The Meridian Blog: Tech News, Tips & More for SMB and Enterprise Environments

Business Continuity Planning: Don't settle for satisficing

Jasmine Lancaster

Posted by Jasmine Lancaster
Tue, Jan 12, 2016

When choosing or creating a business continuity plan suitable for your organization, “satisficing” is not a viable option.

Simply put, satisficing is accepting an available option as satisfactory. The trouble with that is, when your business continuity plan only reaches satisfactory levels, you are choosing to sacrifice your company’s ability to deliver products or services in the event of a disaster or disruptive incident. So, when thinking of your company’s long-term success and all of the hard work that was put into it, settling for satisficing could be disasterous.

Read on for ways you can protect your data and choose the best partner to assist in creating an ideal business continuity plan for your organization.

Read More

Best Practices for Secure, Responsible Disposal of Computers & Devices

Jasmine Lancaster

Posted by Jasmine Lancaster
Wed, Dec 23, 2015

Many people will purchase or receive new computers and devices this holiday season. In fact, according to ForbesIDC predicts the worldwide smart connected device market will accelerate past 2 billion units by the end of 2015. If you're among the lucky owners of new computers and devices this year, you or your company may be planning to get rid of the old computers or devices, which have been replaced by newer versions. If so, I urge you to do so with caution!

Along with a collection of potentially harmful toxins, computers and other connected devices house vital information including passwords, registration numbers, account information, addresses, telephone numbers, and a host of other private information. Your hard drive is a goldmine for identity thieves and it is important to use proven methods to wipe this data from existence, before disposing of devices. Simply throwing the devices or their hard drives away could potentially cause more harm than good.

Below, we reveal the proper techniques to dispose of computers and devices, guard against identity theft, and protect the environment:

  1. Backup significant files and information
  2. Sanitize your hard drive
  3. Dispose of your computer

Read on to learn more about each step.

Read More

Why Your Association Must Build a Technology Roadmap

Jordan Arnold

Posted by Jordan Arnold
Tue, Oct 13, 2015

It’s critical that associations, non-profit organizations and businesses, alike, proactively document and maintain a comprehensive, technology strategy, or as we like to call it, a technology roadmap.

With new desktop, mobilevirtual and BYOD integrations, technology has the potential to be one of the most important allies an organization could have. But, if you don't have a clear plan or strategy for the future, technology could actually become a barrier to your organization's growth.

Your technology roadmap must incorporate your:

  1. People
  2. Devices
  3. Applications
  4. Data

Read on to learn more about why it's so critical for your association to have a technology roadmap, how often you should update it, and why it must include each of the four components listed above.

Read More

5 Data Backup Method Options for SMB Business Continuity Plans

Erjon Xhepa

Posted by Erjon Xhepa
Thu, Aug 27, 2015

Data backup is essential for any business, and the small-to-midsized business (SMB) is especially vulnerable to the effects of a data loss, either as the result of a natural disaster or a data breach. After deciding on the type of backup to use (full, differential, and/or incremental), as I discussed in a previous blog, the next step is to choose a storage medium (or mediums).

Choosing the right data backup method for your small business is a serious matter. Often the best route is to consult with a managed services provider (MSP), preferably one who is brand agnostic and who aims to understand your business.

There is no one-size-fits-all solution, and each data storage option has its pros and cons. Read on to learn about each of these five data backup methods:

  1. Magnetic tape
  2. Hard disk drive
  3. Optical media
  4. Solid state storage
  5. Cloud-based storage
Read More

3 Types of Data Backups: Full vs. Differential vs. Incremental Backups

Erjon Xhepa

Posted by Erjon Xhepa
Wed, Aug 26, 2015

August and September signal the end of summer, the beginning of a new school year, and the start of hurricane season. As we approach the third anniversary of Hurricane Sandy — which raced up the East Coast in October, 2012, destroying homes, businesses and even some data — we're reminded just how important data is to today’s business, especially the small-to-midsized business (SMB).

According to the Small Business Administration (SBA), 25 percent of small businesses never recover from a data loss. Every organization should have a disaster recovery and business continuity plan — and a key component of that plan should include a data backup system.

Data backup is a big topic, and businesses first must to determine what type of backup is the right choice for their business (full back up, differential back up, incremental back up, or a combination). Then, they must decide on how to implement it (tape storage, hard disk, optical storage, solid state storage, cloud providers, etc.).

RELATED: No More Excuses: Erase Tape Backups From Your Business Continuity Plan

In a different blog post, I'll detail the specific hardware and software backup methods available to SMBs in order to implement a data backup plan. In this article, I'll stick to outlining the 3 basic types of data back ups:

  1. Full backup
  2. Differential backup
  3. Incremental backup
Read More

5 Key Principles for Data Security

Robert Bruce

Posted by Robert Bruce
Tue, Jul 21, 2015

The amount of digital information out there is mind boggling. 

A study by a group of scientists at the University of Southern California estimated that there have been about 295 exabytes, or 295 billion gigabytes of stored data worldwide since 1986.

I could type the full number out, but my zero key might jam. I don’t know about you, but my mind is boggled.

And keeping all that data secure is no easy task.

Whether you administer your own enterprise IT security or partner with a managed services provider, some basic principles of data security apply:

  1. Inventory your data
  2. Keep what you need
  3. Discard unneeded data
  4. Secure it
  5. Plan for the unexpected

Read on to learn more about each of these five principles. 

Read More
1

Leave A Comment

About this blog

News, best practices and more to help you get the most out of your office technology. Whether you're an SMB owner who wears a lot of hats, or an enterprise IT director, facilities manager or just someone who wants to work smarter — this blog has the resources you need to maximize the business impact of all your tech investments. Be sure to subscribe to receive email updates about new posts!

Download our eBook

 
DM_Workbook_Cover_Page.jpg

Download