Mo Bigger Data

Losing valuable business data is a terrible thing. It is worse when it’s done on purpose. Every business faces changes in accounting or operational systems over the lifetime of the company and these changes more frequently than not include losing data of some type. And that means losing business intelligence.

The frustrations of changing business systems are compounded the further into the business life cycle the change comes. Much of the historic intelligence of the business is derived from the earlier days of operation. This is data which reflects the stages and activities of the business over time. When a business reaches a point where data volume or list sizes force a systems change, much of that early historic data is ultimately abandoned. There is so much data to load into a new system that the task often proves too daunting for the company, so valuable historic detail information is lost and summary information is loaded into the new system.

As a business matures, and for the business to mature in a healthy manner, specific and detailed information must be captured and analyzed. Software addressing a broad view of the business, offering only generalized functionality and basic process support, will not provide a growing business with the operational support and resultant business intelligence needed at this level.

For example, a manufacturing business needs to fully understand and manage the manufacturing processes and materials supply chain to ensure profitability and consistent product quality. A retailer needs to know which products sell in which markets to ensure product stock and availability to key customers. And all this information is time-critical if the business is to make necessary adjustments in time to benefit from them.

In the end, it is the demonstration of well-defined processes, deep insight into the business operational metrics and financial performance, and the ability to effectively and accurately report on this information that creates a basis for provable business value.

Mendelson Consulting understands how important it is to not just collect the right data to support various processes, but to use that data to better understand operational and financial performance. As operations grow, so does the need to collect data from a variety of possible sources, from phone systems to time clocks and more. Even getting data out of the accounting system can be a challenge, but there is tremendous value in having transparency of business data.

From data warehouses to data lakes, Power BI and data visualization, we help businesses access their information and develop reporting that not only informs but helps deliver greater insight which leads to improvements in performance and profitability.

When information is power, we help owners and stakeholders gain mo power by being mo better informed.

jm bunny feetMake sense?

J

Preparing Your Business for Technology Outages

There is a lot of discussion today about how our children are growing up in a world where high technology is simply part of life and lifestyle.  I even read an article about how people are evolving because of the availability of information; evolving to the point where we no longer store and retrieve information, but store information on how to get information.  The article cited an example of someone who couldn’t recall the name of an actress in a movie they had seen, so the immediate response was to search for the answer on Google.  In the past, people relied upon memory and found various ways to mentally associate and store information so it was able to be recalled.  Now, there’s an app for that.

Are we losing our ability to effectively store and recall information?  Are we forgetting how to do things before we had technology to help us?  It might even make one wonder about how technology-dependent society has become. Consider the ruins of past civilizations where seemingly impossible structures are found. These structures cause questions about the technology available at the time as we wonder how they came to be.  The knowledge was there at some point but is now lost to time.

Is your business at risk from a similar fate?  Loss of business institutional knowledge and operational intelligence is often a problem, especially as a business grows. Too many companies fail to consider critical issues such as knowledge management and sustainability.  Finding ways to capture business knowledge and protect it is essential in every organization, whether small business or large enterprise.

Small businesses are often centered on an owner who started the operation, and who just knows how things are done.  The primary goal in this situation is to capture that knowledge and turn it into process.   Only through this approach may a business begin to reduce its reliance upon a single individual, a critical step in creating both sustainability and continuity in the business. In larger enterprises, process and structure are essential to keep the various parts and participants moving in the same general direction and toward the common goal.

Once those processes are established, generally using technology to support or facilitate them, is that the end of the task? 

Many businesses believe that establishing software-supported workflows and standard processes is sufficient to keep the company operating. If a major system or technology failure occurs, workers are left standing around unable to get their jobs done.  In the worst cases, there isn’t anyone in the business who really understands how to pull things back together or there is no longer access to electronically stored information necessary to continue operations. 

How would you handle things if your systems – your computers and software and systems – were no longer available to you?

While GPS and autopilot systems can bring tremendous efficiencies to the process of flying, they also can give a false sense of security that encourages complacency. If something goes wrong, the autopilot will adjust and the computer will tell you where to go, won’t it?

Here is where technology has the ability to distract pilots–and entrepreneurs–from asking themselves if they’re both focused on and capable of solving the right problems. inc.com

Every business must consider how they would address a severe information technology outage and should take steps to protect and preserve business knowledge so that there is some hope of recovery from such an event. 

Mendelson Consulting and the Noobeh cloud services teams help businesses implement efficient workflows, consistent and effective processes, and technology to secure, support and maintain operational readiness. No matter how redundant the tech is or how thorough the planning is, there is always a possibility of an outage. Owners and managers should understand how to continue operations and handle business in the event the technology fails unexpectedly.

jm bunny feetMake Sense?

J

Software and the Business Lifecycle

Every year, roughly 4.5 million US small businesses are started. The fuel which drives the American economy, small businesses account for more than 99% of all businesses in the US. And job creation happens in small business, which means growth also happens here. Growth happens at every stage of a business if the business is moving forward. From just starting out to achieving large enterprise status, the lifecycle of a business carries with it a multitude of learning moments.

As businesses implement solutions to manage accounting and operational needs, there is often less consideration for the agility of the solution to meet changing and expanding business needs than there is for affordability and the immediacy of the implementation. Small business owners frequently adopt solutions because they fit the needs now, not understanding what may happen when the business outgrows the solution. Sometimes a product meets the functionality requirements quite nicely yet can’t handle the increasing volume. These are among the issues facing growing businesses and forcing stakeholders to make more buying decisions regarding the software supporting the operation.

Each stage of a business where functional or process requirements change drives to another software buying decision. This buying decision is most often met with angst, as considerations include not only cost, but data conversion vs re-loading, new process or system design and setup, user training, proofing the system (running parallel?) and a host of other issues, not the least of which is the business benefit to be derived.

If information is power, too many businesses are losing that power when they migrate from one software product to another.

Businesses often lose valuable historical information by leaving transactional and other detail data behind when they change from one business software system to another.  This should be an area of focus and key discussion point when any change to systems is considered.  After all, the insight and business intelligence gathered over the years was likely instrumental in helping the small business grow to become a successful big business and will continue to be important for years to come.

Maximizing a return on investment is crucial with any business expenditure, whether it is in people, processes or systems.

The selection of software to support the operation plays a most important role in finding that value return, as the software is what empowers the people, guides the processes and drives the systems’ foundation. Knowing the crucial positioning of the software selection in supporting business growth and recognizing that future changes may risk loss of valuable business intelligence, the importance of the initial selection becomes that much greater.

Mendelson Consulting will help you review your business and processes, building an understanding of what functionality needs to be supported and how the business intends to operate. For businesses looking to take the next step, we help identify where automation can improve efficiency and productivity. With that understanding, we help business owners and stakeholders navigate through the overwhelming landscape of solutions and approaches to find the right one for your business.

At every step and stage of business growth, Mendelson Consulting looks ahead to what’s next, helping our clients plan for the future.

While we don’t have a crystal ball, our experience coupled with industry and product knowledge allows us to make recommendations which minimize loss of valuable business intelligence while maximizing the ROI of the software which it informs.

jm bunny feetMake Sense?

J

Cybersecurity and Small Business

Small businesses face many challenges as they grow and expand, and chief among them is the growing threat of cyber-attack. As the company grows, its value to cybercriminals grows, too. Implementing comprehensive cybersecurity measures is essential to maintaining customer trust and safeguarding important business data against these threats.

There is a belief among small business owners that their operations are too small or insignificant to be attractive targets for cybercriminals. Cybercriminals, on the other hand, more often view small businesses as easy targets. Why is this? Largely because the bad guys know that the smaller companies aren’t spending on cybersecurity services and tools and aren’t always keeping their workers informed about ways they can participate in keeping things safe.

To help protect the business from cybersecurity threats, it is crucial to invest in some key security measures. Longer and more complex passwords, regular software patching and updating, and periodic training for employees on how to identify phishing attempts and what to do with suspicious emails is a good start. Cybersecurity efforts should scale with the business, and this requires strategic planning that is aligned with the goals and objectives of the business.

The best cybersecurity approaches are built on a secure foundation, and this is what helps to support business growth and expansion. For every business, there are four cornerstones of a solid cybersecurity foundation.

  • Identifying potential cyber threats and understanding the business risk they represent.
  • Enforcing strong password protection and role-based access controls.
  • Following best practices in cybersecurity.
  • Managing documentation and vital business information securely.

Cybercriminals know that smaller businesses generally have limited cybersecurity resources, making small businesses prime targets for phishing and malware. What is the potential impact of falling for a phishing email, or what happens if there is a ransomware attack? Each type of threat carries different levels of risk, and growing businesses should be aware of the potential financial, legal and reputational impacts when evaluating their approach.

Businesses can help their users become part of the cybersecurity plan by regularly training them on phishing methods and ways to avoid ransomware or malware. When users know more about emerging threats and how to recognize and report suspicious things, they become valuable assets in the improvement of cybersecurity of the business.

The first line of defense in cybersecurity is the username/password challenge. Many systems today use an email address as the username or user ID, which means it really isn’t much of a challenge to guess. This leaves it to the password to keep the account secure, so a strong and unique password is necessary.

Making another challenge to the authentication adds another layer of protection to the account. Referred to as 2FA or MFA (two-factor authentication or multi-factor authentication), users may be required to respond to an in-app message, provide a code received via SMS or other, or provide a code from an authenticating application to satisfy the login requirements. This additional challenge to the user identity makes it harder for cybercriminals to gain unauthorized access.

Ensuring the protection of sensitive business information requires controlling what users have access to once they are in the system. If someone were to gain unauthorized access, having appropriate role-based access controls in place would limit their ability to get sensitive data. This is often another area of vulnerability for smaller businesses that don’t implement strict document controls or structures, opting instead for an open self-service model that leaves data available to whomever can get logged in.

With businesses changing frequently, it is important to not just create a framework to limit user access, but to keep user and role-based access reviewed and updated regularly. Software and systems also need to be updated regularly. Known software vulnerabilities should be patched and security updates installed on devices, and policies enforcing updates and antivirus/malware detection should be implemented.

We understand that businesses must enhance their cybersecurity strategies to combat the growing number and type of cyber threats, and it can be challenging just figuring out what to do first. Working with a variety of technologies and specialists, we can help secure your digital environment and keep you better-protected from the bad guys.

jm bunny feetMake Sense?

J

Prey or Empowered? Small Businesses and IT Security

Now more than ever, small businesses need to be vigilant with their information technology security. Small businesses may not be the big fish in the sea, but there are plenty of them out there to catch. Small businesses tend to make the best targets because they often fail to perform security audits, they may not be willing to invest in the resources needed to protect themselves, and they frequently don’t even carry the right insurance coverages. To hackers, small businesses are easy prey.

“Don’t think you are too small to be affected,” says Erik Knight, the founder and CEO of SimpleWAN. “Every place you have an employee or office is a potential entry point. Take it seriously; if you have something worth taking, a hacker will try to take it.”

https://www.forbes.com/…

There are a few things every business can do to improve the security and privacy of their data. It isn’t an option any longer; these are essential elements in an overall security strategy that can make the difference between staying in business and not.

Use strong passwords, not easy-to-guess words, phrases or sequences (1234 is not a strong password). Passwords should be unique, more than 8 characters in length, and have a mix of numbers, letters, and special characters.

Keep software updated. Whether it is the operating system on your computer or the software you use to write letters, having up-to-date software matters. Developers don’t just upgrade software to fix bugs or introduce new features; software often gets updated because of security issues or vulnerabilities.

Keep networks and connected devices secure to make sure that the computers and connections aren’t introducing weaknesses into your system. Not only are password controls and software updates needed, but firewall security and good anti-virus/anti-malware solutions are also a must. Keeping an eye on the server matters, but the connecting points and end points are where many vulnerabilities exist.

Set up two-factor or multi-factor authentication to further secure logins. 2FA and MFA is like having ID besides just your driver’s license to prove you are who you say you are. Your password, like your DL, is just one factor; you need one more thing to prove your identity for 2FA, like a code from your phone or maybe your fingerprint. The point is that there should be more than just a username and password to access important data.

Restrict use of personal email or social media on work devices. This gets a little trickier with smaller businesses, as many don’t or can’t support providing users with all company-owned devices. There are tradeoffs to allowing users to bring their own devices (byod) versus using company-owned devices. When mobile devices are part of the mix along with desktop and portable computers, it becomes even more complicated and the risk potential increases.

Use encryption for data in transit and data at rest. Encryption is like scrambling the data and then unscrambling it when you access it. In transit, data may be encrypted by a VPN so that it is protected over the wire (in motion) as it is sent and received on the network. RDP is also encrypted, but this remote access method’s main purpose is to keep the data from leaving the server in the first place. At rest, like when it is sitting on a hard drive or other storage location, data can also be encrypted. To open the file or file system, you need a key to decrypt it.

Keep all data backed up and create a way to rapidly recover your server and systems in the event of failure or compromise. Backups are great right up until you find they are as damaged or unrecoverable as your main system, so make sure to have a policy of testing your backups periodically. There are many ways to back up and protect your data, including external drives and cloud storage. If data gets lost or corrupted, you want to be able to restore it from a backup. Regularly audit your backup and data security practices to help identify weaknesses that make the business vulnerable.

Educating employees on the importance of cyber security is among the most important steps a business can take to protect itself. Keeping passwords secure and secret, knowing how to spot a phishing email and what to do and not do with it, not clicking on suspicious links in emails, not sharing personal or confidential information online, and what to do in the event of a breach are all things that should be regularly discussed with workers and supported by written policies.

Managed Azure cloud servers from Noobeh help you keep your business information more secure. Our services demand high levels of security and privacy, and we help our customers keep their data and systems safer and more secure by handling some of the requirements for them.

  1. Strong password policies and MFA is our standard setup, and software updates and patching are part of the service.
  2. Working on the cloud server keeps data on the server and not traversing the network or downloading to individual PCs, so information stays secure and separate from whatever a user runs on their local devices.
  3. Data on the Azure virtual machines is encrypted at rest, and additional encryption is available to add more layers of protection. Data in motion is encrypted, but very little data actually traverses the wire.
  4. Servers and data are backed up regularly with snapshots and file level backups, allowing for simple file restores as well as comprehensive system recovery.

For small businesses, Noobeh has the solution for creating a more secure and better protected IT environment where applications and data can be available to those who need them without compromising the investments already made in training and process development. Moving software and data to a private cloud server allows companies to continue using the software they rely on, just in a better way. Instead of being easy prey to hackers, our customers benefit from higher levels of IT administration, management and protection that empowers them to work the way they need to – any time, anywhere.

jm bunny feetMake Sense?

J

Preparing Your Business for Exploding Growth

Preparing for exploding growth in a business requires careful planning and strategic decision-making. To develop the information necessary to support these activities, businesses must implement their processes and systems to properly collect the data required. Unfortunately, many organizations fail to develop the systems which will support increased activity and business growth, only recognizing after the fact that the process support and the data they need isn’t there. To prevent being caught off guard with more business demand and not enough organization to support it, follow these recommendations to set the business up for success over the long run.

Set clear goals and adjust as required. You need to know what the business purpose is… the objective you hope to achieve with all this activity. Establish SMART goals – specific, measurable, achievable, relevant, and time-bound. With a set of smart goals and a well-defined objective, the business has a clear direction and a guide to assist in decision-making.

Build infrastructure that is scalable. If the business infrastructure can’t handle increased demand, the business can’t grow effectively. Scalable information technology and software systems, robust production capabilities with adequate human resource availability, and increased efficiency in supply chains will help the business meet increasing demand, while improved reporting and business intelligence helps to anticipate potential bottlenecks, allowing for plans to be developed to address them.

Make sure finance and accounting are set for growth. Strengthen overall financial management and review your financial processes to ensure they can accommodate growth. Implementing the right systems and software is necessary to not just optimize production and operations, but to provide a foundation for establishing sound accounting and financial practices which will help the business secure funding and manage cash flow effectively. A good way to evaluate your preparedness for growth is to prepare financial forecasts and stress tests to gauge your business’s financial resilience under various growth scenarios.

Streamline operations and automate where it makes sense. Evaluation of businesses processes is an ongoing task if your business is to continuously work to improve efficiency and effectiveness. Where opportunities for optimization and improvement exist, consider using automation and technology solutions to help streamline operations and reduce manual effort while remaining focused on enhancing customer experience and satisfaction through streamlined processes and improved service delivery.

Plan for Risk and Contingencies. You should try to identify potential risks and challenges associated with rapid growth, such as increased competition, supply chain disruptions, or changes in customer preferences. Develop contingency plans to mitigate these risks and ensure continuity of the business and operation. It may even make sense to consider diversifying your revenue streams to reduce dependency on a single market or product.

Monitor, adjust and adapt as needed. Key performance indicators (KPIs) should be regularly monitored, as should market trends, to stay informed about your business’s progress and to stay on top of industry developments. Use data analytics and reporting tools to gain insights and make data-driven decisions instead of operating on emotion. The business that plans for growth must remain agile and adaptable, adjusting strategies and operations as needed to accommodate changes in demand as they occur.

Preparation for rapid growth requires a proactive approach and continuous evaluation of your business’s readiness. Regularly reassess your strategies, make necessary adjustments, and stay focused on delivering value to customers as you scale.

Mendelson Consulting and the Noobeh cloud services teams are advisors and consultants with expertise in scaling businesses, and can provide valuable insights, guidance, and support throughout the growth process and beyond.

jm bunny feetMake Sense?

J