Share this
What Does That “New Car Smell” Have to Do With SMB Data Backup and Network Security?
by Kirk Studebaker // President on Apr 24, 2019 3:17:00 PM
How do you prefer to acquire a new vehicle?
Your preference could help you understand your choices when it comes to your information technology infrastructure.
Are you the traditional type who likes to own your vehicle? You prefer to pay your car off in full and (eventually) enjoy not having a monthly note? Of course, as your vehicle ages, you’ll usually pay more for repair and maintenance. You could also outgrow your purchase.
For example, how many of you started with something small and sporty, had kids, and then realized you needed something with a bit more room and cargo capacity?
Hello, minivan (or SUV).
Or do you prefer to lease and acquire something new every few years? You always have a monthly note to pay, but the vehicle will always be under warranty and repair/maintenance is often included for routine checks.
What does this have to do with your IT infrastructure, especially your network infrastructure and backup and recovery?
SMBs generally fall into one of three different “personality” types when it comes to provisioning those two IT functions:
- I have the in-house staff available to do this myself.
- Who can I talk to so I don’t have to do anything myself?
- How will I do this myself even though I don’t have the expertise or time to do so? (OK, only the VERY honest will say this about themselves, but it does describe all too many companies!)
Again, this is a broad generalization, but businesses do tend fall into one of these three “personalities” over time, tending to DIY, outsource, or attempt to DIY but fudge things up out of a deadly combination of desire to handle it internally and lack of ability to actually do so.
Knowing what kind of customer you are -- and how you view IT -- can make a difference in the success or failure of your IT projects over time. And given that every business relies on efficient, secure IT infrastructure to operate; how you view IT directly contributes to how successful your business will be over time.
How Should You Source Your Network Infrastructure?
There are basic elements your business needs, beyond the computers and business software you rely on for your business, there’s:
- The network -- access to the Internet and associated firewall and other security mechanisms
- Security plan -- anti-virus (including ransomware) software
- Monitoring -- rigorous monitoring keeps you secure.
- Security strategy -- (often overlooked!)
When you choose to “buy the car”, you have to handle all of these issues yourself. Unlike a reliable vehicle, network and security software changes rapidly. Even if you do purchase, you’ll need to upgrade frequently.
After your warranty on your new car expires, you’re also on the hook for maintenance yourself -- your transmission goes out and that’s going to take a giant bite out of your budget.
The same applies to DIY network maintenance and security. If your in-house IT staff does something wrong and your data is breached, you’re solely responsible for the fallout. The fallout from a security breach is extensive, from identifying the source of the breach and blocking that security hole to informing your affected customers (and the associated damage to your reputation).
On the other hand, a managed IT partner will proactively monitor your network to head off breaches. Because no system is foolproof, service level agreements will ensure that your business is operational in a predetermined amount of time in the case of a security breach.
Much like if you hear some strange knocking sound in the engine of your leased vehicle and you simply bring it to your dealer; your managed IT partner takes care of network maintenance and repair.
I hope this slightly different explanation of how you provision your network, data backup, and security functions for your business helps you identify what your best options are.
While we can’t promise a “new car smell” every few years like a car lease offers, the safety and security of knowing your business is protected and your in-house staff can focus on other business IT challenges is even better.
Share this
- October 2024 (1)
- July 2024 (1)
- June 2024 (4)
- May 2024 (4)
- April 2024 (4)
- March 2024 (5)
- February 2024 (4)
- January 2024 (4)
- December 2023 (1)
- November 2023 (4)
- October 2023 (4)
- September 2023 (4)
- August 2023 (4)
- July 2023 (4)
- June 2023 (5)
- April 2023 (2)
- March 2023 (1)
- February 2023 (2)
- January 2023 (2)
- May 2022 (1)
- April 2022 (3)
- March 2022 (1)
- February 2022 (1)
- December 2021 (2)
- October 2021 (2)
- September 2021 (1)
- July 2021 (1)
- June 2021 (1)
- April 2021 (2)
- March 2021 (2)
- February 2021 (1)
- January 2021 (2)
- December 2020 (1)
- November 2020 (1)
- October 2020 (2)
- August 2020 (2)
- July 2020 (2)
- June 2020 (2)
- May 2020 (1)
- April 2020 (2)
- March 2020 (4)
- February 2020 (4)
- January 2020 (4)
- December 2019 (3)
- November 2019 (5)
- October 2019 (3)
- September 2019 (4)
- August 2019 (3)
- April 2019 (4)
- March 2019 (2)
- February 2019 (3)
- January 2019 (4)
- December 2018 (4)
- November 2018 (7)
- October 2018 (5)
- September 2018 (10)
- August 2018 (7)
- July 2018 (5)
- June 2018 (8)
- May 2018 (10)
- April 2018 (10)
- March 2018 (7)
- February 2018 (6)
- January 2018 (8)
- December 2017 (7)
- November 2017 (8)
- October 2017 (7)
- September 2017 (7)
- August 2017 (7)
- July 2017 (3)
- June 2017 (5)
- September 2015 (1)
- June 2014 (1)
Comments (1)