Posts Tagged ‘IT’

It’s Lonely At The Top …

Tuesday, August 23rd, 2016

A Business Advisory Board Can Help

Small Business Advisory Board | Ohio CPA Firm

Excellent leaders seek out excellent advisors and the best advisors for your business are those who fill knowledge gaps within your company. They will also not be afraid to share their opinions and offer differing perspectives. You may not always like what they have to say, but you will be a better leader for hearing it.

It’s not uncommon for small business owners or CEO’s to feel like there is no one they can turn for help, advice or validation.

Fortunately, a business advisory board can help. Business leaders who consult an advisory board not only gain camaraderie, they gain ready access to experts in a variety of fields, such as marketing, sales, financing, and others. Not to mention a valuable multi-perspective approach to your day-to-day managerial duties.

Read Also: 5 Best Practices For Taking Your Business To The Next Level

Business Success Is A Team Effort

Not ready to commit to utilizing a business advisory board in all aspects of your business? That’s fine. Start small instead. Many successful boards are originally formed with a very specific goal in mind – such as the implementation of a new strategic plan.

And you don’t always have to look exclusively outside of your business for help. Consider tapping members of your management team for specific organizational reports. Each advisory board meeting could begin with members of your management team providing updates on assigned areas, such as finances, operations/production, human resources, IT, and sales & marketing. This portion of the meeting will ensure that everybody is on the same page and will encourage your management team to buy into the advisory process. Later in your meeting, set aside time to speak confidentially with your advisory team. Doing so will provide everyone with the opportunity to speak candidly.

Say ‘No’ To ‘Yes-Men’

If you don’t trust the members of your advisory board, the initiative will not be effective. You need to go into advisory board meetings ready and willing to share sensitive information about the business, as well as personal information about yourself. If you don’t trust your board, you are unlikely to tell them everything they need to know to provide you with the best advice possible. Your board should consist of the following experts:

  • An attorney
  • An accountant
  • A banker
  • Experts in Marketing, HR and/or IT
  • Other successful entrepreneurs from other industries
  • Potential customers

Optimally, you should try to keep the group small and close-knit. More than six advisors on your board are not recommended as the productivity of the team is likely to take a hit.

Know Your Limitations

Excellent leaders seek out excellent advisors and the best advisors for your business are those who fill knowledge gaps within your company. They will also not be afraid to share their opinions and offer differing perspectives. You may not always like what they have to say, but you will be a better leader for hearing it. You can’t do everything and you can’t be an expert on every topic or every issue that comes across your desk. But an advisory team will help you get there.

Set Expectations

Even though advisory boards are more informal than boards of directors, it’s important to set expectations and ground rules on any time expectations, responsibilities and duration of service. Consider a written document outlining your board’s responsibilities and logistics, such as meeting frequency, expected time commitment and compensation, if any. Quarterly meetings as a group with individual meetings as needs arise is a good framework.

Remember, your business advisory board does not have authority to make business decisions; it will offer advice that you can either take or dismiss. Speak frankly about your business goals are and explain that you don’t expect them to take on an active management role or assume any liability for your company or for the advice they offer. Providing written indemnification for each participant is appropriate.

The advisory board experience should be interesting and beneficial for all involved. Being on your board will expose members to new ideas and perspectives, and also offers mentoring, networking and social opportunities that make the experience worthwhile. At the very least, you should cover any expenses members incur to attend meetings, and provide meals when you get together. You could also consider a per-meeting fee that might range from a few hundred to a few thousand dollars, depending on commitment.

Email Rea & Associates to learn more ways a business advisory board can help you become a better business leader.

By Chris Roush, CPA (Millersburg office)

Are you looking for more insight into the effectiveness of a business advisory board? Check out these articles.

Getting By With A Little Help From Your Friends

Why It’s Important To Have A Good Banker As Part Of Your Business Advisory Team

This Is An Intervention – Step Away From Your Business

Share Button

Malware Threat Spreads To Smart Phones

Wednesday, September 16th, 2015
Malware Goes Mobile  Ohio CPA Firm

According to the digital media analytics company comScore, between the months of December and March 2015, more than 187.5 million people in the U.S. owned smartphones. During that time, Google Android led the pack as the number one smartphone platform with 52.4 percent platform market share. In other words … that’s a lot of potential LockerPIN victims.

Would You Pay A Hacker’s Ransom If Your Phone’s Data Was At Risk?

Researchers and IT security experts from ESET, a global IT security company, recently announced that they had discovered a malware application that is designed to encrypt files and change PINs on Android devices in the United States. In return, victims are demanded to pay up to the tune of $500. Only then will hackers provide users with the recover key.

If it continues to spread, this form of malware could result in a staggering number of victims. Once again we are reminded of how important it is to vigilantly protect ourselves against fraudsters who will continue to exploit such weaknesses in our technological infrastructure.

According to the digital media analytics company comScore, between the months of December and March 2015, more than 187.5 million people in the U.S. owned smartphones. During that time, Google Android led the pack as the number one smartphone platform with 52.4 percent platform market share.

Read Also: Could Your Company Be Ransomeware’s Next Victim?

Malware Goes Mobile

The malware, called LockerPIN, spreads via third party applications, which are downloaded by the user to their Android device. Similar to the CryptoLocker and CryptoWall malware that has inundated users over the past several years, LockerPIN spreads malware’s reach to the mobile user.

Originally discovered in Ukraine in 2014 the malware has been modified to the point that it is just now making its North American debut. Disguised as a system update, the application changes the user’s PIN to a random setting without their knowledge. The worse part? The only known recovery solution is to perform a complete factory reset, which will result in the loss of all your data.

Fair Warning

It’s only a matter of time before this malware progresses to the point of being able to infect all phones. In the meantime, there are actions you can take to protect yourself.

1)     Never download apps outside of certified app stores.

2)     Back up your mobile devices to your computer or to the cloud regularly.

3)     Do not grant administrator privileges to apps unless you truly trust them.

4)     Stay away from suspicious apps and sites.

By Joe Welker, CISA (New Philadelphia office)

Want to learn more ways to protect yourself and your business from IT threats? Check out these articles.

Who Is That Email Really From? Red Flags To Be Aware Of When Opening Your Email

Who’s Fishing For Your Data Today?

Could A Cyber-Attack Cripple Your Business In 2015?

 

 

 

Share Button

How Can Heartbleed Affect You and Your Business’s Online Identity?

Friday, April 11th, 2014

The Internet is a powerful tool – something that can make our lives (and businesses) easier. But it also can be our worst nightmare at times. If you keep up on the news, you may recall within the past few days hearing something about “Heartbleed.” No, this isn’t the name of a new rock-n-roll band. It’s the latest threat to your security on the Internet. News sites started reporting on this newest Internet threat earlier this week. But as more and more has become known about this Internet defect, it’s becoming clear that everyone with an online identity needs to be concerned about it.

Heartbleed is an exploit that basically allows malicious users to run a tool that will gain them access to a Web server and provide them with usernames and password from that server. What can this defect potentially affect? Every website on the Internet. Bank websites, social media sites, online merchant sites … the list goes on.

Within the past couple days, a Heartbleed defect was discovered that allows hackers to access chunks of a server’s memory that could contain Personally Identifiable Information (PII). Sites that integrate a Secure-Socket Layer (SSL) encryption certificate are now at risk of this new defect.

Steps For Protecting Your Online Identity

So what should you do to protect you and your business from this risk? Follow these steps:

  1. Take inventory of all of your online accounts and make a list of your accounts.
  2. Before changing your online passwords, contact the businesses of any accounts that may have SSL certificates to ensure that the company has issued new certificates. To check the “grade” of an SSL-secured site, you can visit Qualys SSL Labs website and input the URL of the site you’re checking. Sites are graded (A through F) on how secure they actual are.
  3. Change your passwords for each of your online accounts.
  4. Clear your Web browsers’ cache, cookies and history. Check out this ZDNet article for step-by-step instructions on how to do this.
  5. Closely monitor your bank and credit card statements to make sure there’s no unusual or suspect activity.
  6. If you receive emails or other online communication that promises a solution to your Heartbleed woes, don’t buy it. These communications are more than likely spam connected to dangerous malware or pointing you to malware. Heartbleed is a very complex online security threat, and there’s not a simple, quick fix for it.

Need Advice On Protecting Your Online Identity?

Following the steps outlined above will hopefully help lessen your chances of becoming a victim of identity theft and fraud. If you have questions or need additional guidance on how to protect your business, contact our IT audit professionals at Rea & Associates.

Author: Joe Welker, CISA (New Philadelphia office)

 

Looking for other blog posts about protecting your business’s online identity? Check these posts out:

Do You Know Who Has Access To Your IT Network?

How Can I Protect My Business From A Data Security Breach?

How Can You Prepare For The Retirement of Microsoft Windows XP?

 

Share Button

Why Should You Upgrade Your Business’s Windows XP Software?

Thursday, September 5th, 2013

If you missed it… you should know that Microsoft recently announced that effective April 8, 2014, it will no longer release any security patches or extend support for its Windows XP operating system. You may be thinking, “So what?” Well, if your organization is running its IT systems on Windows XP, your organization could open itself up to security issues. Furthermore, if your organization is in the healthcare industry and using Windows XP, it could be held liable and found non-compliant with Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health (HITECH) laws.  (more…)

Share Button