Top Ten Tech Mistakes Small Businesses Make: Part 2

Published on: June 04th, 2015

The Top 10 Tech Mistakes Small Businesses Make – Part 2

Continuing our two-part series on how small businesses can avoid common tech mistakes, Part 1 discussed weak security; old, cheap and inconsistent hardware; inadequate power protection; illegal software; and inadequate training.  Part 2 will dig into mistakes 6-10, let’s continue…

Mistake #6: Insufficient Data Backup
Every small business wrestles with the issue of data backups. Most every organization recognizes the need—sometimes mandated by law—to archive and secure important business data. However, confusion quickly arises in the details. How should organizations back up their data? What data should be backed up? How often should archive sets be created? How should backups be moved off site?
Also, what is the real impact of data loss?  Glad you asked.

  • There is a 50% chance an organization will go out of business immediately when critical data is lost.
  • Odds of business failure increase to 90% within two years when businesses lose critical data.
  • On average, data loss costs 19 days of productivity, according to the ICSA.

Mistake #7:  Virus Vulnerability
In the most basic sense, computer viruses are malicious programs that infect a system almost always without the user’s permission or knowledge. Once installed, virus programs work to replicate themselves, transfer information from an infected PC to a hacker’s system, distribute very large volumes of unsolicited email, compromise the PC’s performance, delete data and even render a system unusable.
PCs unprotected by firewalls and proper security software can quickly fall prey to infection. Industry statistics demonstrate that PCs connected to the Internet possess a very high likelihood of being affected, and quickly.  We recommend small businesses install and properly configure antivirus software on every PC and server, especially since the costs of recovering systems and data far exceeds the expense of protecting them.

Mistake #8:  Weak Tech Support
Typical small business technology comes from one of the following sources:  An existing staff member, telephone support from manufacturers, casual computer techs who provide “on-the-side” service, or big box electronic stores.  All of these sources ultimately take away time from the business to “deal” with IT.  Small businesses can avoid and overcome these issues by developing a service relationship with a qualified IT partner who can handle all of your issues to keep you up and running.  We understand there is no time for down time.

Mistake #9:  Spyware Threats
Spyware programs pose as big a risk to small businesses. Whereas viruses work to replicate themselves, distribute unwanted email, attack other systems or even render PCs inoperable, spyware typically intercepts user information and relays it to third parties, and often redirects user commands. For example, spyware can monitor a user’s personal or confidential information and send it to a hacker, or prompt so many pop-up advertisements that a system essentially becomes unusable.  Making matters worse is that, like viruses, spyware usually installs itself without the user’s knowledge.  Small businesses should be just as vigilant about protecting their systems from spyware as they are about virus protection.

Mistake #10:  SPAM
SPAM can mean several things these days, but most often it refers to unsolicited commercial mass emails received from unknown and/or untrusted senders. Email is an indispensable business tool, which makes it even more problematic that SPAM accounts for almost half of all email you and your staff will receive. Radicatti Research Group Inc. estimates that SPAM costs businesses over $20.5 billion annually in technical expense and decreased productivity. Fortunately, despite its prevalence, SPAM is one of the easier issues for small businesses to protect against.

We hope that this two-part series has given you some solid information on typical tech mistakes made by small businesses. Protection tactics begin with you taking action, and are deepened with the involvement of a professional Computer Troubleshooter specialist.  To start the process of transitioning the IT aspects of your business from a potential liability to a professional asset, contact us today!  203.702.2103 www.cts-danbury.com/contact.

SHARE IT

share in twittershare in twittershare in twitter

You might also like

With an evolving business comes expanding technological needs. If your business is sending you any of these signs that it’s time to update your technology.