The IT industry has long debated the benefits of single-vendor networks vs. multi-vendor networks. We sometimes act as though this discussion were unique or somehow surprising. But that’s not really true. After all, the people at Coke never asked you to drink Pepsi. And the folks at General Motors were never really all that taken with the idea of you tooling around in a Ford or a Lexus. So every time I hear about the benefits of single-vendor, a part of my brain thinks, “This just in!…… A sales guy thinks you should buy his products!”
But another part of my brain also recognizes that IT systems are different from cars. You buy your car from a single vendor. With the possible exception of hobbyists and other gear-headed types, nobody buys or designs cars that are part Chevy, part Toyota, and part Lamborghini. A Chevyoghini? Never mind.
When it comes to your company’s browsing policies, make sure you’re safe—not susceptible
Threats come at your business from every angle, including malicious parties lurking in cyberspace. As a smart small business, though, you have the security basics covered to protect you from viruses, spam, and other attacks. But as it turns out, security is often breached in more mundane ways—such as ordinary on-the-clock web browsing.
5 helpful steps for responding to and recovering from a network attack
Strange pop-up windows, unauthorized software, sluggish systems, mysteriously changed passwords, programs running automatically, or unofficial content posted to your website are all signs that your small business network has been hacked. If you suspect that your network security has been compromised, don’t panic! It’s important to remain calm, retain your professional demeanor, and act decisively.
In addition to seeking guidance from a security professional, these five steps can help you quickly respond and safely recoverfrom a network attack.
Smart small businesses know to invest in business-grade networking equipment. But should you mix devices from different vendors? It’s not a good idea, according to Jimmy Ray Purser. If your network goes down, you want to be assured the problem will get resolved—and fast—without a lot of finger pointing.
Hear more from Jimmy Ray on why it’s best for small businesses to stick with one networking vendor.
There’s a certain level of excitement that comes from looking at prospective upgrades. Nowadays, that excitement is less about speeds-and-feeds, and more about how the recommended path can either pump up revenues or cut expenses.
But underlying all of the great ideas is the system upon which these applications and upgrades will run. So it’s fair to ask your channel partner, “Will my existing systems be able to support your suggested upgrade path?”
More often than not, you won’t need to ask this specific question because the channel partner should proactively tell you. After all, any changes to the infrastructure will carry budget implications that need to be factored into the overall project. But whether the partner brings up this issue or not, don’t assume that all IT systems are created equal. A few things need to be considered: