Secure your Gmail and Google accounts with passkeys. Learn step-by-step how to set up passkeys for stronger, password-free protection.
Continue readingHow to Set Up a Passkey for Your Google Account
Secure your Gmail and Google accounts with passkeys. Learn step-by-step how to set up passkeys for stronger, password-free protection.
Continue readingHow to Prepare for a Hurricane: A Guide for Businesses and Technology
As hurricane season approaches, businesses must take proactive steps to safeguard their operations, data, and employees. Hurricanes pose significant risks, from physical damage to infrastructure to potential data loss and service interruptions. By preparing in advance, businesses can minimize disruptions and ensure a quick recovery. Here are essential tips for preparing for a hurricane, with a focus on business continuity and technology.
1. Create a Disaster Recovery Plan
A disaster recovery (DR) plan is essential for any business in hurricane-prone areas. Ensure your plan includes:
Clear steps for data backup and restoration: Regularly back up business-critical data both on-site and in the cloud. This ensures that if your physical infrastructure is damaged, you can quickly restore operations from a secure, off-site location.
Communication protocols: Establish emergency communication channels with employees, customers, and stakeholders. Make sure everyone knows how to stay updated during a disaster.
Critical business functions: Identify key services or systems that must be operational during or after the storm. Ensure these are prioritized in your DR plan.
2. Back Up Data to the Cloud
Data loss is one of the most significant risks during a hurricane. If local servers or infrastructure are compromised by flooding, power loss, or other damage, cloud-based backups are crucial.
Cloud-to-cloud backup solutions: Consider backing up services like Microsoft 365, Google Workspace, and other cloud applications. This ensures that even if your office is impacted, your business-critical data remains safe and accessible.
Automated backup systems: Schedule automated backups to reduce human error and ensure that data is continuously protected.
3. Protect Physical Equipment
If your business relies on physical technology like servers, computers, or networking equipment, it’s essential to safeguard these assets before the storm:
Elevate critical equipment: Raise important equipment off the floor in case of flooding. Use waterproof covers or protective cases.
Uninterruptible power supplies (UPS): Invest in UPS systems to provide backup power to servers and essential equipment, especially in areas prone to power outages. Ensure your UPS units are tested and functioning.
4. Implement Strong Cybersecurity Measures
While physical damage is often the most immediate concern, hurricanes can also expose businesses to cybersecurity threats:
Update security patches: Ensure that all devices, including workstations, servers, and network hardware, are up-to-date with the latest security patches.
Remote work readiness: In case your physical location becomes inaccessible, ensure that your employees are equipped for remote work with secure VPNs, multi-factor authentication, and other cybersecurity best practices to prevent unauthorized access.
Phishing and smishing awareness: Cybercriminals may take advantage of the chaos caused by natural disasters to launch phishing or smishing campaigns. Educate employees about these risks and establish a protocol for reporting suspicious emails or text messages.
5. Test Communication Systems
Before a hurricane hits, test your business’s communication systems to ensure they work during emergencies:
Emergency contacts: Update emergency contact lists for employees, vendors, and clients, and ensure they are accessible via multiple channels (email, phone, or text).
Automated alerts: Use automated systems to alert employees about any operational changes, office closures, or safety measures.
Virtual meeting platforms: Ensure employees have access to video conferencing tools to stay connected in case they cannot be physically present at the office.
6. Plan for Remote Work
If a hurricane disrupts normal business operations, having a remote work strategy is essential:
Access to company systems: Ensure that employees can access necessary systems and data remotely. This includes ensuring that cloud applications are functioning and accessible, and that remote desktop solutions are set up.
Cybersecurity for remote work: Strengthen your cybersecurity protocols for remote work, such as enforcing the use of strong passwords, VPNs, and encrypted communication tools.
7. Communicate with Clients and Customers
Clear communication is essential when a hurricane is threatening your area. Proactively inform clients and customers about potential service disruptions or delays.
Keep clients updated: If you anticipate delays or interruptions, communicate your plan to your clients and let them know when they can expect updates.
Offer alternatives: If your physical location is compromised, offer alternative methods for clients to engage with your services, such as online consultations or remote support.
Final Thoughts
Preparing for a hurricane is critical for protecting your business, your employees, and your technology infrastructure. By taking proactive measures such as implementing disaster recovery plans, backing up data to the cloud, securing physical equipment, and ensuring robust communication systems, your business can weather the storm and emerge resilient.
Stay safe and prepared—your business depends on it!
Why use two-factor authentication (2FA) or Multifactor (MFA) with your VPN connection?
What is a VPN?
Virtual private networks (VPNs) have been a popular way for companies to provide their employees remote access to their private servers and network resources. VPNs create secure connections between remote machines and your servers allowing your users to stay productive when out of the office. VPNs reduce the risk that hackers can find and enter your servers while your employees securely work from home or anywhere for that matter.
While VPNs are great, they are far from a perfect solution and are subject to security threats, such as phishing attacks. For example, an attacker will often send a legitimate looking email to one of your employees and invite them to log into their account via a link in the email to update their information, pay a bill, or other…. The hacker only has to wait for the unsuspecting employee to enter their username and password. Once in possession of valid credentials, the attacker will be able to connect to your VPN as a legitimate user, gain access to your network, steal information or cause other types of damage such as deploying ransomware.
How 2FA two-factor authentication secures your VPN network
Two-factor authentication (2FA) reduces the risk that hackers can access your network using these stolen or compromised credentials. 2FA requires users to validate their identity by presenting a second security factor in addition to their password. When connecting to a corporate network, users must first enter their computer or VPN credentials, followed by a time-based one-time password (TOTP). This TOTP (usually a 6 digit numeric code) is displayed on users mobile phone in an application called an authenticator. Google Authenticator and Microsoft Authenticator are 2 popular and free apps compatible with both iPhone and Android devices.
2FA makes it extremely difficult to impersonate a user without having access to this second factor. This means that even if hackers were to steal all of your employees’ usernames and passwords, they still wouldn’t be able to access your VPN because they don’t have the 2FA code generated in the authenticator app.
How can I enable 2FA for my company’s VPN?
Every firewall and network is a little different and thus the configuration can vary dramatically. If you are interested in securing your network with 2FA please reach out to TMD Technology Services to assist you in determining the best path forward.
Aside from your VPN we highly recommend using 2FA on all your important accounts including email, banking, website and social media.
Sage 300 1099 NEC form new for year 2020 for Accounts Payable Nonemployee Compensation
Sage 1099 NEC Summary
The IRS has created the Form 1099-NEC for filing Non-employee compensation payments for 2020 which is was reported on the Form 1099-MISC.
Check on the IRS website for more information on Form 1099-NEC.
Why did the IRS reintroduce 1099-NEC?
Before its reintroduction, the last time form 1099-NEC was used was back in 1982. Since then, prior to tax year 2020, businesses typically filed Form 1099-MISC to report payments totaling $600 or more to a nonemployee for certain payments from the trade or business. These payments generally represent nonemployee compensation and, up until now, would typically appear in box 7 of 1099-MISC.
In order to help clarify the separate filing deadlines when reporting different types of payments on Form 1099-MISC, the IRS decided to reintroduce Form 1099-NEC which has a single filing deadline for all payments that use the form.
If you have Sage 17.1.x, Sage 18.1.x you will need to upgrade to sage 20.3 in order to use the 1099 NEC.
Resolution
The Form 1099-NEC updates are included in the following Product Updates: 2021.1, 2020.4 & 2019.7.
If you need to upgrade your sage installation we can help. Call Today (561) 404-9251






