AZCOMP Technologies IT May 2018

(855) 556-4677

MAY 2018

Empowering Small Practices to Deliver the Best Care



And Neither Should Your Cybersecurity

Technological advances are a constant, evolutionary process. What was cutting edge one year is old hat the next. We might notice these iterations more obviously when a new iPhone rolls out or when the PlayStation 4 replaces the PlayStation 3, but they’re happening to all facets of tech all the time. Updates, new features, and new devices arrive at a moment’s notice. The rate of advancement is exciting, making what was a dream yesterday a reality today. We tend to focus on the upside of these innovations, but they also present a slew of problems for businesses hoping to keep their networks and data secure. Hackers are adapting their tactics as quickly as companies are creating new products and features. Infosecurity Magazine estimates that 360,000 new malware samples hit the web every single day. In a world where most businesses can’t function without their digital information, getting hacked is a risky situation that could result in irreparable damage to a company. We may only read about the instances where huge companies like Equifax, Uber, and Sony are hacked, but small businesses are just as likely to be attacked. If you think your company is too small to be a target for cybercriminals, think again. According to Verizon’s 2017 Data Breach Investigations Report, 61 percent of data breaches occur at small businesses. The report also concluded that half of the 28 million small businesses in America suffered an attack last year. When you pair these statistics with a report from UPS Capital finding that 60 percent of businesses close within six months of a hack, they paint an alarming picture of what a hack could do to your business and livelihood.

they have to devote to cybersecurity. With a legion of cyber- security guards patrolling their networks, only the most sophisticated hackers can dream of breaching companies of this size. Hackers targeting small businesses are banking on the fact that your network protection will be an insufficient deterrent. Luckily, you don’t need the resources of Google to prove them wrong. The best way to keep hackers at bay is sustained attention through managed IT services. You could have the best security team in the world set up your systems, but if they don’t monitor and update them consistently, the software will be outdated soon after. Too many companies think of IT as a set-it-and-forget-it proposition. They create their system and don’t think about it until something goes wrong. All of a sudden, they’re in a panic, scrambling for a resolution. At that point, it might be too late. While no company can predict exactly when or how an attack might present itself, managed services allow your network to be vigilantly watched and your tactics to be up-to-date. Managed services combined with regular training allow your team to keep your company safe. Devoting your time and resources to defending your network may seem like unnecessary insurance, but in today’s marketplace, there isn’t a smarter investment you can make. Just ask the companies that had to close after a hack. AZCOMP is proud to provide managed services tailored to your needs. We want to make sure that no matter how a hacker attempts to take you down, you’ll be able to swat them away.

–Benson Bashford

Why do hackers target small businesses? The short answer is that they are easier to penetrate. The larger a company is, the more resources

Published by The Newsletter Pro •

(855) 556-4677 AZCOMP Technologies, Inc. • 1

Let’s say you enable 2FA on your Gmail account with your phone as your second authenticator. After inputting your normal password into Gmail, you’ll receive a six-character code texted to your phone. Only after verifying this code through Gmail can you access your account. It’s not hard to see the benefit of this system. Even if a hacker obtains your password, they won’t be able to break into your account. Many people avoid setting up 2FA because they see it as an inconvenience. However, when you think about the damage that a data breach could inflict, it’s hard to justify this mentality. You don’t have to be a math whiz to understand that an extra 15 seconds that could save you untold hours and dollars is a smart proposition. Almost any service that requires a password is already set up to allow for 2FA. If you don’t take advantage of the technology, you are leaving yourself vulnerable to an attack. Tactics like 2FA are weapons in your arsenal that deter criminals from accessing your private data. At AZCOMP, we are happy to help you deploy all the tips and tricks to protect your company’s private information. Give us a call to let us know what you need help with, and we’ll develop a plan to lock down your data. TWO-FACTOR AUTHENTICATION Is a Hacker’s Worst Nightmare

A study by password-management firm Meldium found that 90 percent of passwords can be cracked in under six hours. With that in mind, it’s an even more

alarming statistic that 65 percent of people use the same password for all of their accounts. These statistics paint a clear picture of how vulnerable most data is to hackers. Luckily, tech companies have adopted a number of tools that allow users to take a more active role in protecting their data. Chief among them is two-factor authentication (2FA). You have probably been prompted to set up two-factor authentication before, but you may not know how it works. Essentially, it is a system in which you must verify your identity in two separate ways (usually across different devices) to access an account. That may sound confusing, but it’s actually a very simple process. Here’s how it works in practice.



Dan Bawden is about to celebrate his third anniversary here at AZCOMP. He’s a support

Call our direct support line: (480) 730-3055 Create a support ticket via email:

technician and has helped countless customers deal with complex computer issues. He’s incredibly skilled at his job, and we’re lucky to have him on the team. When asked what his favorite part of working at AZCOMP is, Dan didn’t hesitate. “It’s the people, for sure,” he answers. “Everyone here is so passionate about what we do, from the management to the technicians. It makes the atmosphere awesome and coming to work every day a joy.”

Learn more about how to get unlimited computer and networking support at . DOWNLOAD OUR FREE REPORT

Protect Your Data What every small business owner must know about protecting & preserving their

“What Every Small Business Owner Must Know About Protecting and Preserving Their Company’s Critical Data and Computer Systems” covers the essential information you need to know to keep your network safe. If you aren’t up- to-date on the latest in security, your network will be at risk.

company’s critical data & computer systems!

If you depend on your computer network to run your business, this is one report you DON’T want to skip!

When Dan’s not working, he’s either spending time with his family or studying toward a degree in marriage and family counseling. His three children — Ayden, Matix, and Taelyn — are energetic and love to be outdoors. “Matix and I love to go to the skatepark together,” he says. “I actually won the street rollerblading event at the Utah Summer Games in 2006, but Matix is quickly challenging me on the ramps.”

This report is available for free at Download it today to ensure that your computer systems are as secure as possible. With this report, you can have peace of mind knowing that you can enjoy your Memorial Day barbecue without worrying about the safety of your network and data.

2 • (855) 556-4677 AZCOMP Technologies, Inc.

TEACH PROGRAMMING WITH A ROBOT How Root Gets Kids (and Adults) Excited About Coding

If you were to ask 10 educators what the most useful technical skill a child can learn is, at least nine of them would say computer programming. Classes that teach people of all ages how to code are exploding in popularity, but there’s still a long way to go before they are widespread. Many parents are turning to outside sources to get ahead of the curve. A new product called Root seeks to make learning code fun and engaging for aspiring programmers of all ages. Root is a robotic learning device that pairs with a companion app. The robot, which looks like a small white stop sign, can move, draw artwork, play music, and more. You instruct it on how to act via the app. Unlike many other computer learning tools, Root can benefit total beginners and more advanced coders alike. The programming systems are divided into three levels. The first and simplest is graphical coding, which teaches concepts like events, sequences, and loops in a way that’s easy to understand and implement. The next level is computational coding, which introduces variables, flow control, and more. Finally, level three features advanced, full-text coding in three popular programming languages: Python, JavaScript, and Swift.

HOW IN-N-OUT BURGER BECAME A PHENOMENON IN THE MIDST OF A FAST-FOOD BACKLASH The publication of Eric Schlosser’s “Fast Food Nation” in 2001 was the first salvo in the fight against fast food. In the ’90s and before, most consumers were not aware of the unhealthy, industrial nature of most fast-food chains. But that changed quickly. All of a sudden, there were dozens of books, documentaries, and even Hollywood movies about the dangers of too much fast food. The major fast-food chains saw business in the U.S. suffer. That’s not what happened to In-N-Out Burger, but then again, In-N-Out is not your typical fast-food chain. While other fast-food chains focused on being as cheap and efficient as possible to compete, In-N-Out never lost their focus on quality. Long before it was popular to be meticulous about sourcing ingredients, In-N-Out avoided freezing, prepackaging, or microwaving any of their items. All of their beef is ground at the restaurant, and it never has any additives or preservatives. Now, a burger and fries is never going to be the healthiest choice, but In-N-Out is a lot better than most of the Frankenfood alternatives. Another factor of their success is that they don’t overcomplicate things. You won’t find a thousand-item menu at In-N-Out. Instead, everything is streamlined, and each item is crafted with care. One of co-founder Harry Snyder’s favorite sayings was, “Keep it real simple. Do one thing and do it the best you can.” In short, don’t expect kebabs or acai bowls to appear at In-N-Out anytime soon. Just as important as their product is In-N-Out’s focus on employee and customer experience. They have the lowest turnover rate in the fast-food industry because they value their staff tremendously. On the customer side, they strive to create a welcoming experience that encourages loyalty and repeat visits. Ask anybody about In-N-Out and they’ll tell you about the “secret menu.” In reality, it’s not much of a secret, but that’s why it works. It feels exclusive without excluding anybody. In-N-Out Burger has no shortage of zealous fans — there’s probably one in your office right now. It turns out that if you want to create a fan base willing to travel hundreds of miles for a burger, all you have to do is focus on quality, do something simply, and execute it well.

At only $199, Root is the perfect tool to introduce people of all ages to the wonderful world of coding.

DANIEL COYLE’S ‘THE CULTURE CODE’ Daniel Coyle’s “The Culture Code: The Secrets of Highly Successful Groups” begins with a fundamental question: “Why do certain groups add up to be greater than the sum of their parts, while others add up to be less?” Will Give Your Team a Boost

The answer, in short, is a collaborative culture. “Group culture is one of the most powerful forces on the planet,” Coyle writes. “We sense its presence inside successful businesses, championship teams, and thriving families, and we sense when it’s absent or toxic.” Using examples like the San Antonio Spurs, SEAL Team Six, and Pixar, Coyle then explores the tenets of a successful group culture. He identifies three key skills that exceptional cultures share no matter their size or industry. Great organizations build safety , share vulnerability , and establish a purpose between their teams. “The Culture Code” explores each of these concepts in detail, giving you the tools to apply the lessons of hyper-successful organizations to your business. If you want to take your workplace culture to the next level, you’ll benefit from reading Coyle’s book. Before you know it, your team will be reaching new heights.

(855) 556-4677 AZCOMP Technologies, Inc. • 3

Give us a call! (855) 556-4677


2500 S. Power Rd, Ste 117 Mesa, AZ 85209 i nside this issu e The Cycle of Cybercrime and Security PAGE 1 How to Better Secure Your Network PAGE 2 Meet Dan Bawden PAGE 2 In-N-Out’s Model for Success PAGE 3 A Fun New Tool for Aspiring Programmers PAGE 3 AZCOMP Leadership Library: Daniel Coyle’s ‘The Culture Code’ PAGE 3 Jerry Rice Delivered Phenomenal PAGE 4


Our first core value at AZCOMP is the promise that “We deliver phenomenal.” The reason that this comes first is because it informs everything we do. When we strive to create a phenomenal experience for our customers and for each other, everything else falls into place. I recently watched a talk by Bo Eason, a former All-Pro NFL safety, that provides a perfect example of what “phenomenal” looks like. Bo’s talk, called “How to Be the Best at Whatever You’re Doing,” is jam- packed with wisdom, but I want to highlight one portion in particular. It features the greatest receiver to ever play in the NFL: the legendary Jerry Rice. Bo played against Jerry for four seasons, but when he was traded to the 49ers, they became teammates.

After being tormented by Rice for years, he was excited to learn from him. The lessons began on the very first day of training camp. Bo was always determined to be the first person on the field, but when he arrived to practice that day, Rice was already standing there. No one doubted his role on the team. In fact, nobody cared if he was a few minutes late. But Rice pursued the phenomenal. As Bo watched Rice participate in the first wide receiver drill, he grew even more impressed. While the other players with secure roster spots did the drills at half-speed, Rice gave every ounce of effort and energy he had. He did the same for every rep, every day. When Bo asked Rice why he sprinted to the end zone after every reception, the answer spoke volumes. “Bo, that’s very simple,” Rice told him. “Every time these hands touch the ball, this body ends up in the end zone.” Talent without effort is wasted. Jerry Rice knew this and made sure to perform at the highest possible level all the time. That’s why he’s regarded as one of the greatest players to ever wear an NFL uniform. When you channel your energy into improving yourself and the contribution you make to others, you’ll deliver phenomenal.

Published by The Newsletter Pro •

4 • (855) 556-4677 AZCOMP Technologies, Inc.

Page 1 Page 2 Page 3 Page 4

Made with FlippingBook - professional solution for displaying marketing and sales documents online