We anticipate and solve problems before they arise. Our tailored Managed Services give you peace of mind so you can focus on your business.

We anticipate and solve problems before they arise. Our tailored Managed Services give you peace of mind so you can focus on your business.

Our MDL Technology help desk is staffed Monday-Friday, 8 AM to 5 PM CST with techs ready to handle all your computer problems. And, if it’s after business hours, call    816 781-3006, we are always available to serve you.

Our MDL Technology help desk is staffed Monday-Friday, 8 AM to 5 PM CST with techs ready to handle all your computer problems. And, if it’s after business hours, call 816 781-3006, we are always available to serve you.

Trial Microsoft CRM for 30 days for FREE! Did you know that Microsoft CRM enables businesses to help grow sales, manage marketing and care for customers, all in one convenient location? Click the Free 30-Day Trial button to learn more...

Trial Microsoft CRM for 30 days for FREE! Did you know that Microsoft CRM enables businesses to help grow sales, manage marketing and care for customers, all in one convenient location? Click the Free 30-Day Trial button to learn more...

Ebola Virus Could Be Coming To Your Inbox

You’ve probably heard about a fair share of viruses that could infect your computer just from clicking a link in your email – from sweepstakes scams to fake password reset links from online shopping sites. Now there’s even more reason to be mindful of the emails you open and links you click: an Ebola hack could be lurking in your inbox.

Ebola Could Infect Your ComputerPhoto credit: NIAID / Foter / CC BY

According to The International Business Times, a new strain of malware is being distributed by hackers in the form of an email from the World Health Organization, WHO. The email is being sent with headlines like “Ebola Survival Guide” and “Health Alert: Ebola is Spreading.” If you open the email, hackers can easily take control of your computer.

The International Business Times points out the emails do not actually have any tips on avoiding Ebola, a disease which has killed and infected many people in West Africa and a few people in the United States. Instead of tips, emails allegedly from the WHO contain a DarkComet Remote Access Trojan (RAT) virus. The virus can elude your computer’s antivirus software and can take control of your files, webcam, passwords and other information.

This is the latest in the trend of hackers using high-visibility events to try to infect your computer. Hackers have also targeted email inboxes recently using headlines associated with the crash of Malaysian Airlines flight 370 and the fighting going on between Ukraine and Russia.

The best way to avoid malware and other viruses is to be aware of emails you are opening. If you aren’t familiar with the sender, don’t open the email, and if you think a link looks suspicious, don’t click on it and delete the email.

Celebrities: How They Can Attack Your Computer With Viruses

Celebrities Associated with Viruses
Photo credit:
Don Hankins / Foter / CC BY

The next time you search for your favorite celebrity online, you might want to think twice before clicking a link from a site you aren’t familiar with. That’s because some celebrities are more likely than others to link you to a website with spyware, malware or other viruses.

According to McAfee, Jimmy Kimmel is the most dangerous celebrity to search for online. McAfee said Kimmel has a 19 percent chance of sending your computer to a site that could cause harm. Cyber-criminals use malware and spyware in an attempt to steal your personal information and passwords. Since celebrities are very popular searches online, cyber-criminals target the most popular celebrities to raise their chances of stealing your information.

Dangerous Celebrities on the Web
Jimmy Kimmel
Photo credit: kwc / Foter / CC BY-SA

McAfee lists Bruce Springsteen, Chelsea Handler and Jon Bon Jovi as other dangerous celebrities to search for. And if you’re searching the web in the UK, McAfee wants you to watch out for threats from Cheryl Cole, David Beckham and One Direction band members.

So should you stop clicking on links related to “dangerous” celebrities? No, but there are ways to keep your computer and mobile devices safe. McAfee offers the following advice:

  • Beware of clicking on third party links
  • Use web protection
  • Don’t download videos from sites you don’t know
  • Watch out for “free downloads” – they are the most virus-prone
  • Always use password protection
  • Don’t “log-in” to third party sites – it’s a common form of phishing
  • Utilize a program like Site Advisor when searching online

There’s no reason to be afraid of searching for the celebrities listed above, but you should use caution when visiting sites new to you or that you aren’t familiar with.

Keeping Data Out Of Hackers’ Hands

flipboard-2

Photo credit: Johan Larsson / Foter/ Creative Commons Attribution 2.0 Generic (CC BY 2.0)

Recently, Russian hackers made off with 1.2 billion username/password combinations and over 500 million email addresses, in what the New York Times says is “the largest known collection of stolen Internet credentials.”

Here are a few simple but effective steps Forbes has shared that should be taken to protect yourself from hackers.

-Wi-Fi hotspots should be used with caution. The free Wi-Fi in your hotel lobby or the downtown coffee shop is never going to be secure, even if you have to ask for the password. Being free to the public makes them targets.

-Use a VPN, virtual private network, when going online. When you connect to a network, the internet and your computer communicate directly. This communication is not encrypted and anyone logging that traffic can see what you’re doing. A VPN interrupts this communication and encrypts the communication between it and your computer.

-Change all passwords when you think you may be at risk, and do not use the same password or username across multiple sites.

Securing Mobile Device Data

Image courtesy of adamr at freedigitalphotos.net.

Image courtesy of adamr at freedigitalphotos.net.

Between smartphones, laptops, USB drives and tablets, your data and personal information is often spread across multiple devices. This could put your privacy and company data at high risk.

While mobile devices can store large amounts of data, they are often unprotected. They are also easy to lose or steal.

According to CSOonline, mobile devices are just as much at risk as a PC and mobile operating systems like iOS and Android are targets. They recommend having anti-malware software installed and frequently updated on any device that is used to access the internet, or used for work.

Mark Dryer, CEO of MDL Technologies, reminds mobile users that it is essential to use passwords for laptops and mobile storage devices that contain sensitive data in order to prevent them from being accessed in the event that they are lost or stolen. Dryer also highly suggests that any and all emails containing sensitive data be encrypted.

A frequent mistake made by users is having the same password across all accounts, if a hacker cracks one account they now can access them all. Each account should have their own. The New York Times recommends using a password manager like Password Safe or LastPass to create stronger passwords. These sites make a password for each website you need and store them in a database that is then protected by a master password.

CRM: How it Can Increase Your Sales

Image courtesy of tiramisustudio

Image courtesy of tiramisustudio

Client Relationship Management, or CRM, can be extremely valuable. According the Forbes, a recent study found that companies with a fully utilized CRM system increased sales by 29% and sales productivity by 34%.

“CRM is a customer focused business strategy designed to optimise revenue, profit and customer satisfaction,” explains Jason Nash, product marketing manager for Microsoft CRM UK. “The more you understand your customers, the easier it is to target new prospects and boost sales. CRM simply manages critical customer information, like history, preferences, social media presence, past interactions, past sales, etc. and stores it all in one, easy-to-use interface.

It can also provide notifications and reminders for important contacts. The system can be used every day and in real time. CRM will also monitor the steps your team is taking and keep your sales manager in the know. It can track each stage a deal is in and allows the sales manager to see the entire process.

Overall CRM enables your sales team to build stronger relationships with customers while being more efficient. More information can be found here.

PF Chang’s is Latest Victim of Data Breach

140804112023-pf-changs-620xa

Data breaches have affected several major U.S. corporations recently, Target Corp., Michaels Stores Inc., Sally Beauty Holding Inc. and Neiman Marcus to name a few. PF Chang’s China Bistro Inc. can now be added to the list. The restaurant chain, based in Scottsdale, Arizona, has provided a list of 33 locations where credit and debit cards used may have had information stolen. The potentially stolen data includes the card number and possibly the cardholders name and/or the card’s expiration date.

Mark Dryer, CEO of MDL Technology, an IT and managed services firm in Kansas City, said that companies need to make sure they are maintaining and updating their security policies frequently. “Policies need to be reviewed on a regular basis. The exact time frame depends on what kind of IT infrastructure is in place, the expertise level of in-house and external consultants, the pace of changes in network, server platforms, applications configuration and implementation of new technologies and whether the business can bear the cost of revision process,” he said.

Find more information and a complete list of locations affected today.

MDL Press Release Published on YahooFinance

MDL Technology, LLC issued a press release this week about their case study with the The Raytown Police Department regarding data security. The press release was published on YahooFinance.

The police department retained the IT firm to virtualize its network infrastructure, implement offsite back-up storage, cut costs and power consumption and allow sensitive data to be securely housed with cloud services.

Captain Doug Goode said they chose MDL for its cloud storage capabilities, knowledgeable technicians, reasonable service packages and the ability to identify the issues and IT needs the Raytown Police Department struggled to fix.

Dryer, explained, “the need for a solid backup solution and an offsite copy of backups is something every customer should be aware of.”

Big Kansas City To Be Hosted At Hangar9 2014

 

Silicon Prairie News is hosting this years Big Kansas City which will be taking place in Hangar9 from October 8-10.

Forbes has declared Big Kansas City as, “one of the top conferences to attend for entrepreneurs.”

It’s a conference where founders, designers, developers, investors and more, converging on the Midwest for a span of two and a half days. While sharing ideas, offering advice, co-creating experiences, and inspiring one another.

Notable speakers include co-founder and co-CEO of Warby Parker, Neil Blumenthal. Warby Parker is a designer eyewear company that sells at revolutionary prices while offering a buy one, give one program helping those in need.

Founder and President of Beespace, a non-profit incubator, Marissa Sackler is another speaker.

Entrepreneurs, innovators, college students, everyone is welcome.

Tickets are still available and can be purchase at bigkansascity.co

 

What You Need To Know About Computer Viruses:

‘Virus’ is a blanket term typically used to reference computer malware. Malware simply stands for malicious software. Viruses and malware usually have two main functions: to spread and do cause damage or theft. They also possess the ability to avoid detection and replicate.

 

Hoax emails that warn about viruses are becoming increasingly popular. According to the University of Cambridge, emails such as these typically ask you to forward the “warning” to as many people as possible. Do not open or forward these, delete them.

A study by toptenreviews revealed that 32% of the worlds computers were affected with some type of malware, of that 57% is viruses. Even more shocking 27 million new strains of malware were developed last year.

It’s becoming increasingly important that your computer have some sort of antivirus or security program. In addition to having software protection on your computer, it’s also highly important that you make smart choices while surfing the web and opening up emails.

MDL Technology Updates Raytown Police Department’s Data Security With Cloud Services

Background

The Raytown Police Department retained MDL Technology, LLC., a Kansas City IT and managed services company, to virtualize the Raytown Police Department’s network infrastructure, implement offsite back-up storage, cut costs and power consumption and allow sensitive data to be securely housed with cloud services.

About The Raytown Police Department

The Raytown Police Department serves and protects over 30,000 Raytown residents within a 10.5-mile area under the supervision of Chief Jim Lynch. The department employs 78 full-time employees that range from uniform officers and detectives, all the way down to communications, detention and records staff. The department is located in the heart of Raytown, Mo., a suburb of Kansas City.

 

 

ROI

  • Upgraded servers and workstations with Trend Micro

  • Implemented remote problem-solving

  • Improved backup retention

  • Streamlined communication to address IT problems immediately

  • Employee downtime reduced

  • Reduced costs for equipment and utilities

  • Cut power consumption

  • Implemented 24/7 virtual monitoring and support

 

Challenges

According to the 2014 Report on the State of Data Backup for SMBs, 62 percent of IT professionals told Carbonite they experienced major disruptions at their organization from data loss and on average a loss of $468, 610 in revenue. In that same study, cloud backup provider Carbonite found that at least 40 percent of companies would either be out of business or in a financial crisis from data loss.

The Raytown Police Department didn’t want to wait for a data crisis to occur and wanted a secure, modern and cost-effective means for storing its records and data that could be implemented within a police department’s budget and schedule.

Mark Dryer, CEO of MDL, said, “Working within the budget and security guidelines for a police environment is not a unique challenge. We are very comfortable assisting customers with finding ways to maintain their network environment while working within their budget. We work with many vendors to ensure our customers are getting the best prices available. The police department is a 24/7 operation, so finding the best time to implement new technology solutions while minimizing downtime is always a challenge. We scheduled the upgrades during weekends and after hours.”

How Raytown Police Department Found MDL

Captain Doug Goode chose MDL for its cloud storage capabilities, knowledgeable technicians, reasonable service packages and the ability to identify the issues and IT needs the Raytown Police Department struggled to fix.

According to Goode, “We have found MDL to be extremely customer oriented. The company’s technicians are very knowledgeable and both willing and able to do additional research when needed or requested. They are reliable, easily approachable, willing to discuss projects and advise on the feasibility and viability of new products and services. MDL has developed a strong trust with our department. It has an unblemished track record of satisfaction and customer service.”

Proving Strategy and Success

The police department hired MDL to update and organize its antiquated data storage systems. By implementing an RSA SecureID two-factor authentication solution and upgrading storage from a fiber channel SAN to an ISCSI SAN, MDL was able to maintain its compliance within security guidelines and share storage between virtual hosts to reduce costs.

Dryer explained that Raytown’s IT situation was not unlike many other government agencies. “The need for a solid backup solution and an offsite copy of backups is something every customer should be aware of,” he said. “Virtualizing network infrastructure doesn’t fit every network environment, but we have seen many customers benefit from this solution. Security solutions are largely dependent on the type of businesses, the sensitive nature of data and budgetary constraints. VPN access is controlled through dual layer authentication. Any problem or perceived problem is addressed immediately.”

About MDL

MDL Technology is a Kansas City IT company that specializes in worry-free computer support by providing solutions for around-the-clock network monitoring, hosting, data recovery and off-site backup security. For 11 years, MDL has partnered with companies to design, build and install network systems to fit the needs of its organization. Associates are trained by MDL’s teams to maintain a smoothly running network for their companies.

(www.mdltechnology.com)