Home » Blog » Your business

Tag: Your business

outsourcing your IT

Outsourcing your IT

Why outsource your IT?  As a Small – Medium Business (SMB), the question of outsourcing your Information Technology (IT) may have frequently crossed your mind, especially with the surging security breaches that the media outlets seem to broadcast weekly.  Whether your business does not already have a dedicated IT Department or if you are seeking complementary services to your already established IT infrastructure, outsourcing your IT technology can provide tremendous benefits to your business.  Using the 3 R’s (Reasons, Risks & Rewards) can provide a base to examine if outsourcing your IT may be beneficial and effective for your business.     


REASONS to outsource your Managed IT Services

  • Outsourcing is Budget Friendly – Cost Effective – Reduce & Control Operating Costs.
  • Would your business like to improve your and Your Employees’ Focus and Resources?
  • Would your business like to Reduce Labor Costs?  
  • Is your business finding it difficult to keep up to date with Routine Maintenance on Workstations and Servers?
  • Is your business finding it difficult to start or manage IT Projects?
  • Make capital available for other means in your business.
  • Reduce Security Risks.


RISKS involved with outsourcing Managed IT Services

Any time you hand over responsibilities for any aspect of your business you are inviting risk. Whether hiring a staff member or outsourced service, you may have lingering hesitations, such as, What are they supposed to do? Or Will they fit in with the company culture? Or Did I hire the right person?  


Some other risks that you may consider when outsourcing your Managed IT Services:


  • Loss of Control – Oversight
  • Confidentiality of DATA – entrusting someone to your company’s intimate practices may seem like a risk, but an Outsourced IT Service provider can also help protect your DATA from ending up in the wrong hands
  • Disaster Recovery – much like confidentiality, an Outsourced IT Service provider can mitigate and help to make a plan for Disaster Recovery
  • Some IT functions are not easily converted
  • Employee Morale
  • Your business may get locked into a contract


REWARDS of outsourcing your Managed IT Services

  • Acquire a Valuable Partner –  a committed Expert of Outsourced Managed IT that provides professional, objective and best practice advice along with keeping up with the most current technology trends.
  • Add to your In-House capabilities.
  • Little to no Human Resource (HR) Investment.  Hiring an employee hosts a staple of expenses from the hiring process, background checks and supplying a space to work to account for benefits, vacation, sick days, worker’s compensation, continued training, employee performance reviews, human resources, and of course, employee turnover.
  • Cost Savings.
  • Flexible to your Company’s changes in size, volume, and strategy.
  • Security – Keeping your Systems updated, leveraging Virus protection and proactively monitoring.
  • Predictable Monthly Budget.
  • Prevent Burnout of Yourself and Employees.


BONUS – Tips to Working with your Outsourced Managed IT

  • Clearly formulate and communicate goals and objectives of the business relationship
  • Have a Strategic Vision
  • Keep Open Communication


Managed IT Outsourcing companies have a lot of experience with different types of businesses and thus – a better understanding of a client’s expectations. This is the main reason why outsourced companies are able to be flexible with your requests and visions. They can even propose new ideas that can change your perspectives. Outsourcing companies see your existing infrastructure from a different vantage point and can customize a solution for your individual business needs.  


About Herstek & Associates, LLC

Herstek & Associates, LLC is a professional outsourced computer service company serving small to medium businesses in Luzerne and Lackawanna Counties in Northeast Pennsylvania (NEPA). Our specialties are network planning (network consulting), network projects, and ongoing network/computer maintenance. We pride ourselves in not only delivering the results you expect but also being knowledgeable, systematic, accountable, trustworthy and easy to work with. To speak with a Support Advisor about the the computer support provided by Herstek & Associates, LLC please call us at (570)779-4018 or contact us.

Section 179 Deduction

NEPA Section 179 Deduction

It is a great time of year to take advantage of the section 179 deduction. If you purchase software or equipment by December 31rst, you can deduct the full purchase price and a bonus depreciation. Section 179 is the product of a recent stimulus bill that is geared to help small business grow.

There are limits to what you can purchase. Most computer equipment qualifies. Most “off-the-shelf” software qualifies. PC, Laptops, Servers, and network equipment all qualify. Custom software does not but server-based software, PC operating system upgrades, MS office products, and accounting software like QuickBooks all do.

How about a business class i7-6700, 8GB ram, 250GB SSD with windows 10 pro with a 5-year parts warranty?

business class i7-6700, 8GB, 250GB SSD with windows 10 pro

Or maybe you need a new rack mount server with a Xeon Processor, 32 GB ram, 8TB hot swap raid 5 for your new virtual server host.

 Xeon Processor, 32 GB ram, 8TB hot swap raid 5

Or it could be time to upgrade your aging routers. Maybe a new SG-3100 pfSense router with 2x1GbE (gigabit ethernet) internet ports so that you can keep your business running on a backup internet connection even when the main lines goes down?

SG-3100 pfSense

Or maybe you have read some of my ransomware articles and now you are ready to have a serious disaster recovery system in place. We can configure a local backup system and supplement it with online backup. The hardware for the local backup could fall into the section 179 deduction.

Onsite Bare-Metal Recovery with Cloud Replication
We can source you other products as well. Ready for your Dual monitor setup? How about upgrading your laptop to an SSD drive? Maybe it is time to upgrade the memory on your unit?

Dual Monitor

Contact us now and we will be more than happy to configure a custom quote for whatever you need so you can take advantage of the section 179 deduction this year. Contact us here…






business disaster

Most Businesses Won’t Survive a Disaster. Could Yours?

With the crazy weather we’re seeing, natural disasters and cyber terrorism echoing for years, it’s not a case of ‘if’ a disaster will strike your business, but ‘when’. Surprisingly, it’s not the scope and scale of the event that influences how deeply your business is impacted, it’s your business continuity plan.

Put simply, this is the all-important set of precautions and pre-planned responses to an event, laid out in bullet-proof detail and implemented with one driving focus: keeping your business running with little or no downtime. Think about what would happen if your business was hit by a natural disaster tomorrow. Would it survive? How much downtime would it take to push you into dangerous territory?

According to an IBM study of all the companies that had a major loss of data, 43% never reopen, 51% close within two years and just 6% will survive long-term. For a fraction of those survivors, business even continued as usual thanks to their ‘failsafe’ business continuity plan. It’s more than disaster recovery, it’s full preparedness that bypasses the need for 2+ weeks of downtime, financial ruin, wasted salaries and reputation loss – but it does require a higher level of planning…in advance.

Recommendations to Put You in the Surviving 6%

Prioritize: You’ll need to plan exactly what you’ll recover first and know who’s in charge of making it happen. It goes beyond jotting down a checklist of things to do, it’s taking an analytical, process-based approach to recovery for each unique business perspective. But it’s also realistic: there’s no point dedicating precious time to reviving the email system if your customer data is leaking onto the internet, even if email did rank as your top communication priority!

Backup: Of course, the most critical part of your business continuity is having full backups in three places. Why three? One copy locally which you use each day, a backup on another (disconnected) device in the same location, and one in the cloud. That local backup is your life-saver for system crashes, cyber-attacks and the like; the cloud backup comes into play when your business has taken a major physical hit, perhaps from fire or flood. Some businesses can run entirely location-independent when using cloud systems like Office365, which can be enough to put them in that 6% of disaster survivors.

Test: Make sure all employees know what the plan is if something goes wrong, and their specific roles in these scenarios. You can test, prepare and rehearse your continuity plan under simulated disaster conditions, which will uncover new obstacles, priorities and additional threats.

As your IT environment becomes more complex, carrying more responsibility and risk, so does the importance of a robust business continuity plan. The best BC plans look beyond disaster recovery, taking into account scalability of your system and scope of your individual business, to create strong battle lines that will keep your business operational, both now and for the long term.

Give us a call at 570-779-4018 to create a custom business continuity plan for your business.

mac malware

Apple devices and Macs get malware!!

I don’t like picking on Macs… Oh, wait. That is a lie. I do like picking on Macs because I am tired of hearing “Apple’s don’t get viruses or malware.” This absolutely not true!

There hasn’t been a serious ransomware outbreak on Mac but that doesn’t mean isn’t coming. There are a few ransomware programs in the wild and there has been increased activity in the mac security sector just like there has been in the PC world. Other malware and scam software are out there and on the rise.  “Our tracking of Mac malware has seen a more than 220 percent increase in malware so far in 2017 over 2016,” said Malwarebytes. The main reason that Mac desktops and laptops seem to not be affected is that they only are about 7% of computer users. They are a much small target so there are less malicious programs out there. That doesn’t mean they don’t exist. They will still steal your data if they can. WIth RaaS (Ransomware as a Service) and cross-platform malware, it is becoming easier for the bad guys to target whatever they want. They don’t even have to be proficient at programming anymore. And with an attitude like “we don’t get malware,” you might be easy pickings.

Beyond that, you are also just as likely to lose your online data as a PC user! Just because you are browsing the internet from your Mac doesn’t mean things like the Yahoo and Equifax data breaches will not affect you. You still need to be vigilant in the cloud and protect your personal information.

Protect you and your Mac

  • Backup your data – Onsite, Offsite and Cloud
  • Keep your software and OS up to date
  • Don’t use unapproved software
  • Use an extra anti-malware solution
  • Be wary of unknown websites and unsolicited email
  • Use strong password and 2fa (Two-factor authentication) wherever you can
  • Use a standard account over an admin account for everyday use
  • If you have a laptop, consider full disk encryption

We offer backup, monitoring, and antimalware solutions if you use Apple products in your business. Let us know how we can help!

better business owner

3 Tech Tips to Make You a Better Business Owner

There’s no doubt about it, business can be tough! You’re juggling employees, customers, suppliers, stakeholders…the list is endless. You’re also operating in a competitive, high-tech economy that keeps trying to speed ahead without you. It’s no wonder you’re craving ways to get ahead of the competition, cut costs, boost productivity and dreaming of a vacation. Here are 3 tech tips that will make your life easier – and maybe get you closer to that ‘World’s Best Boss’ mug.

Consider a commuting policy

With better technology and faster internet connections, remote working isn’t just a possibility now, it’s an expectation. Clearly, not for every job (virtual burgers anyone?), but there are a lot of computer tasks in your business that could be done from home. Even if you offer a split week with 1-2 days at home and the remainder in the office, this can be a huge boost to your productivity.

From your perspective, remote employees can be more efficient without the distractions of yet another birthday sing-along, they have fewer absences and stay in the job longer. From the employee perspective, they don’t need to waste time commuting, get their work done faster, and generally feel happier and healthier.

Don’t cheap out on technology

Unsurprisingly, a tech newsletter is advising you to invest in tech, but hear us out. Technology is rapidly becoming the backbone of most businesses, yet we still see people who try and get by with the bare minimum investment and maintenance. And by ‘see people’, we mean they’re our most frequent repair and data recovery clients.

When you take shortcuts with your tech you’ll always get higher failure rates, more downtime, and employees who can’t do their job even though you’re still paying them by the hour. When businesses keep old tech longer than they should, thinking of the immediate cost saving, they usually end up paying more in the long term.

Embrace the cloud

Many of your existing software packages have a cloud version, which would allow multiple people to access it at once and give added backup or synchronization benefits. Your remote workers, mobile staff, accountant or CFO can all view the same reports without anyone having the trouble of sending out separate copies.

Cloud technology is also perfect for notetaking and collaboration using software like Evernote or OneDrive. You and your employees can think of ideas while out and about, make a few notes on a mobile device, and have it all synced perfectly to your desktop when you need it. You can even scan in paperwork and have your entire filing cabinet in your pocket.

Your business tech can unlock multiple possibilities that will make your days run smoother, more profitable and put you miles ahead of the competition. Ready?

Give us a call at 570-779-4018 to make your tech work harder for you.

Feeling the Budget Pinch? Here’s How Managed IT Can Help Save Your Business.

When it comes to running a modern business, technology is always a growing line item in the budget. Costs seem to creep up every quarter, along with a new learning curve for simply keeping everything running along smoothly. It’s no wonder then that budget restrictions for tech were recently found to be a universal concern for small/medium business.

You’re balancing the outlay of maintenance with replacement, plus securing against a steady stream of threats – all while making sure every dollar gives maximum return on investment. It even sounds exhausting! What typically happens is the tech budget gets stripped to a bare minimum, hoping nothing unexpected pops up and everything keeps moving along nicely. After all, everything is working just fine and that money could make a real difference elsewhere… except as soon as an IT emergency strikes, that tiny budget is obliterated and you’re left to either limp along with insufficient tech or dip into another budget area.

Now imagine if budget wasn’t an issue. Imagine all your tech expenses were predicted and capped, and you got everything you needed without resorting to financial magic tricks. Sounds good, doesn’t it?

Put simply, that’s how a Managed IT Service works. It’s a service designed for businesses with a limited budget who don’t have time for tech issues. For a fixed price each month (which is no doubt less than you’re thinking), you get a team of IT technicians actively monitoring your systems in order to catch issues before they occur, repairing problems on the fly, and ensuring your business is always as secure as possible. Included as part of your Managed IT Service, you also get expert business consulting around the solutions you need now, which solutions will help you rapidly scale, and which technology you don’t need. All for one predictable, fixed price each month. It gets better:

You’ll reduce downtime and associated revenue loss.

Forget scrambling while systems are down, with Managed IT Services you’ll know which tech is failing and can proactively repair or replace before it impacts your business. Downtime is planned/minimized and your staff are working uninterrupted by tech drama.

You’ll skyrocket efficiency.

You’ve probably been responding to your IT events in ‘firefighter mode’, essentially dealing with problems as they arise and switching to new, improved tech only when you must. With Managed IT Services, problems are automatically reported and optimal solutions designed in advance. Even the small issues that have been slowing your business down and limiting progress come to light, ready to be solved for greater efficiency.

You’ll secure against data loss.

Whether you’ve been following the news and worrying about the next cyber-attack, or you’re working with confidential customer or proprietary data, your Managed IT Service has you covered. Our technicians secure your business against attack using the latest technology, full backups, software updates and leverage every drop of their know-how to keep your valuable data safe.

Learn more ways Managed IT Services can benefit your business – give us a call at 570-779-4018.

6 Simple Tips to Protect Your Customer Data

As cyber-attacks continue to make headlines, hackers are exposing or selling customer data files in record numbers. But just like with any threat, there are actions you can take to minimize risk and ensure your business retains a positive reputation among customers.

  1. Stop using the same password on repeat. Set a mandate for all staff that passwords must be unique for each user and for your workplace. That means it can’t be remotely like the one on their home PC, tablet or online banking. Passwords are hacked more than ever, so when you’re prompted for a password change, dig deep and really think about what goes into a hacker-proof password. If remembering them is a problem, consider one of the latest password management tools.
  2. Go on a shredding spree. How much sensitive data is being dumped into the recycling bin? Valuable customer data is often taken from the bins of small businesses and quickly sold or published. It’s not just good practice to shred sensitive documents, it’s the law. Take 5 seconds to run documents through the shredder or book in the services of a secure shredding company.
  3. Ditch the accounting spreadsheets. Still using an Excel doc for all your number-crunching? Besides making your accountant’s job harder (and more expensive), you’re opening your business to a massive range of vulnerabilities. Even with password-protection, spreadsheets aren’t designed to safeguard your financials or those of your clients. Upgrade to a proper accounting solution with built-in customer data protections and security guarantees.
  4. Train staff explicitly. You can’t rely on common sense because what you think is a given might be news to someone else. It can be extremely beneficial to hold special data-safety training sessions once or twice a year as a reminder, as well as take the time to induct new staff into the way things are done.
  5. Limit access to data. Just like the bank manager who guards the keys to the vault, you can limit who accesses your data. Revoke employee access as soon as they leave your business for good, and set rules around who can access what – and when. Do they need access to sensitive information while working from home? Should they be able to change the files, or only view them?
  6. Keep your software updated. Possibly the most preventable hack, having outdated software can be an open invitation for cyber-criminals. They look for known weaknesses in business software and waltz right in. While the nagging pop-ups and reminders to update can feel like a selling ploy, they’re actually helping your business to stay in the safe zone. Updated software gives you protection against new viruses and hacking techniques, plus closes off those nasty weaknesses.

If you would like to make sure your business is secure from data breaches, give us a call!

When is Your Business Ready to Move to the Cloud?

By now you know that the cloud isn’t going away anytime soon. In fact, cloud computing has become a natural step in business growth, thanks to the numerous (and continually growing) benefits. More and more applications are coming out in web-based form and staff are exceptionally comfortable with this type of change. So when is the right time to move your business computing to the cloud?

Many businesses are facing this question now that cloud computing has become a mainstream norm. After all, you’ll be able to roll out new apps in days, not weeks, and nobody ever says ‘no thanks’ to increased security and efficiency. Like any strategic business decision though, timing is everything. Here’s how to assess your need before you make the switch:

Age of servers and workstations

If your workstations and servers are reaching their end of life and a large capital investment is coming up, you’ll be able to minimize the expense by moving to the cloud. You may even be able to skip certain upgrades completely. Your staff will still need devices to access the cloud data, but you’ll have a lot more flexibility in your choice and they won’t need to be as powerful. This can be a huge cost saving made in just moments.

Need for remote and mobile access

Many businesses are growing while on the move, with a mobile workforce needing to access files from anywhere at any time. This could range from moving around the one location, between offices or even working from home. Forget frustrating connections and lost productivity, cloud computing allows staff to work securely and efficiently from any location with internet access.

Current support setup

If your business currently outsources all your network management, you’re perfectly suited for the move to cloud computing. Network maintenance and monitoring becomes a non-issue, handled 24/7 as part of your cloud service. Network efficiency just keeps rising too, as your cloud provider is always improving their systems. You’ll find problems are fixed before you knew they existed, and server downtime becomes a thing of the past.

Need for predictable IT costs

If it feels like IT costs can spiral out of control at times, challenging your budget and patience, cloud computing will seem like a dream come true. When you make this shift, you’re moving from a capital expense to an operational one – server and system replacements are no longer your concern. You’ll be able to budget for IT costs in advance, knowing no blowouts are hiding around the corner. Monthly costs are known and (usually) capped based on what you use, leaving your cash flow much relieved.

Today’s cloud computing is more advanced, secure and priced more competitively than ever before. At its core, cloud computing is purely about doing things better, and it can have a massive impact on your profits, productivity and even staff satisfaction rates. If your business requires a robust, always available infrastructure with easy monthly costs, it’s time to take a serious look at your cloud computing options.

We offer a variety of cloud services to help your business. Give us a call to discuss how we can improve your business IT.

Boost Your Email Impact With These Smart Strategies

Most small businesses rely on email as their preferred form of communication. Either internally or externally to clients, customers and suppliers, email is the go-to format we’d be lost without. Our love affair with it is no surprise – it’s quick, simple and provides a paper trail. But its convenience doesn’t always mean relaxed. In fact, poor email communication can hurt your reputation and cost you customers. Here’s how to be smart with your business email:

Manage your inbox: Your inbox is only for items you still need to access. Once you’re finished with an email, you should delete it or archive it. If you were to imagine your inbox as physical letters, you’d never let it grow to a 6-foot high stack of chaos. Instead, you’d either throw them out or do the filing. It’s not hard to identify which ones to keep for reference, so create inbox folders to sort them accordingly. As emails arrive and are actioned, move them to the relevant folder or the delete bin.

Write professional messages: Stepping across the line from casual to careless is easy if you skip the basic elements of good business writing. Grammar will always be important and the sentence structure of your language hasn’t changed. All email programs include a spell-checker, many of which draw attention to errors immediately, so there’s really no excuse. Typing in all CAPS is seen as yelling, and breaking your text into paragraphs makes your message so much more readable. One last thing before you click send, quickly glance over your email to make sure your tone is appropriate and no mistakes have snuck through.

Embrace the subject line: Many emails are missed because the subject line was empty or meant nothing to the receiver. Writing these attention-grabbing nuggets can be tricky, but if you simply summarize the message, you’ll do fine. Just remember to keep them under 5-8 words so they fit on mobile displays.

Be smart with attachments: Keep attachments small – under 2MB – as they can clog up the email server. For larger attachments, share the file location as a link using cloud storage. When you’re sent an attachment you’d like to keep, save the file and then delete the email. And as always, be careful with unexpected attachments, especially from unknown senders. It’s more important than ever to scan all attachments with an antivirus before opening.

Keep your CC/BCC under control: The carbon copy (CC) and blind carbon copy (BCC) let you send the email to additional stakeholders, more as an FYI than anything else. As a rule, use BCC if you’re using an email list or privacy is an issue. But before you add extra people to the email, make sure the email IS relevant to them. There’s nothing worse than being stuck in a pointless email chain!

Call us at 570-779-4018 for help with your business email.

Mobile Cyber Security

Cyber Security: 4 Ways to Travel Safe For Business

Working from anywhere is now as simple as accessing the internet on your device. Managers, owners, and employees are all embracing the flexibility of working while traveling, making it the new global norm. But while you were in the office, you were protected by professionally designed firewalls, security infrastructure, and robust software. As soon as you step away from the building, those protections disappear, leaving your device and the data inside at great risk.

Cyber attackers love to collect any data they can obtain, often preferring to hack first, assess value later. It doesn’t help that almost all data can be sold, including your personal details, those of your clients and suppliers, as well as your proprietary business data. These days, the information stored on your device is usually worth much more than the device itself.

Here are 3 ways a hacker will attack:

Flaunting Opportunity: Whether your employee left their laptop at a café or a thief stole the phone from their pocket, the outcome is the same – that device is gone. Hackers will take advantage of any opportunity to gain access to a device, including taking them from hotel rooms and even asking to ‘borrow’ them for a few minutes to install spyware, before handing it back.

Spoofing a Wi-Fi Hotspot: We’ve all come to expect free Wi-Fi networks wherever we go. Hackers will take advantage of this trust to create their own free, unsecure network, just waiting for a traveler to check a quick email.

Intercepting an Unsecure Network: Hackers don’t need to own the Wi-Fi network to steal content from it. Data traveling across an unsecure network is visible and available to anyone with the right software.

It’s okay, you don’t need to lock all employees inside the building or cancel all travel plans. Taking these four precautions will increase cyber safety and help protect your business data while on the go.

  1. Make a backup before you travel: In the event your device is lost or damaged, you’ll be able to replace the device with a new one and quickly restore all the data from a backup, all with minimal downtime.
  2. Don’t use public Wi-Fi: Wait until you have access to a secure network before going online – even just to check email.
  3. Use passwords and encryption: At a minimum, make sure you have a password on your device, or even better, have full drive encryption. That way, even if your data storage is removed from the device, the contents are inaccessible.
  4. Act fast after loss: If your device is lost or stolen, immediately notify the appropriate people. This might include your IT provider so they can change passwords, your bank so they can lock down accounts, and any staff who need to be aware of the breach so they aren’t tricked into allowing further breaches.

Need help with mobile cyber security? Call us at 570-779-4018