W. Kenneth Yancey, Jr., CEO Ken Yancey is responsible for developing SCORE’s business plan and vision as well as coordinating national program efforts and all the association’s management operations. He also directs the efforts of the headquarters staff to serve and support the 370 chapters across the country. Prior to joining SCORE in 1993, Ken was Executive Director at the National Business Association. A graduate of Texas A&M University (BBA/Finance), Ken is a recipient of the USA Freedom Corp Award of Excellence, the ASAE Summit Award, and the BSA Goose Creek District Award of Merit.
Do you hear about today’s technology tools for small business and wonder if they are right for you? Do you dream about finding the perfect tools to help run your business, but not sure where to look or if you can afford them? If you have an hour, follow these three easy steps to analyze your small business’ technology needs.
The IT industry has long debated the benefits of single-vendor networks vs. multi-vendor networks. We sometimes act as though this discussion were unique or somehow surprising. But that’s not really true. After all, the people at Coke never asked you to drink Pepsi. And the folks at General Motors were never really all that taken with the idea of you tooling around in a Ford or a Lexus. So every time I hear about the benefits of single-vendor, a part of my brain thinks, “This just in!…… A sales guy thinks you should buy his products!”
But another part of my brain also recognizes that IT systems are different from cars. You buy your car from a single vendor. With the possible exception of hobbyists and other gear-headed types, nobody buys or designs cars that are part Chevy, part Toyota, and part Lamborghini. A Chevyoghini? Never mind.
When it comes to your company’s browsing policies, make sure you’re safe—not susceptible
Threats come at your business from every angle, including malicious parties lurking in cyberspace. As a smart small business, though, you have the security basics covered to protect you from viruses, spam, and other attacks. But as it turns out, security is often breached in more mundane ways—such as ordinary on-the-clock web browsing.
5 helpful steps for responding to and recovering from a network attack
Strange pop-up windows, unauthorized software, sluggish systems, mysteriously changed passwords, programs running automatically, or unofficial content posted to your website are all signs that your small business network has been hacked. If you suspect that your network security has been compromised, don’t panic! It’s important to remain calm, retain your professional demeanor, and act decisively.
In addition to seeking guidance from a security professional, these five steps can help you quickly respond and safely recoverfrom a network attack.
Smart small businesses know to invest in business-grade networking equipment. But should you mix devices from different vendors? It’s not a good idea, according to Jimmy Ray Purser. If your network goes down, you want to be assured the problem will get resolved—and fast—without a lot of finger pointing.
Hear more from Jimmy Ray on why it’s best for small businesses to stick with one networking vendor.