Thursday, August 13, 2009

Security in the Air...


With the new trend on internet on airplanes, I am presented with a new question.

Is airplane wireless any different than coffee shop or or other public hotspots or cell carrier wireless?

Of course, that goes on top of these other questions I already had. What do you tell your clients about their security concerns when accessing internet access while on the road or a business trip? Should clients be using those "privacy screens" on their laptops? Does wifi devices have any additional concerns?

These are all questions that I have asked myself about lately. Right now, at this very moment, I am for the first time using internet on a Delta flight. I find that the questions are even more insistent as I type this from my seat at 28C.

Now, I know that it seems that I have an answer for everything. But I do not. I post those things were I have reached a conclusion based on my long experience in the field as both technician and business advisor. But for this, I do not have answers.

Now, don't get me wrong. I have some ideas, but they are not as polished as I would like, and the final conclusions are still in a state of flux. Of course, shield your laptop screen if possible, but do we push this with our clients, especially if they are using a business laptop for recreation on vacation? Do we get them to use those little wireless routers or the new hotspot devices from Verizon and Sprint? Do we advise them to not use the free Wifi at the airports because nefarious people put up hotspots cloning the same SSID as the airports wifi? (True story, that does happen and I have seen it!)

There is help on the way! I am excited about the new multi policy firewall inside Windows 7 that will allow multiple network connects at once with a different policy for each. Paul Cook writes about how it will help to enable the mobile workforce.

Lots of questions and I am still looking for my final answers on this.

Sunday, August 09, 2009

Justifying the Cost of Security...


Security is always a balance between available money and potential for threats.

Ever been in that situation with a client were they NEED some righteous security upgrades, but you haven't figured out how to get them to pay for it?

Yep, if you have been in business any amount of time, you can say "YES" to that statement. I have often been there and have tried different methods to get the client to do the right thing. So, here are my thoughts on how best to do this.

  • FIRST, decide if this is a keeper client. If they fight you on every upgrade that you advise, then disengage with them. This becomes the item you can use to "request" the client become serious. Let them know that, if they do not "get with the program", you will have to refer them to another tech firm.


  • SECOND, Do not result to lists of feature sets. Most smaller clients (50 desktops and under) could care less. They do want to know that this will help them be compliant, and that you truly believe it is best for them, but they do not want to understand the plumbing.


  • THIRD, Use your Trusted Advisor status. If you have done well with the client, then you will have it. If they see your confidence in the security solutions, and they have confidence in you, then they will buy in emotionally.


  • FOURTH, Relate to them that this is STANDARD security, and that you are not selling them anything exotic. Let them know that you require this level of security in your clients because it will save the network from disruption and downtime. This means better ROI from their investment in personnel and capital.


  • FIFTH, Explain the possible consequences of not doing it. While Amy Babinchak of Harbor Computer Services makes a very good point about the dangers of using FUD (Fear, Uncertainty, and Doubt) to sell, the client still needs to be focused on the problem to solve. If no evident risk, no need for solution. Use examples of botnets, etc to focus the client on the fact that a solution is needed. Preventive in nature, but still needed.


  • SIXTH, Sell them on the fact that this is a duty to their clients to keep their client data as secure as possible. You can also relate the legally mandated (in some states) cost of having to inform their clients of security breaches.


  • SEVENTH, Help them find some way to pay for it. Either spread it with financing (such as Microsoft Financing) or leasing or HAAS. Another idea is to use a vendor such as Calyptix that can bill a monthly MSP fee so the client can "pay as they go".


  • So many of our clients are out of balance. Hopefully, this will help you help them get the security that they need.

    Wednesday, July 29, 2009

    No Frankenstein Backup Solutions, Please...


    If you are creating your own backup solutions out of open source software, BEWARE! Unless you are willing to invest in the support staff to really know that software inside and out, don't risk your clients' data (and business survival) on it.

    I was talking to Jim Hunton last night about some things that he is finding at new prospects that will scare the life right out of you. Solutions that were "stitched" together open source programs that had no builtin monitoring or alerting abilities. He and I both agreed that the responsible IT consultant is going to use disaster prevention solutions that have been thoroughly tested, have a support desk with engineers when we need them, and that we can thoroughly train ourselves on.

    Now, I am all for experimentation. If you want to take some Rsync and some SSH and mix it with instructions from some internet forums to produce your own low cost backup solution, then go ahead. Heat the test tubes in your lab and howl at the moon while you do it. Sew a lot with the needle and fishing line, and beat your chest about how smart you are. But don't visit your creation on your clients. Use REAL, PROFESSIONAL, SUPPORTED disaster prevention software, and spend the time LEARNING it.

    Before you pull out the client cost issue, STOP! I don't want to hear it. Cheap is CHEAP. Free is UNSUPPORTED. We are talking about the ULTIMATE protection for your client. Quit being a wimp! Get in there and sell them the good stuff that you know works and you can get support for when the need arises.

    You know, in the end, it turned out bad for Dr. Frankenstein and his creation. Don't let it turn out bad for you and your clients.

    Living Next To The Security Graveyard...


    IT Consultants and Business Clients are both ignoring the gravestones in their networks, when it comes to security.

    When I was a kid in the sixth grade, I lived right next to a graveyard. When I went out to mow the grass (BTW, something I hated), the grave stones were there. When I went to the swing to play, the grave stones were close by. When I looked out the second story windows... well, you know what goes here. When I first moved there, it really bothered me. I got so use to it being close, though, that I successfully learned to ignore it. I only consciencely realized it when a new friend would come over and make a big deal out of it.

    IT Security issues are the same as the graveyard I put up with as a preteen. We may know about security holes at our and our clients networks, but we have lived with them close for so long, that we have learned to ignore them. If someone points out a glaring hole in our security practices, we take notice and might get motivated to do something about it. If the news harps on a new "disaster computer worm aka Conflicker", our clients suddenly check their antivirus definition dates or call us to be reassured that we have it under control. Otherwise, we and they get numb to the fact there are security problems.

    Here are the names on some of the grave stones:
    • EXPIRED ANTIVIRUS - very common, frightfully so. And rather than just renewing what they currently have, review the best of the current suites out there. Get the LATEST security suite (Trend Micro Worry Free is my favorite!).

    • CONSUMER GRADE FIREWALL - Might be OK for protecting your grandmother's pictures, certainly not your customers' client social security numbers. You need a Business Grade firewall with an IPS (Intrustion Prevention System). All Hail Calyptix, here!

    • NON WORKING LOCAL BACKUP - Yes, backup is a security component. Start thinking that way. Get some imaging software if nothing else and store to an external device. Storagecraft is GREAT! And setup some way to verify that backups actually HAPPEN and are RESTORABLE.

    • NO OFFSITE BACKUP - No protection against fire, flood, bad employee or theft, tisk tisk. This should at least be a device you can take offsite, but ideally a complete internet encrypted backup of your server and critical workstation files.

    • NO OR POOR SPAM BLOCKING - As per my earlier post on the human mind, social engineering is getting really crafty. Users are easily tricked into opening email and clicking on links. Block it so they will not have to make the wrong decision! Best if appliance based or third party filtering.

    • POOR PASSWORDS - I know, I know, I feel the pressure from my clients too to let them use weak passwords. Just make sure there are at least letters and numbers and a symbol, and it is at least 8 characters, more if possible. Passphrases are even better.

    • UNSECURE OR OLD STANDARDS WIRELESS - If you are an IT consultant and set up a client with unsecure wireless, SLAP YOURSELF! Get something for your client that is WPA2 and setup it up as WPA2. (And consider making it a 20+ character passphrase.)

    • UNPATCHED OS AND SOFTWARE - Everyday, a piece of software on your computer gets a new "hole" that needs to be filled. The Russian mobsters, script kiddies, Black Hats, Chinese nationalists, etc actively attempt to find and exploit these holes for their own purposes. And it is not just Microsoft software with the holes. Active patch management is a must, whether a duty assigned to a staff member or a duty that a computer consultant does for the client.
    Now, look at your network. Do you see any of these grave stones? Do you see any in your clients' networks? Remember, your client will become numb to these over time. Have a serious talk with them. Clients pick up clues from you as to how serious a security issue is, so stress it. Do the right thing and point the stones out, repeatedly, before the network ends up on a cold, hard slab.

    Friday, July 17, 2009

    Hacking the Weakest Link... The Human


    There is a device in all our networks that is gullible, unpredictable, and lazy. It talks to foreign devices with no firewall between, ignores group policies, and even actively seeks to compromise our security measures. No amount of technology will correct these shortcomings. It's THE HUMAN. And it is amazing easy to hack...

    I ran across a Steve Riley video on Defending Layer 8, about the various different ways social engineering is used to get security related information for company employees. You have to have a TechNet account to go straight to the video, but if you go to the link above, you can get to the video through the Related Videos frame on the right side without logging in. At least I did. He is amazingly entertaining...you won't fall asleep for sure...and informative. He exposes the underbelly about why humans are such easy targets. Some methods of compromise I already knew, but alot were eye opening. One such example is our genuine desire to be helpful. He also explains why we all love Wayne Small so much...Americans automatically (and inexplicably) trust Australians. It sounds weird, but I think he is right. And an astute hacker can use that knowledge (and a fake accent) to advantage. Better watch this one, folks, so you have a better idea how to educate your users on this very subject.

    As to education, what do we do about it? He gives some good examples on what to tell your clients. He also said that it is a workplace education process. Native Intelligence has a presentation that you can give your clients to "raise" their awareness on the different ways they are solicited. The site also has a number of printed and electronic materials that can be used. There are even some free education materials that you can download and print.

    So, what course of action did I get from this? I mean, is it so hopeless that I just throw up my hands and walk away. No. Admittedly, I can never fully secure that part of my networks. But I can reduce the footprint of the problem. I have enough here in the listed resources to start a "drip" campaign, just to raise the awareness of the average user over time. I plan to set up a series of emails that gives several "awareness" bits to my users, and then have them time released so the clients get one every couple of weeks. I do not expect my clients to understand the inner complexities of security, but I do want them to pause and ask "Should I be doing this? Who is this person? Etc."

    Tuesday, July 14, 2009

    What Clients Want...


    I was originally put off by the idea of seeing Mel Gibson in pantyhose, so had not watch the movie that inspired this title. However, it came up in a marketing conversation. I decided I better see the "relationship" to clients, so I watched it tonight. There is definitely a marketing message in there we had better sit up and notice.

    Here is Mel, stuck in the past in his view of the ad world, not understanding the target market that he needs to survive. A lot of arrogance and lack of personality. Then he really gets inside into the "heads" of his target market by "magical" means, figures out what is important to them, and succeeds.

    Imagine that Mel is an tech consultant that thinks he knows best about what the client needs and proceeds to "lecture" the client with his superior view. A little out of touch with the changes in the market. Not really paying attention to what is important to the clients. So... What "magic" turns Mel the IT guy around?

    In the movie, Mel involuntarily finds out what his market wants. In real life, Mel has to exert effort to find out. If you are Mel the IT guy (most of us are), take these steps:
    1. Have a heart to heart talk with yourself, and realize that the word "NEED" is not equal to the word "WANT". If you are competent, you already know the technical needs of your clients. Your attitude toward clients that don't see the importance of your recommendations is that they just don't get it. And you may be right. Since your solutions don't line up with the client's wants, the clients thinks you are asking them to eat broken glass. You have to be able to make the business case from the client's perspective.
    2. Take your clients to lunch and ask them the 5 things they want to solve. Not just the 5 IT things they want to solve, but business challenges they want to solve. You may have an IT solution to a business challenge. Plus, they may start to think of you as a business partner, not just the IT pusher.
    3. After you have talked to a few clients, check your notes and see if you need to develop new services to meet those needs. If the needed solutions are way outside your core competency, find some competent partners that can fill those needs.
    4. Continue to poll your clients as to their satisfaction level on a regular basis. This could be a review meeting, a website survey invitation, or some other way. This lets the clients know that you care how they perceive your service. Keeps listening. And be sure to keep the "What else do you want solved that is not currently being solved" question in the mix every time you do this.

    It all turned out well for Mel the ad man. Will it turn out well for Mel the IT guy? Well Mel, get busy.


    Monday, July 13, 2009

    Attending WPC09...Virtually!



    Microsoft has given us partners a great window into its yearly massive partner conference. Susan Bradley sent out an email today with the links to Digital WPC, the website where "everything" Worldwide Partner Conference will be available over the web. I took time out today to watch the Keynote Videos. Almost 3 hours of powerful stuff with lots of annoucements about overall direction, Office 2010 Desktop and Web Editions (watch out Google Apps), and Windows 7 (watch out Vista and Mac OS). My hat is off to Microsoft for making these resources available. With Silverlight, its almost like being there.

    Wweeelll, its not the same as being in New Orleans. The pushing, shoving, scrambling for seats, sore feet, lots of BEADS, lack of sleep... need I go on? As I hinted in earlier posts, I love conferences. However, WPC is the MOTHER of Conferences. Its size makes it unwieldy, exhausting, and mind boggling. Its like gorging on fine chocolate until you can't stand the sight of it. Yet...I would love to be there. The secret is being selective and not worrying about all the events that you can't make. Maybe next year...

    I know that Frank Vers and Michael Coconower from our local Arizona SMB Users Group made the trek to New Orleans. They will get the full experience. I will only get a piece of it, but I can watch from my couch with my favorite beverage. ;)

    If you want to know where Microsoft is going and how to work alongside them, you better be watching these Keynote Videos.

    Sunday, July 12, 2009

    Behavior Monitoring and Peachtree Issues in Worry Free 6.0...


    Behavior Monitoring is one of those features for watching apps to see if they "stray" from what programs should normally do.

    I had installed TrendMicro Worry Free 6.0 at a client, updating the client from TrendMicro CSM 3.6. The client had no issues running Peachtree 2009 before the upgrade. After I completed the upgrade on the server and the workstations, Peachtree would take a very long time (up to one minute) to open.

    I checked back with the server. Peachtree program directory was excluded. Check. Disabled the Active Scan on the server and workstations and made sure the changes took effect. Still same problem. Hummm. (Rubbed chin) I did remember that Bill Kam said something about Behavior Monitoring having an issue in the initial release of WF 6.0. By default, it would be disabled. Checked the Behavior Monitoring settings. It was on. Still should not cause this type of problem. Disabled Behavior Monitoring on the server and the workstations. Made sure ya-da-da-da-da-da, you know. Peachtree opened quickly. According to the client, the same as before the upgrade. Hummm. (Rubbed chin again)

    Bill Kam is one of those choice people that all vendors should fight over. He had said to email him whenever we had an issue. So, I emailed him about this. He opened a trouble ticket and I got an immediate call from Trend support. Turned out that this issue with Peachtree had just surfaced. They had already created a hotfix to correct the issue inside Worry Free for Peachtree and other programs that had a similar behavior. I declined to apply the patch as it involved extra work (I AM lazy, after all). They bugged me over the next 2 weeks about applying that patch. That is good tech support there. Now, there is no longer a need to apply the hotfix. As of July 6, the hotfix was rolled into the automatic def and program updates.

    Again, I cannot say enough about Bill and the program support he gives us.

    Thursday, July 09, 2009

    Backing Up While Driving...


    Are you so dedicated to backing up that you would do it during your commute? I doubt it. However, our confidence in our tools have advanced to the point that we could.

    This topic comes up because I had another IT consultant handling a problem from one of my clients that was vacationing in California. The consultant was in a pinch for time and started a Shadowprotect image backup before he started driving. The backup continued while he and the laptop were in the car, proceeding to my client. He arrived at the client's condo as I was on the phone with the client, and proudly announced that the backup was at 92%. It finished and he released the laptop to the client.

    After I stopped laughing, I admired Jim's audacity. I found myself contemplating what had just happened, and realized a couple of things. Now, here are a number of observations to go with this little story. PARTNERING :: It is great to have partners in other areas that you can depend on. In this case, my client benefited from the relationships that I have built. Raises my value in the clients eyes as they see me as not being just another computer consultant. CONFERENCES : Conferencing made this possible. I met Jim at 3 different conferences. My conversations with him gave me the confidence to sub this out. Going to a conference will let you meet people like this. Everyone that knows me knows that I really love conferences. Developing solid relationships with other IT consultants is one of the reasons. RELIABLE TOOLS : The reliability of our imaging tools have gone up, to the point that this consultant was willing to start an imaging job and drive to the client with the confidence that it would work. He wasn't worried about showing up at the client with a failure on the laptop screen. While I would not have thought of doing that, I certainly agreed there was no reason that it would have not worked. StorageCraft products are AWESOME!

    So next time you feel that you are wasting driving time, get that much needed laptop backup done! Please start it BEFORE you start the trip. I don't want to run into you unexpectedly. :)

    Tuesday, July 07, 2009

    Best "Visual" Way to Destroy Data Storage?


    Bill from a local recycling center is holding a piece of shredded hard drive. I had a visit with him and his company today. They offer NIST standards drive erasure, shredding, or both for hard drives that come inside the computers they receive. It is all up to the wish of the client delivering the equipment. Their facility is secure with video recording, metal detectors, guards, employee background checks, and restricted entry and egress. Clients can even watch their hard drive be shredded.

    Sorry Bill. While your methods are effective, they just are not spectacular enough for me. Don't get me wrong. Bill and his company are great. But there is room for a "marketing" dimension. I have been asking around for a really effective method that would be "satisfying" to the client. In other words, I would let the client see the drive "done in" in their presence, and they would leave with the confidence that their scrap hard drive will never be read again.

    You may ask why we need to go through all this effort? Statistically, the chances that information will be lifted from a hard drive are quite small. But information is power. And the PCI complaint standards are becoming stricter. Add in that the fact that many of your clients will be subject to HIPAA and SARBANES-OAXLY regulations. If any information is retrieved from a storage device that the client as "disposed of", the client is considered responsible. Clients also desire that "comfort" level from knowing their secrets are NOT sitting in a landfill somewhere, waiting to be picked up. That need for the client to be reassured that there is NO chance the information can be retrieved should be satisfied by you, the guardian of their data. And we all know that a visual is worth a 1000 words. Hence, the reason I am looking for a "visual" destruction for the client to witness.

    So, what method to use? I have had suggestions of rifles, shotguns, C4 (yep, he is crazy that suggested that), hydraulic jacks... Even a garbage disposal. Hum, I think garbage disposals need water to work...that would get messy.

    Please, comment and give me suggestions of your favorite way to "visually dispose" of data storage devices. Have fun with it. LOL

    Saturday, July 04, 2009

    Still Waiting For Independence Day...


    "What are you talking about?!" I can just hear readers asking that. Yes, today is July 4th, American Independence Day. Yes, I am an American, so it is my Independence Day. No, it is not the Independence Day that I am referring to.

    My Independence Day that I am looking forward to is the day that I no longer have to rely on Break/Fix for the revenue to pay my company expenses, my payroll, and my salary. No longer reliant on that highly variable revenue, but on the definate contracted revenue. Call it "Covering the NUT Independence Day".

    I have Managed Service contracts now (some call them Maintenance Contracts), so recurring reveneue is part of my revenue stream every month. And it is nice to see that monthly revenue come in automatically at the start of every month. I am not covering all expenses with that recurring revenue yet, but well on my way.

    This does not mean that I will abandon Break/Fix entirely. Just that I will treat those service calls as small immediate projects that get placed in the service queue. They will have to take a position behind my MS clients, though. I have to give first divs to those clients willing to commit to monthly revenue with me. If you are a client that does not have a contract with me and you want to be at the top of my service queue, let's talk. I would be happy to show you why it is to your advantage.

    I have to thank the biggies for getting me here (King Karl, Amy Luby, Mark Crall) and the smallies that suffered with me (Ben Ahlquist, Josh McCullough, Bob Nitrio), and just about everyone in the Arizona SMB Users Group (sorry, too many to name). Without you, this would not have been possible.

    It may not be Independence Day for me, but it turned out to be Thanksgiving Day. :)

    Friday, July 03, 2009

    New Wine In Old Wineskins


    When is an old computer too old for your client's new software? It is definitely a balancing act. Often, putting new programs into the older computer is like the foolishness of putting new wine in old wineskins. There is a lesson in this parable that Jesus taught that can apply to IT. The principle is easy enough. Like new wine bursting the old wineskin, new software will ruin the use of an old computer.

    I have a client that has gotten an update to a line of business app. They were using a version from 2004, but were finally force to upgrade to the new 2009 verison as they simply could not get support for the previous version. Well, 5 years and several versions of the LOB app has resulted in a much larger program with hefty requirements on the workstation and the server. What was a comfortable fit before is now strained and "bursting" for the server.

    This is also a downside of partnering. An impromptu "partnering" forced by the client... In this case, I am not schooled in this business app. The client has a separate consultant come in and handle upgrades and special troubleshooting for this app. Unfortunately, I did not pay enough attention during the upgrade. I trusted a little too much. Sorry, another topic for another post...

    It happens a little at a time sometimes. A new verison of Yahoo Messenger, the latest version of the antimalware program, Google Updater now installed, Windows Search, etc. Remember when Windows XP ran in 256 megs of ram, but now you want 1 gig? Software upgrades over time will put you slowly in this position. Maybe a ram upgrade will save you. Our challenge is that the client will want to hang on to the computer too long. If you are hourly, it costs the client extra dollars as the computer is simply slower to work on. If you are on a maintenance plan, then the extra time to maintain the computer comes from your pocket.

    As I am comparing to a parable, there is a moral to this story. Always check if the software is too new to go into your "wineskin". If your objective opinion is that it is time to retire that unit, let the client know. Convince the client to not hold on to the old stuff too long.

    Tuesday, June 30, 2009

    When Your Prospects Don't See Value...


    Or even your existing clients do not see the value in your services, you get situations like these.



    Of course, we do not sell prepackage videos or a casual meal. Both of those were not necessary, but optional services that the clients could have done without. We sell productivity, business continiuty, no worries, etc. Don't you? If you see yourself selling network infrastructure and cannot translate that into the above topics in your prospects mind, you are much more vunerable to what happens in the video.

    Don't get me wrong. Not all prospects (or clients) will get the value proposition, no matter how good you are at relating value. You will always appear to them as the evil company attempting to get their money. Unless you are starving, walk away from them.

    Many thanks to Joel Simpson at Simpson Computing in NC for bringing this video to the attention of the SBS Group Leads. He is a class act.

    Its Christmas in June! The twinkles in your clients eyes...


    Clients do not realize how many treasures are still hidden away inside their SBS server. For whatever reason, lots of SBS servers out there are not having their secondary features used. Features such as SBS Connector, RWW, OWA, etc. Opening up those features for your clients is like giving them Christmas gifts they have already paid for.

    I have a client that had a SBS 2003 server that was not being utilized for its SBS features. They had pain points that they did not know they had the solution for. After telling the clients about the goodness they were missing out on, they had me expose these features so they could use them. In this case, the client was worried about checking their accounting while out of town. Hey, tailor made problem for RWW. A few router changes and some basic training, and Voila!. Now, even though I had explained the features they were getting, their faces lit up when they actually "experienced" the feature. Reminded me of Christmas morning. The kid knows what they will get. Its the experience of getting it that that gives the kid..eh..client the positive emotional rush.

    Trust me. A positive emotion from your client about something you made happen... candycane for you. So, check your clients and see if there are pain points that you already have the solutions in place for. Our clients under utilize the systems we have already put in place. Unwrap any presents that your clients haven't yet discovered, and spread some Christmas cheer!

    Sunday, June 28, 2009

    Your Vendors VS Your Clients : Your Dilemma


    I've been stuck in a dilemma.

    How do I develop strong relationships with my vendors while preserving my impartial judgement on behalf of my clients?

    In the industry, the sage wisdom is to develop strong relationships with my vendors and then have my vendors fund, sponsor, and otherwise support my efforts in return for aggressively pushing their products. How do I develop strong relationships with vendors that want me to produce sales, and still safeguard the trust that the clients have in me to not sell them stuff or services they do not need?

    There is the added self interest that my company is more profitable and productive by standardizing around fewer vendors. Yet, I must bring in new vendors that understand the new paradigms that are coming, or do better at a lower cost. Still, I cannot force clients away from the old vendor unless I really believe they will be benefited by the new vendor's product or service. Or that they at least will not be hurt...

    But my whole practice has been built around tailoring to the clients specific needs. That sometimes means using different vendors in the same product or service category. Backup is a prime example. Some clients need a backup solution that can give fast virtualization, due to production requirements or commitments to their clients. Other clients need just backup, as they are willing to suffer some downtime. Some have large datasets they want offsite and others have small amounts that need to be backed up. Most vendors do not cover all of this, and none do all well.

    I have accepted that I must have 2 to 3 vendors in most categories for my existing client base. I am toying with the idea of making 1 a prime vendor and then putting together a marketing program to find new clients that need the best-in-class product from that vendor. That would give the vendor the activity to justify supporting me. That means I will have to change from growth by referral to actual marketing. Ouch, that is a brave new world for me. Hope to share with you as I work my way through that.

    EDIT - Actually, I meant direct response marketing was new. I have put out the fishhook (Yellow Pages, Stuffers, etc) before just hoping something would bite, but you never know what you will get. More directed marketing at a specific profile of potentials, that is what I mean.

    Tuesday, June 23, 2009

    Facing a Tough Crowd



    I had my first presentation at a conference with a national audience. Computer Troubleshooters had their national conference here in Phoenix. They had some requests for a speaker on SBS 2008. I got a call for a local expert that could present on that subject. Well, I am not that expert, so I roped Mike Effertz into doing the show. He is our hands down best expert on SBS 2008 in the AZ SMB Users Group. Mike carried most of the load. I had been doing alot with migration for SBS 2008, so I volunteered to do an overview of the options for migrating to SBS 2008.

    All in all, it went quite well. The CT crowd was kind to us. We did not stumble in the presentation. Questions were intelligent. I may have to do this again.

    One thing I did discover. Between Mike and I, we had a combined total 48 YEARS in business. Wow!

    The problem with EWaste, Part 1


    EWaste, that ever growing mountain of discarded electronic parts, has been on my mind for some time.

    I gave a talk about a year ago at Lunch Bunch networking group of the Glendale Chamber of Commerce on the improper disposal of ewaste in third world countries. I had intended to follow that with practical steps on what the local small business could do to make sure their ewaste was disposed of correctly. Alas, so many things to do...

    Anyway, tonight PBS had a special on Ewaste disposal in Ghana. Powerful stuff! The full video, Ghana:Digital Dumping Ground, is available on line. Very revealing information on SSNs, checking accounts, passwords, defense contractor documents, etc that were found on the hard drives in Ghana. Watch and Learn!

    I will be back to add to this issue. Just need to do some more research...

    Ken