Category: business

Ready, Fire …Aim

Ready, Fire …Aim

After the recent storms, one might have guessed that my phone has been busy.  Firstly let me say that Disaster Recovery by its very title is a bit of a misnomer.  While I have some abilities to recover lost data using some forensic skills developed over decades of twiddling bits, that is not really disaster recovery.

Disaster Recovery and business continuity are about planning for an event which may or may not happen.  The “plan” assumes that your business systems will be affected negatively and puts forth a tested strategy to recover from the said event.

With the recent devastation by hurricanes and earthquakes, one would think that those businesses not affected would be learning from those that were.  If you search my blogs on this site, you will see that I have laid out

Do not ask him or her, are we covered just in case, ask them specific questions laid out in this blog here.

Yes is not a satisfactory answer, demand the details and the proof.  I don’t care how much of a friend he or she is, demand the evidence.  The devil is in the details, and the last thing you want is a bunch of excuses.

I am learning from phone calls that too many have been assured that they are covered, and that is very possibly why today they are looking for ways to recover data from destroyed equipment.

Disaster recovery is not some dark magic spell cast under the voodoo magic of bits and bytes in the wiring closet or back part of the computer room.  The bottom line is to test it, whatever your people come up with, check it.  Keep checking it until you can recover your business with outside contractors and hardware with data and documents prepared by your staff.  There is to be no input from you or your staff during the test.  The hurricane, earthquake, fire, attack from zombies or employee error took you and them away from the scene. The plan provided must work!

This is why we who do this insist that companies use “best practice” standards in the industry when creating your individual networks and systems.

One such company has a senior IT staff littered with programmers.  These people think they know more than Microsoft.  Using kludges from Unix, Linux and other programming wizardry to subvert some of the basic tenants of networking, they have made their network so unique that it will depend on them to be there to recover.

If it is not broken, don’t fix it!

Writing programs that workaround things like DNS is just crazy stuff and now it is dependent on the network never changing, at all.

If your data is successfully mirrored offsite, an excellent team of engineers might get you going in weeks, not days if you have failed to follow best practices.  While your data might eventually be usable, you and your company will be on the sidelines as most businesses do not recover from such a catastrophe.

Folks I have been at this since 1982, I have learned a thing or two in those years.  Ask your team the questions or be prepared for unpleasant surprises should you ever face a business stopping event.

Got to go and explain once again what disaster recovery is and is not.

-Best

What If?

What If?

Every day someone finds something.  This day was no exception.  The more creative the attack the more interesting the day.  If you call that number they try to get you to give them $199.00 to unlock your computer.

You can send me some money if you like but, here is the fix for this…

CTL ALT DEL , task manager, kill the process, aka browser and then do not restore the page when you reload the browser.

I am not affiliated with CCleaner but I sell a heck of a lot of it for them.  Install it and let it clean your browser after every use.  $25 a year and damn well worth it!

As one might use an explicative to emphasize a point, I often use a somewhat tawdry analogy for this purpose.  Surfing the web with inadequate anti-virus software is like “hooking up with a stranger” without using protection.   Not only is it idiotic, but dangerous!

Having been in Data Processing, or the IT business since before Steve Jobs or Bill Gates was a household name, I know a thing or two.  The scars on my back are from arrows taken in the trenches of digital mayhem. This bedlam was caused by such things as bosses wanting to be on the bleeding edge, to software not ready for prime time, been there done that.

Free antivirus software is not worth what you pay for it!  

The best security software is going to have a price or cost to it.  Why?  It takes many engineers, coders, and much research to create and maintain a massive program like anti-virus software.  Who is going to do that for free?  More importantly, why?

While someone might write an app for free, to get their name out there; anti-virus software takes a village.

Much like hiring someone to sell your home, you don’t hire someone who does it part-time or as a hobby. If you want to get something done, give it to a busy person.  If you want to sell your home, hire someone who’s lively hood depends upon them being successful.  You want a secure computer, hire or purchase the product with the most to lose if it fails.

There is much more to the process of considering which product to purchase but, free is not a reason.  I would argue that free is a cause to eliminate that choice.

The reality is that the internet has become the wild west.  The bullet that finds you can come from almost anywhere. Every company that uses computers should have a security officer.  His or her job should be to focus their attention on threats out there and the best way to keep them from affecting that company.

I find it surprising that politicians are screaming about Russian hacking of our computers.  What the hell do you expect?  You just assume that someone with a certification gives a damn!?

What worked in 1982 does not work now.  Having a “PC Wizard, or your grandchildren” working for you is tantamount to a trapeze act, blindfolded and working without a net.  Insurance companies and credit card companies are now aware of this and demanding your strategies to be secure in the world of cyber threats.  They should audit you, and they should hire folks like me who know what to look for.

White Hat hacking allows us an inside look at what one might expect.  We learn many ways to infiltrate a company.  The same applies to the TSA in homeland security.  While I would probably choose a job to be that guy that test the security systems of the homeland, airports and such, it is much easier to check companies.

The first thing I must do is understand you.  More importantly, know that entity many of us in the biz call “users.”

Too many infiltrations are accomplished with something called click bait.   “Ten pictures that should never have been made public…” With half a picture of some scantily clad woman visible, how many will click?

Human nature dictates men will want to see what the camera saw. “Boom, you’re infected.”

Good antivirus software will stop any activity created by software manipulation but, the caveat or keyword there is “good.”  What if you bought the bargain basement software or just used the free stuff?

For the coders to write the fix, someone must fall prey to it, report it, and then they must institute a fix.  That is why Software of this type is never static.  Updates are consistent and often.  New threats are released hourly.  To run a company dedicated to this is no small task.

Maybe you own a plant which produces widgets.  Your widgets are better than others, and your competition wants the skinny.  You hired someone like me for your IT manager or CIO so they cannot get in through your firewalls.  Your safe, or so you think.  Industrial espionage is rife in the competitive world of gadgets and widgets.  If I want in bad enough, I will contract one of my guys to write a program that will hide on a computer until certain key phrases are typed, and then it will activate.

“Wait, you said my firewall is secure, Fort Knox secure!”

“Why yes I did, so I am going to place this little program on a thumb drive and…I am going to put some naughty pictures on it with some commercial looking writing on the outside of the device to make the person who picks it up from the parking lot where I dropped it, think that they have something juicy.”

Possibly just tossing a thumb drive out the window of my car near the parking lot with a few files on it, and the Trojan would be enough to get me into your network.  I will purchase some chrome colored or fancy looking thumb drive to be sure that it is spotted.  I will know when the landscape folks work, so I make sure and plant it after they have done their thing so that one of your employees will find it.

Maybe I send one of my spies out to places that your guys eat and leave the drive on the table by the ashtray or the salt and pepper shaker at the table they eat every week on a given day and time.

Possibly I get one of my people inside your company, hired by you.  They install some remotely controlled program like Team Viewer on their PC and Viola; you are hacked.

Because your IT guy is so sure that his firewall is good enough, or your engineers are so demanding that he left the USB ports open for use by them, with lax policies he leaves your company vulnerable too.

How do we stop the threats?

One way we do this is with training.  Every employee should sit through CE training on the essential use of the corporate computers.  This is information that they can bring home and share.  Education is by far the best tool one can have in their arsenal.

All of the policies are trumpeted for them to hear and before they leave they sign a document saying they will adhere to them.  With it harder and harder to fire people these days, that too is one more tool in your belt.  Good employees, you want to keep, those that prove lacking, they need to go.

I could easily make the argument that good computing practices are patriotic.  I could certainly apply this to purchasing respectable anti-virus software and creating policies and procedures that protect your business but, the bottom line is, in the end, it will save the company money.

I was making this argument to a CEO of a good-sized company when he stopped me and said, but viruses help your bottom line too.

I argued that I would much rather use my time and talents to design safe environments for companies like his than put out fires.   It is considerably less expensive to install a good fire retardant system then to try and rebuild.  Yes, a metaphor for using robust best practice standards in computing vs. reacting to noise.

Noise is the result of a problem created by an event that was unplanned or caused by employee error.

A good security person is somewhat paranoid and is always asking, what if?  I do this in disaster recovery scenarios balancing those “what if’s” against statistics and a risks assessment.

With proper education, we can mitigate the employee errors.  Using proper procedures and policies, we can diminish the unplanned events, i.e. viruses or other malicious code.

When I run into companies that think free antivirus software is adequate, it makes me a little crazy.  If they are a public company, trust me, I will not purchase their stock.  Flirting with disaster out of sheer frugality or ignorance is idiotic.

If you keep your guys around because you like them, think again.  I may love some folks, but I would not hire them for certain positions if I could find someone better.  I don’t have to like you, for you to work for me.  If you are the best person for the job, you get the job.  P&L trumps feelings!  Feelings can be costly and can be a liability.  Logic in business is your ally.  Logic must always be forefront when making business decisions.

I have walked away from companies who have their kids working for them.  By hiring the children, you open yourself up to losses that could be untold.  One company had their children not doing the paperwork necessary to complete the task, thus losing money in that department.  Hiring me to do an analysis, it did not take long to find the problem.  I fired her children after trying to work with them.  I kid you not one of them actually cried in my office after telling him time after time he must do all of the job.  A grown man crying!  There is no crying in IT.  Either perform the work or get the hell out!  Either do all of the job or learn to ask, “Do you want fries with that?”   Is that too tough?  I felt for the kid but, feelings do not dictate policy.

Do your kids a favor and don’t hire them.  The real world does not work that way so why in the world handicap them, and make them believe that it does?

Over the years there are best practices that have been created by time trusted procedures and policies.

Some are things like:

  • Hardware Asset management.
  • Software Asset Management
  • Security both physical and digital

I could write a book on the subject, but I will spare you the details.

Today, now more than ever we must harden our networks.  We must have sound policies and procedures in place, and they must be adhered to.  Documentation is essential, and it must be updated.

I don’t relish firing people but, sometimes their people are the problem, and the CEO is so far removed from the process they just don’t know it.  If training can fix it, I am all for it.  Attitude too plays a crucial role in the process, and I will not tolerate a crappy attitude.  Life is too short, and the subject matter is too important.

I love the HR folks because often they are the gatekeepers, saving the CEO from disaster.  Good HR folks are worth their weight in silver.  Gold, maybe not, so let’s stick with silver. Worthy people are not that hard to find as many would have you believe.  Upright people are around, but they may not have everything that you are looking for immediately.

Instant gratification is an expensive luxury and can be elusive at best.  Where employees are concerned, I want to start with a “good foundation.”

We place certifications above character, and that is part of our modern day conundrum.

I hired a grocery store manager and trained him for a job in IT.  He had little experience in the job I hired him for, so why did I hire him?

He had the right attitude and wanted to learn.

I had the time to train him.

The money used for training him was penny’s compared to hiring exactly what I was looking for.

He did not have the bad habits that come with so many “experts”  with the certifications, and their egos.

He ran a grocery store and let me tell you; he was not afraid of work!

Back in the day, we had interns or apprentices.  Folks, we need to look carefully at that once again.  I have hired many over the years that had the right attitude and the skill set to learn.  American people are out there struggling, and we won’t give them a chance.  Why?  Instant gratification.  We need someone who can step into the job right now, and we run with minimum employees because of what?  Because it is so expensive to have employees.

That is one of the things we need to push back on Congress and health care to fix, but the reality is, internships and apprentices I think are essential to finding and creating good employees.

Every job fair that I go to has thousands of workers looking for work.  If you can’t find them, you are not looking!  I spot good employees daily.  There are times I would love to go work for a recruiter just because I can spot talent!

Are they the exact racehorse ready for the Derby today?  Maybe not, but can they be trained?  There are virtual diamonds in the rough everywhere, looking for a chance! We are begging to bring in more H1B folks instead of taking care of our own.  That is not very damned patriotic if you ask me!

Our schools are a disaster in my opinion.  In speaking with college graduates today, I am frequently amazed at just how ignorant and totally out of touch with reality that they are.  Someone somewhere screwed them to the tune of tens of thousands of dollars for an education that is worthless.  When they think voting for a socialist is a good idea, they were screwed by their college and should demand their money back!

Today we have kids tens of thousands of dollars in debt, and they cannot find a job.  I know of several college grades making much less than $15 an hour.  Our educational system needs an overhaul.

As quickly as a company can get a process documented and packaged, they send it overseas via a VPN over the internet, sending jobs out of the country.

Trades are being overlooked for white collar jobs which are going the same way.  IT jobs are vanishing in the states.  Virtual IT shops are set up in some foreign country, hiring an English speaking American to act as a liaison between them and their Indian or other counterparts.  With an American point of contact, it is then up to the American to manage the folks in another country who speak little English, making little money, to be the IT shop for these American companies.  This same person puts an American face on their business while working with their client managing the “noise.”

“Do you see any security risk there?”

You have no clue where your intellectual property is going or who is seeing it.  Maybe you have a contract but so what.  Much like HIPAA was created to protect your health information, do you honestly feel as if your information is secure?  If you do, you are fooling yourself.  Read the documents you sign when you visit the doctor.  You sign things saying that your information is protected and then you sign a document which pretty much gives them a pass to do whatever they want to do with your information.  Smoke and mirrors.

Doctors and hospitals are hacked and the information is stolen all too often.  Why?  How?  Piss poor planning on someone’s part. Using some cheap method to get things done perhaps?

Your contract with your Virtual IT company is as worthless as the paper it was printed on.  Yes, that deal might make you feel better but, know if you are a developer, someone in some other country has your work and if they can use it, they will.

I want to touch on Software Asset Management as it is germane to this subject.  All of the subjects are salient, but that one, in particular, is in the case of security.

There are tools which you can use to inventory every program on every PC.  Why?  Why would you want to do this?

Licensing of software is an issue, but more importantly, you should want to know what is on those PCs.  The first time I did this for a company I was struck with the reality of the sheer number of programs designed for remote control of a PC, that was active.

In this world we live in, corporations can ill afford to have the wild west inside their computer networks.  Besides the games and other foolishness that was identified, the risk to the infrastructure was phenomenal. The company is liable for every program on their PC’s, no matter who put it there.  If they are audited for their licenses, and someone like myself does an audit and finds them, they must then produce that license.  Can you?  Can you put your hands on all of your licenses?

Ignorance is no excuse!

Having been part of the evolution of the business process, dating back to the secretary and the typewriter to current day, I have seen the learning curve first hand.  Fighting the first virus on a network before there was anti-virus software; asking “what if” became second nature.

Back when Gregg shorthand was used, a business letter cost an average of $100.00 back then.  Now we type out e-mails with the ease of few keystrokes and dictation is a thing of history.  Technology has improved the business process, but the bad guys have found a way to make it interesting.

The very tools we use to make our lives easier are under constant threat by evil forces that look for ways to extort money or steal your property either through the exploitation of your network, or your employees themselves.

We use the cloud as if it were a hard drive in some vault in our closet.  We send information to the cloud without a clue where the cloud is and who has access to it.  Why we don’t encrypt that data before it leaves our computers is beyond me.  If I were a villain, I would be looking for ways to infiltrate the “cloud.”

“What if?”

The opinions expressed are my own as well as the intellectual value of the information put forth for your consumption.

© All Rights Reserved 2017

 

How often Should I Change the Ribbon

How often Should I Change the Ribbon

 

 

By far this is the most often asked question when I am speaking with a customer.

First things first, however.  There are three different types of ribbon for your consideration.

rapidprint ribbon a

By “type of ribbon,” I mean what fabric was used.

  • Nylon
  • Cotton
  • Silk

Nylon, most probably the least expensive of the three has plusses and minuses.

Nylon takes more abuse but, does not hold as much ink as some others.

Cotton, also not the most expensive holds much more ink for a longer period. However, Cotton pulverizes much easier than Nylon.

Silk, the most expensive of the three holds together longer and is in the middle of the road as far as its ability to retain ink.

“Great, there are three types, which one do I need?”

There are a few different factors to consider.

Your average humidity.  The moisture in ink will evaporate much faster in Arizona, than Florida, for example.

“Why do I care about how fast the moisture evaporates?”

The medium for the ink is the moisture.  When the ribbon is dry, the quality of the print is diminished.  Also, it is my contention that the moisture from the ink assist in lubricating the type section allowing it to wear much slower than pure metal on metal.

Pulverization

As the solenoid under the type section rises to strike the type section, it places the imprint on the document of the date, time and whatever other information you may have on your individual plates.

Each time it does this, it breaks the bonds in the fabric a little, which is the ribbons substrate or media which holds the actual ink.

During the ribbons life cycle, the spooling mechanism rolls the fabric back and forth as it nears the end.  Several passes of the ribbon are possibly before the ribbon should be replaced.

I tell customers to make an imprint right after they change the ribbon.  Take that example hang it by your machine somewhere.

Much like the brakes on your car, you have no idea that from the get go they are performing less efficiently until one day you hear the ubiquitous squeal from a metal warning indicator telling you to service your brakes.  Each day they wear just a little bit more and stop just a little less efficiently.

Your ribbon from day one slowly loses ink, and before you know it, you are not able to clearly see the imprint.

“Why is this a problem, I want to get the most out of the ribbon I can!”

“No, no you don’t.  Most of you are scanning or imaging your documents.  That means that the original text must be legible.  Since most scanners do not get 100% of the original “value” or the image darkness, the original needs to be as dark and definite as possible.”  Secondly using a ribbon too long will cause pulverization of the substrate.  If you have ever looked inside your Rapidprint or Widmer file date stamper and seen “gunk” in the wheels or plates. That is from ribbon fragments and paper dust bound together with ink as the glue.”

Do not try this at home!

Many of you have attempted to clean this yourself.  Once you try this, quickly you will see the error in your way.  Using an old toothbrush and alcohol should be an easy task!  There is a reason that I do very little service in the field.  One customer did this and told me of the experience.  I did not mean to laugh but, the walls appeared as though an inkwell blew up.  Her clothes, desk and anything within proximity was spotted with ink.

Never mind the mess that this process makes here is the real bugaboo.  When cleaning the machine, you take the oils and other chemicals away which lubricate the wheels and mechanism.

I disassemble each machine after cleaning it replacing the worn parts, and then I replace the lubricants.

For these to function properly the tolerances are critical.  Some have tried to replace parts by themselves to find they got into more than they bargained for.

If the machine full of gunk is left untreated, the mechanism will wear faster, and the imprint will not be clear but smeared as the letters like “O” will be filled in and appear as a large dot instead of an “o.”  The same applies to the numbers 0 or 6 or 8 or 9 and any other letter than has a closed circle of some sort.

Since these machines can cost up to $1000 each, it is a super good idea to have them serviced occasionally.

Changing the ribbon when the print starts to get too light is also a good idea.

At TimeDok we sell and service these machine and have done so since 1995.

If you purchase a dozen or more ribbons from me at one time, I pick up the shipping.

In summary, Silk is the most robust ribbon for those of you who don’t like to change them as often as you should.

Cotton will render the best print image but will pulverize and needs to be changed when the print gets too light.

Nylon is less expensive than Silk and does hold up better than cotton but will not last as long as cotton or silk.

One of the other things I see too often is this.  “The spooler is not working!”

Go here and check this out before you send me your machine

http://www.timedok.com/Support.html

The other guys won’t tell you that…

While I actually want your business, I don’t want it under false pretense. Many times the ribbon was installed improperly, and it will not spool if it is.

Follow me on Linked In or check out my website at www.timedok.com.

“Is it feasible to use Timedok for my service as I am not in Texas?”

If you can get UPS to come to your location then yes.  I currently have customers in all 50 states and in some of its territories.

Call or write for details.  Many times a machine will just show up with no advanced warning from a new customer.  That is ok too but, a heads up would be nice so I can get to know you a little and vice versa.

http://www.timedok.com/contact.html

 

 

 

When is the right time to think about Disaster Recovery?

When is the right time to think about Disaster Recovery?

 

Spring rains bring on more than just flowers or in my case, weeds.  The phone started ringing early the other morning.  My coffee was still brewing when the continuous ring of the phone demanded me instead of the regular answering service.

It would seem that lightning hit a pole close to one of my clients.

Lightning is far from respectful of your deadlines or the amount of work that your staff has lined up to accomplish.  From simple power outages to fire, lightning all by itself is a disaster in the making.  Some simple steps ahead of time can keep your company from being a victim to what this client was.

One girl had her headset in when the lightning struck and was shocked. Happily, she is ok, but their systems were not so fortunate.  Had the grounding been worse; she may have been the path to ground.

Once the power was restored the server, router, and switch, did not recover.

The one machine on a UPS died as the power went out.

What went wrong?

Surge protectors have a finite lifetime.  People buy these power strips with surge protectors and forget about them.  Surge protectors are nothing more than a power strip with something in them known as a “Metal Oxide Varistor or MOV.”

Any power surge above an acceptable voltage is clamped or shorted to ground by this device.  The problem is the MOV only last so long before it no longer functions.  Every time there is any spike in the line from compressors shutting off to other electronic “noise” these components are adversely affected.

What is better?”

A UPS of enough wattage to allow the computer to be safely powered down in the event of a power failure.  Along with the backup power ability, these devices have more sophisticated line conditioning circuitry protecting your equipment from stray voltage spikes.

One note to remember, these too only last so long before they must at least be maintained, or replaced.  Any CIO worth his salt is familiar with Hardware asset management and has this is mind for his budget.  CEO’s hate surprises like unexpected expenses.  It is much easier to argue a budgeted expense than going hat in hand begging forgiveness for your ineptitude.

Suffer a catastrophe like this client, hope your boss does not hire someone like me to do a root cause analysis.

At the very least batteries must be changed out but keep in mind that an MOV is also part of that piece of hardware.  I would budget the replacement of a UPS, rather than just the batteries if it were me.

Unless you have electrical engineers on staff, who are qualified to re-certify that equipment, it is too cheap not just to replace it.

 

Along with outdated hardware or not enough of it, I have seen too many times the ground plug defeated to save a dollar from an electrician.   Those ground plugs are there for your protection, not because someone wanted to make it difficult for you.  The problem with temporary is all too often it becomes permanent.

Lightning struck outside one of my client’s offices hitting a pine tree.  Finding the electrical ground for the building, which was poorly grounded, everything in the building suffered a power surge knocking out much of their equipment.

Many times, building management will only do what is necessary by code and leave the gamble up to you the tenant.

Depending upon your location, achieving a good ground could be difficult.  The type of soil must is taken into account among other things. Again, depending upon your location, you might want to invest in grounding your building with lightning protection equipment including lightning rods or now they call them “air terminals.”  The idea is to have some amount of confidence that if lightning hits, it will strike your planned target and be dissipated safely into the earth.

Since all computer equipment and now phones are wired through the network, this last customer lost computers and phones along with the network infrastructure.

Failure to plan is planning to fail.

The cost of the hardware and time to repair was minimal, compared to the amount of time the company was out of business.

Insurance will only get you so far.  As these spring storms fire up, there is a real element of danger to your building, business and, like the one young lady found out, to her person.  Had proper grounding been utilized I doubt the girl would have felt the shock in her ears.

While a tested, reliable disaster recovery plan will allow you to sleep at night, preventing the disaster in the first place is what you should shoot for.  That starts with planning.

From your building security to network security, right down to protecting your infrastructure from mother nature, accounting for every contingency is paramount.

Truth told, there are seldom good surprises in business.  Mitigating the surprises with proper planning can prevent poor performance.  Asking “what if” is key to any plan.  Weighing cost vs. probability allows anyone with some business acumen to make sound decisions without breaking the bank. Understanding the risks, are the starting point.

 

-Best

 

#RapidPrint #Widmer #Year #Wheels and #Budgets

#RapidPrint #Widmer #Year #Wheels and #Budgets

 

 

new-years-eve-hero-AB

 

 

As we get to this time of year, I think about many things including starting that Christmas shopping experience.  Thinking ahead is key, so we are not surprised.

 

803803ss
Year Wheel for Rapdprint and Widmer products

 

Usually the second week of January I get many machines sent to me with year wheels that stopped in that year.

This is a good time to get your machine cleaned up, tuned up and checked out.  Usually, a repair is less than a fourth the cost of a new one.

 

 

print head before cleaning with flash
Before cleaning

 

 

 

 

 

 

after cleaning II
After Cleaning

 

 

If by some chance that your machine is worn out, now would be a good time to replace it as budgets need to be submitted and this year’s money needs to be spent.

 

Things are slow right now, beat the rush and get in front of the pack.  First in first out!

 

I sell and service these machine and have done so since 1995.

 

Rapidprint, Widmer and of course the ribbons.

As always I appreciate your business!

WWW.TimeDok.com

 

-Best

 

 

 

 

 

#Ransomware

#Ransomware

 

Just this morning I wrote about this topic; this afternoon we learn that a California hospital was hacked.

Ransomware.jpg
You see this and you are screwed… 

Firstly, someone executed that ransom-ware in an e-mail or some other way. The payload most probably came in as an attachment through a phishing scheme, like the one that I wrote about.

  • Secondly, this tells me that they do not have a good disaster recovery plan.
  • Thirdly, this tells me that their firewalls were inadequate to block “zip” files.
  • Firewalls should be set to strip any attachments from messages. 

“You say, oh that is just great, my business uses attachments all the time!”

Most probably, attachments could be directed to a virtual machine, much like a bomb disposal box, where it could be executed in such a way that if it were a virus or worse its damage would be mitigated.

Fourth, what kind of anti-virus were they using? Were they using group policies stopping the execution of executable s?

Someone on his or her IT team messed up, and it starts with the “CIO!”

The bottom line is you never want to be a position where you have to pay money to terrorist.  Folks, make no mistake, people who extort money like that are terrorist.

I would be doing a serious root cause analyses to see how it happened, and why they paid the ransom.

The news tonight said it happened on the 5th.  Are you telling me that a hospital being down for 13 days cost less than a good disaster recovery plan and of course an audit of your system?

Do not open attachments that you are not expecting and if you are, make damned certain it is what you are looking for.

It might be a real good idea to keep a standalone pc that employees take their files to on a thumb drive and open it there.

Once infected you options are, pay the ransom or start from scratch.

cryptolocker-screenshot2.jpg

With a tested DR plan, you could be back up a lot sooner than being at the hands of the terrorist.

Lastly and I cannot stress this enough, don’t get cheap on your anti-virus software.  MailWareBytes has been working on software to mitigate this threat.

You would be surprised at the companies that I run into who use the cheapest damned software that they can find.  Often Free!  Whoever does this should be dismissed as they clearly dont value your data or your company.  This is a hill to die on folks.

You can take the cheapest CFO and argue or “negotiate” the need for the expense, or you should not be there.

Excuse me but that is like living in a high crime area using using a bathroom lock set for your protected, you know the kind, the one you stick a small pin in to unlock it…

To recap…

  • Education
  • prevention
  • disaster recovery plan

 

-Best

© All rights reserved. 2016

 

 

 

 

 

Dear #CEO #Recruiter #LinkedIn

Dear #CEO #Recruiter #LinkedIn

 

I find myself between contracts on occasion. If there were something, that is a good match for my skills and talents, I would love the opportunity to speak with them or you about it.

As a seasoned professional, I bring many things to the table.

cprompt.jpeg
If I had a nickel for every time someone would ask me, “I got this C:\> on my screen, what do I do now?”  Family is the worst, you cant charge them!

I started working with computers when DOS was in its infancy; nobody knew who Bill Gates was and  Wang, IBM and Xerox were the major players with Atari, Tandy and the Commodore PET was in vogue for the affluent home user.

DysanRemovableDiskPack.agr.jpg
Early hard drive which had to be in a really cool room.  The media was removable, the heads would stay inside the machine. 

Steve Jobs had just stopped being a criminal with his phone freaking hardware, but still was a nobody, while building the first apple in his garage.

GU.SteveJobs.9.3.15.jpg
Alex Gibney’s newest documentary, “Steve Jobs: The Man in the Machine,” chronicles the famed Apple founder. Courtesy photo
blue-box.jpg
Blue Box

bbs2.png

BBS’s or Bulletin Boards hanging off a POTS line at 300baud were the standard.  1200 baud was certainly not common as some were still using acoustical modems.

Al Gore had not invented the internet yet…

algoreclaysinternetmeme.jpeg
Truthfully I think he had something to do with legislation allowing the public access to it. Somehow it got conflated with him as the inventor.

Main Frames were what most companies used complete with water-cooling.

nhp71A.jpg

Networks went from different coaxial types for the physical layer.  Arc net was the least expensive, Ethernet was still in the works, and Token ring, IBM’s idea was the standard; but few could afford it.

History_Arcnet_2.jpg

Starting on the ground floor of this industry, leaving a rather successful career in electronics was a valuable experience for me.

Witnessing the demise of the typewriter, dictation equipment, Gregg Shorthand and the secretarial pool replaced with high-powered laptops and smartphones has been quite the thing to see.

8677984_2.jpg
Yes, I actually worked on these…Mylar belts were the media.

The cost of one business letter in the 70’s was well over $100 in 1970’s dollars.  Today a quick e-mail re-defined the way we communicate. In today’s 2016 dollar, that is $627.38…

secretarialpool4.jpg
Before my time but not by much!

If you do not believe me about the price of a business letter, ask me about it.  I was there.

gregg002.gif
Gregg shorthand

 

The first virus I fought was before there was anti-virus software.  The cleverest virus I fought was the “pong” virus.  Modeled after the Pong game, one would be working in some program and a ball resembling the ball in pong would appear.  As it struck a character, the character would fall to the bottom of the screen.  This of course was destroying your document but at least you had some entertainment while it did it.

Virus-ping-pong.jpg
Pong or “ping pong virus”

Moving from the XT Based 8086 systems in the late 70’s up to the recent, has been a nice ride and I have enjoyed being part of that evolution.  As hardware hits the brick walls of physics and bigger better faster slows down, software must carry the advancements forward until such a time that chip manufacturers figure out how to get more speed and throughput maximizing everything from RAM to video and disc performance.  Embracing advancements while constantly positioning the company strategically ahead of the curve, but not on the bleeding edge is my long-standing history.

download (13).jpg
These were great!

Once included in your world, seamlessly; I will become part of that world knowing your business and how technology fits.

A-Swiss-Watch-movement.jpg
Every part works in concert to fulfill its intended purpose. Employees must necessarily “fit.” 

While focusing more on business applications vs wiz bang hardware, I specialize in providing an ROI to the people who have to pay for it.  Is this technology necessary? How will it help?  Will it prepare me to transition in the future?

ROI.jpg

Spending much of my life with technology, I have run a business now for the last 10 years providing ad-hoc IT services, while performing disaster recovery services.

My specialties include, but are not are limited to:

  • Over 30 years hands-on IT projects.
  • Over 15 years in Management.
  • Data Center design and installation
  • Power
  • Placement
  • Controls
  • HVAC
  • Fire retardant
  • ADA compliance
  • Security design and audits
  • Physical security design
  • Disaster Recovery
  • Best Practice
  • Business Acumen
  • Compliance issues with SOX or other regulations, as the need requires.
  • Visionary and forward “out of the box” thinker.
  • Troubleshooter

From the desktop to the cloud, I have it covered.

Some of the typical calls I receive while on site. 

  • The internet is slow.
  • The server crashes.
  • We think we might have a virus.
  • This computer cant “see” the printer.
  • I don’t know what we have?
  • I thought we paid for that software?
  • Somehow this computer got hacked.
  • Cant get on the Internet..

If these sound familiar the underlying causes may surprise you.

Through best practice, a complete inventory of your hardware and software it usually does not take long to figure out why?

Lack of documentation is generally the common denominator.

From a startup that just needs things set up right the first time, to a company that let some family member set it up, and now needs help, I am your person. No sugar coating…

What-is-a-Network-Operations-Center-NOC1.jpg

This letter is meant for those of you who see my profile on Linked in and wonder if I am available. Drop me a note, I might be!

Unlike others who will blow smoke, I will not.  If you are seeking a trip to the moon with funding for the carnival, I will tell you. If I cannot help you, I will not waste your time.  I know many people in the industry, I might simply refer you.

As someone who has written many job descriptions, hired and let go more than I care to think about, I am a tried and tested realist.   I find options for you, and then you decide.

-Best

 

 

 

 

 

 

 

HIPAA and other things that go bump in the night…

HIPAA and other things that go bump in the night…

hipaa-compliant.png

(HIPAA) Health Insurance Portability and Accountability Act

Being and IT guy for the last 35 years, I am no stranger to HIPAA, SOX, FISMA, and many other regulations from the government, including the federal mandates as to how this is to be accomplished.

While HIPAA is designed to protect your privacy, I wonder if that is how it is actually being used.

From a DR (disaster recovery) standpoint, your data must be backed up and off site. Your data must be recoverable; meaning that you have successfully tested the process on a regular basis.

cloud-technology.jpg

The easiest way to do this is with CLOUD technology but, I am here to tell you that the hackers attack the cloud… If you’re data, and my data, and your competitors, is in some nebulous storage arrays out there in some data center…that is a central target for the bad guy…

You must have written policies and procedures regarding same… This would be part of your DR plan, run book; or even your living document that is your DR plan.

SOX-Sarbanes-Oxley.jpg

SOX or Sarbanes Oxley is another set of rules that apply to all publicly traded companies that share many of the same tenants of a good DR plan.  E-mails must be stored and retrievable in the event the government wants to see them.  Stored off-site and recoverable…

506408.PNG

The government, for the government’s own use, has stricter policies and procedures which I wrote about some time back when the Hillary e-mail fiasco came to light…  That is why this whole e-mail scandal is laughable as there is no possible way that those e-mails should have been lost, just like there is no way that she should have had a server of her own, dealing with Top Secret Classified e-mails.  Why she is already not wearing orange, and living in Club Cupcake Penitentiary, is a testament to the corrupt policies and procedures that our wonderful government seems to enjoy for the rich and famous or in this case the political elites.

Calling and talking with any of the folks at your insurance carrier, you are told that your call may be recorded and monitored for security and training purposes…  Now please tell me how this does not violate HIPAA?

 

When visiting your doctors you had to sign a release, basically nullifying HIPAA so they, the office staff or doctors can talk about your case, health or anything that is needed to whomever that they have to deal with to get paid.  Again, how is this not a violation of HIPAA?  Working behind the scenes at these places I have heard many cases talked about from end stage renal disease, to genital warts complete with names. I was once working in a plastic surgeons office where his desk was littered with open pictures of nude women with before and after breast augmentation etc etc.   This stuff should have been put up before I was ever allowed into his office.

surveillance.jpg

The simple facts are, that we are living in an age of no-privacy; either expressed or implied.  The idea of HIPAA is great but, like the thousands of pages of tax code, it is virtually meaningless after the lawyers get through with it.  It’s like living in Chicago with all sorts of police vehicles, and one cop who lives at the donut shop.  There is the illusion of security, but it simply does not exists.

The airport is another place where you have no privacy but, still the TSA misses about 95% of the threats that their agents try to smuggle through, while testing their efficiency. 

New-Republic-TSA-naked-scanner-cover.jpg

While we parade through scanners that strip us naked, and expose us to ionizing radiation, they still miss 95%…! How the hell is that possible?!

3-Waiting-Room.jpg

While in the waiting room the other day I could hear the office staff talking about patients and their treatment options… That was not bad enough… One of the ladies at the reception desk was calling patients who owed them money between greeting people, taking credit card info… Yep, she read back the guy’s number complete, the billing zip code and expiration where everyone could hear it.  I take credit cards and I thought to myself… you did not get the CVV code… A few minutes later she called him back to get that…. And repeated it to where anyone in the waiting room could have heard.

download (10).jpg

While I have since written a letter to my Doctor…it does not end here…

0043.jpg

This same doctor prescribed some meds that I went to CVS to pick up…  While in line, the cashier, after getting your name and date of birth, grabs the meds off the shelf, and tells you what they are so everyone in line and the immediate area can hear.

Name and DOB are nobody’s business and certainly what you are buying is nobody’s business…

While I may be over sensitive to this, I don’t really think so…

Either we have HIPAA or we don’t.  Either we follow the rules and policies set forth…or we don’t.

The illusions of security is not enough.  The illusion of privacy is not enough.  Collecting everyone’s Meta data without warrant, is wrong on many levels.

We need to look at and re-vamp all of these policies as we have given up so much of our privacy for the sake of laziness on the part of the employees.

Instead of me telling the lady behind the counter she should ask me to see my ID verifying who I am and my DOB without saying it aloud.  After she pulls my meds she can show me what they are without voicing them… Simple policy changes prevent unauthorized or in this case nosey people in line getting into your business.

There are simple answers for all of these things but one simply has to think… We are too damned lazy to think…

-Best

© Copyright 2015 All Rights Reserved

 

Periscope or Pervascope?

Periscope or Pervascope?

Full disclosure…I have been working with computers before the internet.  And I can tell you Al Gore had nothing to do with it.

One thing that we as a race of beings seem to do is seek the lowest level.  Some would argue it is our nature, and others would argue it is because we are fallen as a people.

Porn was one of the first things to make its way through cyberspace even before the Internet; when there were only BBS’s … I think that the first or second time that I saw it, it was a novelty…Now things of value are the novelty.

One of my author friends discovered something called Periscope… She announced that she was going to do this “periscope talk” which prompted me to look into it.

“I watched someone broadcasting Ted Cruz live…I watched someone send video from a storm, another from a beach in Indonesia and I even chatted with Danica McKellar who was doing a live broadcast while one of the Hallmark movies she was in; played.  It was nice to see that she was still grounded as a person.

While watching some of these events…artist and such, it further amazed me that the “people” who will try and get ladies to “open boobs.”  What the hell is “open boobs?”  How do you open boobs?

These people have such poor English and are so deviant that they will do their best to get people to show them some part of their anatomy.

Ignored Behavior Goes Away

One would think that after a while that these “people” would just go away….

The problem is that the behavior is not ignored…

There are “ladies” out there that use this “forum” as a marketing tool to take in money from the people who would be willing to pay for a peek that their goods.

They are in fact feeding the stray dogs, encouraging the riff and the raff of the internet.

These “people” know no boundaries either… If your daughter or other child should find this mud hole to play in, they will undoubtedly be taunted and coerced by unsavory individuals from anywhere on the globe that the internet reaches to; “open boobs” or “pussy please.”

Know what lies in the water before you jump in…. Parana’s and other leaches are there waiting for you, your child or your credit card…

 

-Best

© All Rights Reserved Timedok 2015

Why is Trump still polling so high?

Why is Trump still polling so high?

162470_600

Most Americans do not want this Iranian nuke deal to happen and yet the Democrats are supporting Obama, thus pushing this through; against our wishes. 

The majority of Americans thought that Obama Care was not a good deal and yet the Democrats pushed it through anyway, in spite of the folks.

All of the promises of the plan were indeed empty promises.  You might in fact, not be able to keep your doctor. “sorry….”

Washington is a “good ol boy club” and even after a politician is booted out, they become lobbyist and still write the bills that nobody but special interests want!  The same bills that nobody reads.

Running a successful campaign takes money.  To be a successful candidate you must always be in campaign mode, which means you must always be looking for money.

  • Campaign funding laws need to change.  Transparency is key so at least you know what company or special interests, owns your candidate.  Truly I want to know where their loyalties are.  You vote for a guy that talks the talk and as soon as they get in they no longer are responsive to the voters that put them there.

Maybe you own a railroad or you have interest in a company that owns a railroad.  That railroad is currently making tons of money hauling oil from Canada to the gulf.  A pipeline which would put thousands to work, would not bode well for your bottom line so….you give money to whoever will sit on the pipeline bill, stall it or stop it, from happening!

You might even fund some tree hugging activist to bring some sort of frivolous law suit claiming that some fish might become extinct if the pipeline is allowed to continue.  Everyone knows that nothing moves fast in the government so a committee must be formed to look into it.  The committee calls for an investigation which means specialist must be hired (at taxpayer expense) and study the possible impact that a pipeline would make on the fish in question.  This process could take years just to return the study.

If progress is being made another group is hired to pursue a suit claiming that the pipeline might affect the migratory patterns of the rare and troubled species of bird.

Another committee is formed, another specialist hired and more time is bought for the controlling partners in a company that happens to have a railroad.

If it was truly about climate change someone might point out that the railroad has a much higher carbon footprint than oh say, the building a pipeline.  There is also a much greater risk of the fish being effected or those birds becoming confused by a derailment with toxic spills in god knows where.

Donald Trump is using his own money.

The question I and everyone else has to ask is “what is in it for Donald?”

Mr. Trump has said he will work for a $1 a year!

I for one like the idea of someone that is not in the pocket of the others.

Now the people in the house and the senate are still in the pocket of special interest, but Donald, not so much.

Any candidate that takes millions from someone is beholding to someone.  I am guessing that the Unions, big business and those hedge fund guys, which make billions if things happen a certain way are the big contributors to politicians.    You know, the “fat cat bankers” that Obama warned about as he was taking their money.

  • Most politicians promise relief for the middle class.
  • The middle class pay the bills.
  • The middle class is squeezed from the top and bottom, and then marginalized when it comes to benefits because those are handed out as cell phones, free internet and food stamps to those who choose not to work.

If we take in 10,000 Syrians as Obama is saying, those too will be paid for from the taxes of those who work.

The people pay for these things in taxes and in fees that are levied on their bills as some sort of “universal fee,” code for socialism.

Most people look at their phone bill or cable bill and see those “universal fees” and have no idea what they are.  That is what they are, both federal and state.

6a00e54f93504f883400e54fd96c678834-800wi

Emotions are one way to manipulate you, and that is not lost on Hillary as she cries for the camera in a recent interview.

Are you old enough to remember the Sally Struthers commercials for the orphans?  She had her 90 second spot on prime time TV crying for the orphans. The purpose of her tears were to evoke a response from people, an emotional response which would hopefully translate to opening your wallet. 

AllFam2015M_GMixItUp

struthers children

It was later reported that this group was not Christian and that is simply used the word Christian to garner support from “Christians.”  It was also reported that very little money actually went to help children.  

Obama GOP Khamenei Negotiation Iran Nuke Deal Cartoon

This Iranian deal is a mystery to me and to anyone that knows anything about it.

I was astonished to learn that if Israel should attack Iran, part of the contract is that the US has to defend Iran!  Hello, Israel is our friend. 

Depending upon where you get your news, this is either the greatest deal of all time or it is the absolute worst deal.

I have found that the main stream media is terribly biased towards the liberal ideology so I tend to treat anything that they report with more skepticism than say One America News Network.

Please Mr. President, go work on your golf game.  I bet Trump would allow you access to his courses, just stop doing anything else.  Deals like this we don’t need.

Obama-Golf-Photoshop-Rockettes-Chorus-Line

At this point it would be cheaper if the president took his family and simply traveled the globe on a yearlong vacation.  Let Uncle Joe see if he wants to really try out for the job, at least he is entertaining.

Obama-family-vacations-1024x508

Trump is a flawed man and probably not in touch with us mere mortals.  I think he loves the country, it has been good to him and I think he is genuine when he says he will make us respected in the world again.

Dr. Carson is soft spoken, smart man but I have not heard from him any strategy for dealing with the issues we have at hand.

dr-ben-carson-we-the-people
True statement…
Pay no attention to that man behind the curtain.
Pay no attention to that man behind the curtain.

Carly, waiting for the debate next week to make up my mind.

fiorina

Chris Christie shoots from the hip but I don’t like the idea that he will further screw with Social Security.  What I picked up from him today is that the age might be raised again and there might be some sort of means test, meaning; if you planned for retirement or are making some ambiguous amount of money decided by some committee, that you might not qualify to get “your money from social security, back!”

Make no mistake, the money that you paid into the system is yours.  When I got into the work force it was 65.  Reagan changed it so now the baby boomers get it much later.

The argument is that people are living much longer today but…here is the gotcha…!  Once you reach middle age, companies don’t want you anymore!  Why do you think that so many middle ages professionals that are working at a hardware store or other retail part time job?  They don’t want to, that is all they can get.  Something part time without benefits that makes their retirement income last a little longer.

They should be enjoying their golden years but they had to live off of what they saved for retirement because they were let go before they reached retirement.

The deal was 65, and it should be changed back to 65!  We need the jobs to come back to the US.

rhdocz3de3jhojagcpjb

We need people to be able to work until retirement instead of being subjugated to part time retail jobs meant for kids in high school.  By the way Wall-Mart got rid of their door greeters, which was my retirement strategy…..  I love people, what can I say….

6a00d8341c57f753ef013487b1a708970c-800wi

We have some tough challenges ahead of us and the next president had best be up for the challenge and really needs to be in tune with the folks who pay for everything, the middle class.

national-debt-obama-2012-debt-deficit-budget-politics-babies

More on this after the next debate….  I know, you can’t wait…

-Best

© All Rights Reserved