? And, if you are used to having, say, a double sink vanity in your bathroom, you may want the same features in your new home.

Migrating to a new server is much the same. All of the data associated with your website and applications needs to fit properly and in the right place on your new server. As a result, it is critical that your new server be properly sized and prepared for any incoming data and digital assets. Additionally, make sure that services and packages that your sites depend on are installed and available in the new environment.

Key Questions to Consider During Server Preparation

  • What is your organization’s planned growth over the next five years, and what infrastructure changes will this require?
  • Are all the right parties involved or informed of the planned migration? Think about site editors, administrators, developers, visitors or end users, and your hosting provider(s).

TIP: Build in approximately 20% extra storage space when migrating. During the migration, you’ll need a little extra room to unpack and install the data that’s being migrated, and you will want some room to grow as well.

2. Assess Data Fidelity

The process of making sure all data is accounted for before the migration, and properly installed after, is of critical importance. Losing even a tiny fraction of your data in transition, such as one CSS file or one connection string, can impact the performance of your entire site or application.

We recommend spending some time prior to the migration taking note of what parts of your site are critical, and what parts interact with or engage with other services.

For example, plugins and themes that affect multiple pages should be checked both before and after migration to ensure identical functionality.

Key Questions to Consider During Data Fidelity

  • What is the quality of your data in your old server? Are there a lot of static files, or dynamic databases?
  • Do you have a data governance plan in place to ensure measurement, tracking, and better decision making during the migration process?
TIP: Make an external backup of your entire website before migration. That way, you can rest easy knowing that you have a copy safely stored in the event of a problem.

3. Data Transfer

Once you have prepared your new server and properly secured all data to be ready for the migration, it’s time to finally make the copy.

Data transfer is typically the most time-consuming part of migration. The bandwidth available between your old server and the new server (or between your old hosting provider and your new hosting provider) essentially serves as the conduit for the migration. The more bandwidth you have, the faster the data can be migrated.

Key Questions to Consider During Data Transfer

  • Are all parties on the same page regarding when data transfer will take place?
  • Is there a clear POC at your old hosting provider and at your new hosting provider?
  • Are there any major initiatives or high-traffic events planned during or around the planned migration timelines?

TIP: Let anyone with access to the site know when the migration is going to happen and how long it is expected to take. Putting a “freeze” on any websites or applications will better ensure that no new content or data is lost during the migration.

4. Testing (QA/QC)

Once you’ve actually migrated the data to your new infrastructure, it’s time for testing.

Checking for full functionality and complete data transfer may be time consuming and cumbersome, but that is time well spent to prevent discovering an issue at a much later date. Because it is usually the part of the process where surprises are most likely, it can also vary significantly in how long it can take. Organizations often find that leaving an adequate amount of time to fully and properly complete the testing process is much easier if planned well in advance.

Conducting rigorous testing is how organizations identify unanticipated issues, evaluate the effectiveness of their strategies for dealing with known issues, and confirm the many details about how the process and running in the new environment will work.

Finally, document HOW you will perform testing post-migration to ensure quality assurance and quality control.

Key Questions to Consider During Testing

  • Have you verified appropriate request responses for APIs between applications and servers?
  • In multi-server setups, are public and private traffic moving along the appropriate networks?
  • Are your site(s) or application(s) performing as expected?

TIP: Reference your previous site and server during the testing process to see if anything looks off or incomplete. So long as the prior server was functional, it can provide a good road map for what your website should look like in its early life on the new server. Sometimes, existing site issues can be uncovered during migrations!

5. Changing DNS and “Going Live”

Now that you’ve migrated all of your data, applications, and websites to your new server and performed sufficient testing, it’s time to switch your DNS so traffic goes from the old server to the new infrastructure.

Switching DNS is actually a relatively simple process in most cases. We suggest your DNS switch take place during a time of low traffic and low usage. The middle of the night or the weekend can be the best time for the change.

Key Questions to Consider When Switching DNS

  • Have you double checked there are no business-critical events in the next 72 hours following “go live?”
  • Are all parties clear on their duties for the “go live” event?
  • Do you have a backup, reversion, or correction plan in case something goes wrong?
TIP: Know who your DNS provider is for all involved domains, and let your DNS provider know that you have a migration upcoming and when you will be changing the DNS. In the event of an issue with the change, your DNS provider will already be advised that a migration is in progress, and be more able to jump in and help.

Keep the Old Server Active as Short-Term Protection

Curious what to do with your previous server now that it is not in use? Our recommendation is to leave the old server active for at least a week or two as a point of reference and fallback option in the event an unknown problem rears its head.

Leaving your old server running for a transition period offers excellent protection against the most unforeseen issues.

What Should You Avoid During Server Migrations?

Avoid the following during server migrations:

  • Avoid scheduling a move immediately before a critical period for your business, such as Black Friday for an online retailer, to prevent a situation in which a minor problem needs to be fixed in an unrealistic time frame and becomes a major disruption.
  • Migrations should generally be performed during off-hours or times when a minimal amount of business is expected. This limits the chances of a disruption, but also gives the IT team an opportunity to focus solely on the migration, and prevents the legacy environment from being overwhelmed or the network from becoming saturated.
  • Avoid starting a migration until the exploration period is complete. An incomplete exploration is one of the main sources of preventable problems in migration projects of all kinds.
  • Notify staff outside of the migration team about the migration, including migration timelines, the changes expected to occur, and responsibilities, if any, that may be included as part of the project. It may be necessary to create or make available documentation and have a window of time in which IT personnel can assist other staff or end users with any initial set-up.

How Can a Service Provider Help With Server Migrations?

Most service providers offer to help with migrations, addressing a significant pain point for their potential customers. However, not all hosts have the combination of customer migration skill and motivation to follow through in a way that actually makes the experience as smooth as possible.

The requirements for migrations are significantly different depending on what is being migrated, and the environments involved.

As we previously wrote about migrating data between cPanel servers, service compatibility is the real magic of migrations. The magic spells, in this case, are the configurations and combinations of versions which will work together.”

This can get quite complicated.

In the discovery and documentation portion of the process, your web hosts’ migration veterans can work with the organization’s IT administrators to make sure that all relevant information is identified from the beginning, so they know what to look for. They can also help estimate how long some of the steps will take, including the final move.

Important details about how a particular kind of environment runs, such as ensuring quorum is established in a server cluster, may be obvious to migration experts, but not so clear ahead of time to in-house IT staff in the midst of a major operation. Likewise, after helping organizations through many migrations, service providers can help IT teams anticipate some of the questions they are likely to be asked by staff.

The experience service providers gain from migrating customers is only part of the expertise organizations can benefit from when making a change.

Crafting a new environment to suit your business’ needs is challenging, even once you have completed a thorough discovery, and guidance from professionals who have detailed knowledge of all of the prospective new environment’s elements can be invaluable to making the right move. Likewise, the experience of experts in storage and networking, your operating system, and the particular systems you are migrating from and to can all be valuable resources during the data migration process.

A service provider with extensive experience assisting customers in different kinds of migrations can be an invaluable asset. From exploration and creating a project plan through testing and execution, there are numerous potentially expensive pitfalls that organizations can avoid with the right help.

A Better Understanding of Successful Server Migration Steps

Server migrations are simple to understand and yet often complex to execute.

Believe it or not, that’s a great thing!

The overarching concepts that make up a successful migration mean anyone can do them, and the details of each step, while often numerous, are not necessarily difficult. That said, one of the best things you can do to ensure a successful and complete server migration is to engage experts that know the path and can guide you on the journey.

Here at Liquid Web, our Most Helpful Humans in Hosting™ perform thousands of migrations every year, and understand what roadblocks to avoid and pitfalls to navigate.

If you are considering migrating to a new server, get in touch now. We would be happy to discuss with you what goes into a successful server migration, and help architect the right infrastructure for your needs.

Migrating to a new server is a big decision, and a process best undertaken with a trusted partner by your side.

Struggling With Downtime From Your Current Host? Get Your Complete Migration Checklist.
Datasheet - Migration Checklist

The post A Complete Guide to Server Migration appeared first on Liquid Web.

How to Protect Your Business From Ransomware

ransomware protection

Is your business protected from the next ransomware attack?

There is danger in ransomware attacks, as well as in ransomware variants that keep emerging to target servers, websites, and specific organizations such as local municipalities. Ransomware maintains its position as one of the most profitable business models in cybercrime.

Recent figures show that ransomware has filled hackers’ pockets with $11.5 billion in 2019, compared to $5 billion in 2017.

In the first half of 2019 alone, Sodinokibi (REvil) ransomware strains claimed 23 municipal governments in Texas, while two small cities in Florida were scared by Ryuk ransomware into paying over $1 million to regain access to their systems, after being locked out for two weeks. It could cost an extra $1 million to restore the system and ensure everything is up and running, even if the attackers follow through on their end of the bargain when the ransom is paid (which they rarely do).

Hackers rarely unlock systems after the ransom is paid out.”

Ransomware attacks are a pain, and looking at Gartner predictions for 2020 – hackers will keep using this type of attack.

The research company warns that 99 percent of the vulnerabilities to be exploited in 2020 will not be unknown in the industry, showing some IT executives ignore software updates and patches to Internet of Things (IoT) systems that are already known to be vulnerable, either because they are not designed with in-built security or the system may not be patchable. These exploits will account for over 25 percent of enterprise attacks, Gartner predicts.

Companies that fall victim to ransomware experience, in most cases, experience permanent critical and proprietary data loss. As they struggle to contain the attack, they will have to consider the financial implications driven by the disruption of operations, by efforts to rebuild the system and, unavoidably, the effect on the brand’s reputation.

recognizing a ransomware attack

What is Ransomware?

Ransomware is malicious software that seeks out critical files and devices to encrypt them for extortion.

How Does Ransomware Work?

The most common initial infection vector is a phishing or spear-phishing email that uses social engineering techniques to manipulate the user into either clicking on a malicious link or downloading an infected executable file.

Once the payload is activated, it will contact the Command and Control (C2) server. It will then encrypt the system and hold the data hostage. Instead of trying to make off with data that they can sell, they hold that data for ransom within a certain timeframe dictated by ransomware.

Their mentality is that if the data is valuable enough to be protected by layers of security, then surely it is valuable enough that the business would not want to risk its loss. And the business may even pay a hefty bitcoin ransom for its safe return.

Ransomware is virtual kidnapping.”

This is the idea behind ransomware – an insidious form of malware which has seen a huge upturn in use over the past several years. Whether the data is personal files, business or accounting information, or a set of passwords, data can be incredibly valuable to its owner.

And anyone can be a target of ransomware, as evident by an ransomware attack over the holidays to an unpatched PulseSecure VPN with Travelex.

It doesn’t matter if you are a small business, a casual computer user, or a corporation with security in place. If there is a weak link in the chain, an attacker can compromise a system and wreak havoc against your business.

All it takes for ransomware to take effect is that an executable is able to run on a computer.

Ransomware attacks can be fast and deadly, quickly encrypting all files on your computer or even worse, your organization. User’s often restart their PCs or turn them off instantly, and hackers have even added a function to deal with this. Most of the time files won’t be encrypted until the computer or server is restarted, effectively locking the user out of the entire system.

What are Usual Attack Vectors to Watch for Ransomware?

Phishing attacks are generally meant to steal critical information, which includes data such as bank details, payment information, social security numbers, address, or date of birth. Basically this can include any information that could be used to commit financial fraud, perform illegal transactions, or even create fake beneficiaries for mortgages or insurance claims.

Ransomware can be easily attached to email spoofing attacks.

To make sure they get the information or to manipulate the user into activating the payload, hackers resort to sophisticated techniques such as sending emails impersonating credit unions, banks, the IRS, and even educational institutions or legitimate companies.

Software vulnerabilities are another entry point for ransomware, if left unpatched. Other points of entry can include unpatched Remote Desktop services, botnets, ads, infected installers, and web injects.

A recent report by security company RiskSense found that Microsoft products had 27 vulnerabilities that would be targeted by ransomware, out of which eight were Windows-related, while Microsoft Edge, Internet Explorer, and Microsoft Office had three vulnerabilities each. Five vulnerabilities were found in Oracle and Adobe products.

What are the Types of Ransomware?

Ransomware comes in different shapes and sizes, yet there are three main categories: scareware, lock-screen, and file-encrypting ransomware.

Some, such as CryptoLocker and SimpleLocker, can’t self-replicate, so they use a trojan downloader to install the malicious payload. TeslaCrypt was originally believed to be a CryptoLocker variant and was responsible for almost 50 percent of ransomware attacks in 2016. It targeted video game archives and distribution services, and was regularly improved, which made it impossible to restore files.

Some of the top ransomware attacks in the past five years manipulated Microsoft vulnerabilities to infiltrate and encrypt networks. 2017’s global WannaCry ransomware attack was worse than CryptoLocker, the first detected file-encrypting ransomware.

WannaCry deployed hacking tools stolen from the NSA. Hackers used the EternalBlue exploit that went after vulnerabilities in Microsoft’s Server Message Block (SMB) protocol – a network file-sharing protocol.

Many organizations left the port open for the worm, because they never installed Microsoft’s patch. The EternalBlue exploit was later used by NotPetya, also known as GoldenEye ransomware, allegedly authored by hackers backed up by the Russian government.

antivirus is a layer of protect against ransomware attack

Can Antivirus Software Protect From Ransomware Attack?

Free antivirus software is not enough to fight ransomware. Ransomware infections can even hide behind a fake free antivirus or other free online tools.

It is wisest to invest in prevention and response to mitigate risks. A robust security software with an anti-ransomware component is critical for any organization to ensure network protection.

An antivirus solution with signature-based detection will keep a close eye on all activity, including looking for malicious software and suspicious behavior in real-time. Some hackers have figured out ways to bypass traditional signature-based malware detection, which means they have a small chance of success.

A good antivirus solution will deliver malware, spyware and ransomware protection with a behavior monitoring component, besides the signature-based detection, specifically designed for ransomware monitoring.

A priority for any antivirus software is to use the anti-ransomware component to immediately detect it, but if the payload makes it into the system, then the antivirus might not succeed in removing the ransomware.

Security companies are working on improving their solutions to block sophisticated ransomware. There are a number of antivirus solutions that can remove ransomware, but the encrypted files are usually lost and the system can only be restored if the OS is reinstalled. In this case, multiple backups in both online and offline repositories are critical to easily restore the system in case of infection.

There is only so much that antivirus software can do if users are not trained about security threats and safe browsing. Sometimes employees are the weakest link and thus the most preferred target in ransomware attacks.

While antivirus software delivers basic protection against less sophisticated, first-generation ransomware variants, it is up to each user to keep all software and operating systems updated, not click on suspicious links or download suspicious attachments, establish a recovery plan, and regularly back up files offline.

5 Steps to Protect Your Organization From Ransomware

Keeping your business and technology secure starts with a few basic things– having virus and spam protection on all corporate devices, for example. But just because some of the measures we take seem like common sense, there is no single foolproof method to protect your company.

However, incorporating these steps into your business-wide security practices will certainly help you avoid disastrous and unexpected situations.

Here are a few steps you can take to reduce the risk of your data being held for ransom.

1. Keep All Systems Up-To-Date

Security patches and updates are vital for security in our tech-driven world.

Unless you know that an update will absolutely brick your system, you should always be applying the latest patches and updates for software and operating systems. Outdated or unpatched systems represent a huge security risk for your business, even though it can easily be avoided.

Most attackers go for “low-hanging fruit”. Systems that are connected to the internet and don’t have the latest updates and patches are the first targets.

Hackers most likely didn’t target you or your business directly to find a vulnerable computer; your PC may have been one of many random targets a hacker is randomly attacking.

2. Educate Your Employees

Something as harmless as opening a suspicious email attachment can wind up infecting your entire network with ransomware.

It’s imperative that you instruct your employees on how to recognize phishing attempts and what could be a malicious email or application. The more they understand the threats facing your business, the less likely they will be to put you at risk unintentionally.

Educating employees on proper security practices and guidelines for your organization can help stop a dire situation from happening, and get any suspicious activity in the hands of your security team. Even the best antivirus programs will not detect every threat, so a well-versed employee is one of the most effective measures to prevent the threat of ransomware.

3. Secure Your Server and Email

Even educated employees can make mistakes, and the more you can do to prevent those mistakes, the better.

By incorporating anti-spam and anti-virus solutions into your email server and networked computers, you have a tool that can automatically detect and block bad attachments and executables from being downloaded or running.”

While this will not guarantee that you will avoid infections from ransomware, it can go a long way in protecting even the most vulnerable systems.

Reducing the amount of incoming spam will help your organization lower the amount of times that risky attachments ever get to your user’s mailbox. This lessens the chances that an employee can even make a questionable decision.

Having anti-virus installed works much the same way. Up-to-date antivirus software can detect malicious executables before they are ran on a system, stopping a bad attachment that was downloaded, for example.

Antivirus and spam protection is never foolproof, but can be a last line of defense if an attack was imminent.

At Liquid Web, using our proprietary ServerSecure software and additional antivirus solutions can help protect and remediate systems from the dangers of ransomware.

4. Avoid Unsecured and Public Connections

An unsecured wireless network can be an open door into your organization’s network.

According to research from Kaspersky Labs, 24.7% of WiFi hotspots do not use encryption at all, and another 2% use WEP – which is functionally the same.”

If your employees access business resources through these unencrypted networks, it would be easy for an attacker to install malicious files to your servers.

Giving employees a secure means of remote access is important, whether you need to use SSH, VPN, FTP, or RDP. That way, even if a user accesses business-resources from an unsecured connection, there is a secure and encrypted layer between the insecure network and potentially malicious attackers.

VPNs are a common way companies navigate these risks.

A secured VPN connection puts another secure server in between user’s and your network’s resources. Your IT team should be able to handle this setup.

Learn more about how Acronis Cyber Backup, Liquid Web’s Dedicated off-server backup solution, works in this exclusive webinar.

5. Backup Your Data – And Protect Your Backups Off-Site

Backup servers are the bane of ransomware developers. With a backup from Liquid Web’s Dedicated off-server service, Acronis Cyber Backup, ransomware is no longer effective.

If you have reliable and automated off-site backups of your data, even if a hacker encrypts everything on your server, you have daily or hourly copies stored on another network via encrypted channels.

If an attack takes place and compromises your network or a handful of computers, you can immediately take everything offline, secure your network by updating passwords and firmware, and restore your last unaffected backups.

By downloading and scanning your backups for problems, or by identifying how an attack occurred, you can safely and securely bring your old files back and not lose more than an hour or a day’s worth of data.

eBook - SMB Security Checklist

The post How to Protect Your Business From Ransomware appeared first on Liquid Web.