Research Finds 1 Percent of Online Ads Malicious

One percent does not sound like a lot, but multiple it by the right number, and it can be.

Such is the case when it comes to malicious advertising. In research recently presented at the 2014 Internet Measurement Conference in Vancouver, a team of security experts from Ruhr-University Bochum, University College London and the University of California, Santa Barbara (UCSB) examined more than 600,000 online advertisements on 40,000 websites over a three-month period and used multiple detection systems to assess whether they were good or bad. The end result: one percent of the ads were found to be involved in suspicious or malicious activity such as drive-by downloads and link hijacking.

Malvertising "While this is bad news for the advertising networks, advertisers and Internet users who are all under attack from the malware producers, the good news is there are several things available today that can stop malvertising," said Giovanni Vigna, co-founder and CTO of Lastline, one of the members of the team that worked on the research. "One of these is the use of the sandboxing attribute in iframes within HTML5. None of the 40,000 websites we observed leveraged this mechanism, even though it could stop the link-hijacking that is by far the most prevalent method by which miscreants are getting past other security measures in order to distribute malware through advertisements."

"On the ad network side — whether those be ad brokers, ad distributors, ad resellers or traditional ad networks — a similar approach can be taken to that used in our study to monitor for malvertising," he continued. "To detect malicious behavior in ads we used a composition of blacklists, reputation databases, and Wepawet, a honeyclient developed at UCSB that uses an emulated browser to capture the execution of JavaScript to identify signs of maliciousness, such as drive-by-download attacks. The research community and technology companies (including security providers as well as ad networks and ad brokers) can and should continue to study malvertising and develop new techniques and tools to detect and stop it."

Apostolis Zarras of Ruhr-University Bochum said that the smaller ad networks appear to be more prone to serving malvertisements, which he speculated could be due to less efficient filtering mechanisms compared to the larger ones. 

In the paper, the researchers also speculated that many publishers trust their advertisers to police malicious activity, and therefore do not use additional filters to protect their users. As for solutions, the researchers argued that collaboration among the ad networks can bring better results in defending against malvertisements compared to individual actions, and the existence of a common blacklist where all malicious advertisements will be submitted can prevent attackers from submitting their wares to a different network if they get rejected by another.  

"Another, more drastic, solution will be penalizing of the ad networks which are inefficient to detect the malicious code embedded in advertisements," according to the paper. "For instance, forbidding from participating in ad arbitrations for a certain amount of time, or the application of similar penalties, when an ad network is found delivering malvertisements, can boost the ad networks to invest in better detection algorithms."

"Back in time, said Zarras, "we used to have websites that were controlled by cyber-criminals and the attackers had to lure the victims to visit these websites so they can effectively infect their machines with malware. But, with the ads this is not necessary any more. An ad can exploit vulnerabilities in your browser, or your browser extensions without the need from user’s side to visit a malicious website. For instance, the incident that took place on January 2014, in which Yahoo ads exploited vulnerabilities in Java and installed malware on victims’ computers, [shows] that these attacks are actually possible and not theoretical. So, the main reason that malvertisement is more effective that traditional attacks, is that the user’s can be infected with malware even if they visit only legitimate websites."


Posted in: Company News

Leave a Comment (0) →

Cyberattack Hit US Weather Service: Report

SAN FRANCISCO – Cyberattackers believed to have been working from China broke through defenses of the US weather service recently, according to a Washington Post report.

US media outlets on Wednesday said that the US National Oceanic and Atmospheric Administration (NOAA) confirmed that some of its websites had been compromised but declined to discuss who may have been responsible.

NOAA, which includes the National Weather Service, reportedly sealed off weather data relied upon for aviation, shipping, and more after security teams caught on to the breach.

Cyberattacks were "deflected," and some NOAA services were taken down temporarily for what was described at the time as "unscheduled maintenance," according to media reports.

The Washington Post quoted US Representative Frank Wolf of Virginia, a Republican, as saying that the NOAA told him "it was a hack and it was China."

The report came just two days after the US Postal Service said hackers stole sensitive personal information from its employees in a large data breach this year, and got some customer data as well.

The postal service said it "recently learned of a cybersecurity intrusion into some of our information systems" and was cooperating with law enforcement agencies in an investigation.

It said the hackers appeared to have accessed "identifiable information about employees, including names, dates of birth, social security numbers, addresses, beginning and end dates of employment, emergency contact information and other information."

A USPS spokesman said the breach affected as many as 800,000 people who are paid by the agency, including employees and private contractors.

The statement said hackers also penetrated payment systems at post offices and online where customers pay for services.

It said the customer data included "names, addresses, telephone numbers, email addresses and other information" but that there was "no evidence that any customer credit card information from retail or online purchases" had been compromised.

The Washington Post, citing unnamed sources, said Chinese hackers were suspected in the breach.

The news comes with US President Barack Obama in China for high-level talks, amid heightened concerns about cyberattacks allegedly from China.

Sent from Surface


Posted in: Company News

Leave a Comment (0) →

Internet Voting Security Risks Highlighted by New Wireless Router Attack

Researchers have published a paper detailing a new attack method that can be leveraged to silently modify the digital ballots used in the Internet voting process.

In Estonia, people can vote over the Internet since 2005, but the United States has also conducted some tests over the past years. Online voting was used in Alaska in 2012 and 2014, and in New Jersey in 2012 due to the impact of the Sandy superstorm. Washington D.C. also developed a system in 2010, but the project was abandoned after it was hacked by researchers.

One of the proposed voting systems involves digital ballots in PDF format. People fill out the forms and send them via email to a specified address. The ballots are printed and counted by hand or with an optical scanner. This type of mechanism is currently used in Alaska, but it was also used in New Jersey and in Washington D.C. as a fallback system.

Attack description and implementation

Internet Voting HacksAccording to Daniel M. Zimmerman and Joseph R. Kiniry, researchers at Galois, Inc., this type of mechanism is vulnerable to several types of attacks. Malicious actors can use malware to modify or invalidate votes, and third parties can pose as the legitimate election authority or they can launch DDoS attacks against the organization to prevent votes from being cast.

However, the attack described by the researchers occurs at transport level and it involves hacking into the targeted users’ routers. The method they presented in their research paper allows the attacker to change the vote after the ballot has been sent via email to the election authority. The attack is dangerous because it’s difficult to detect by both the voter and the election authority.

In order to modify the vote casted by the user without invalidating the file, the attackers must change certain strings within the PDF. Successful tests have been conducted on several popular PDF viewer applications such as Adobe Acrobat Pro XI, Apple Preview, Google Chrome, Gmail (on all browsers), Mozilla Firefox, Safari and Skim.

The PDF documents are not tampered with while they are stored on the victim’s computer. Instead, the attack is carried out by modifying one or more TCP packets of the email attachment after it’s sent by the user’s email client and before it reaches the election authority.

Researchers have achieved this by changing the firmware on the victim’s wireless router. For their tests, they’ve selected an off-the-shelf home router.

"Nearly all such routers on the market today are based on embedded versions of the Linux operating system and therefore, in accordance with the GNU General Public License, the source code for their firmware is freely available," the researchers explained.

They have downloaded the source code for their test router’s firmware and made a small modification (less than 50 lines of code) to the part of the kernel that handles packet transmission.The new firmware looks very similar to the original one. The only differences are the slower TCP connections on standard email submission ports (25 and 587), and the fact that certain sequences of bytes sent to these ports are replaced with different sequences.

Researchers believe it would take a detailed inspection of the compiled code or a detailed analysis of the router’s traffic handling to notice that the firmware is not genuine. Performance is negatively impacted, as the TCP connections to these ports are 25% slower, but the experts argue that users don’t usually monitor the speed of their outgoing messages when using email clients.

In order to get the modified firmware on the targeted router, an attacker can leverage one of many vulnerabilities, such as the recently disclosed flaw affecting ASUS routers. Another way to install the malicious firmware is to drive around in a neighborhood and gain access to network connections and router administration interfaces by leveraging the fact that many users set easy-to-guess passwords and don’t change the default credentials, researchers said.

Mitigating attacks

The researchers have suggested three possible mitigation strategies: signing or encrypting the PDF file before it’s sent to the election authority, encrypting the connection to the SMTP server, and more secure router firmware update mechanisms.

"The overall conclusion is inescapable: unencrypted PDF ballots sent via electronic mail can be altered transparently, potentially with no obvious sign of alteration, and certainly with no way to determine where on the network any alterations took place or the extent to which votes have been corrupted. This method of vote submission is inherently unsafe, and should not be used in any meaningful election," the researcher wrote in their paper.

In Estonia, over 100,000 people used the Internet to cast their votes at the European Parliament elections in May 2014. Just two weeks before the vote, security researchers warned Estonian authorities that the system contained serious vulnerabilities which could be tempting for a state-level actor such as Russia. However, the country’s electoral commission dismissed the reports, claiming they were confident in the system’s security.

Sent from Surface


Posted in: Company News

Leave a Comment (0) →

Passwords: To be or knOt2$B3? Take the Quiz!


Do you think passwords are still important? Do you ever worry about your passwords? We’ve been kicking around computer and information security for a while now. Why don’t we have a better answer?

Personally, I have gotten a little tired of password articles and blogs. I started “logging on” in about 1976, and I kind of thought we had said pretty much everything there was to say about passwords by now. Then, I recently spoke with some people born in the 1990s and 2000s, and it seemed like they tried their best to make my brain spring through the top of my skull. From these people in their teens and 20s I heard things like, “I just use the same password for everything,” and “I’m just a student, hackers don’t want my stuff.”

As a professional security geek, my reaction was more or less “you’re kidding, right?” But it should really not be a surprise when we look at some of the recent statistics about password use. This includes analysis of compromised passwords that shows that the most commonly used passwords are things like “123456” and “password”. Or droves of surveys done over the past six or seven years which keep saying that 55-70% of people (depending on the exact survey and year) use the same password across multiple accounts. Or similar studies that say 70-80% of passwords being used online are classified as “weak”, which often means a password that is less than eight lower-case characters, or are simple dictionary words like “iloveyou”, “monkey”, “dragon”, or “ninja”.

We all know passwords are not a great solution for securing our accounts and information. But, it is what we have right now, so we might as well make the best of them, eh?

Curious on how strong your passwords are? For some empirical checking, you might try one of these sites (in general, of course, I will advise against entering your actual password):

Hopefully, using them is an eye opening experience, and not a humbling one. As a point of reference, I tested a password with a construction similar to what I use to log on to my personal machine on these two sites. HowSecureIsMyPassword, says it would take 71 quadrillion years for a desktop PC to crack the password, and askthegeek shows it as “Very Strong” with a score of 100%. But those measure the technical part of the password.

Considering all of this input, I thought it was time for a 90 second quiz (probably less than that, so relax). Unfortunately, this is a text-based article so I cannot use a quiz tool that will accumulate your score for you, but, trust me, the scoring is really straight forward (You will know immediately if it goes south on you). The only real catch is that the quiz (and scoring) is not based on some password standard, but is based on my own personal criteria. I will assert that over 38 years of computer use, and 29 years of experience in the security world gives me that right.




+1 – If your passwords are at least eight characters.


+5 – If your passwords are at least 10 characters.


+1 – If you use both lower-case and upper-case in your passwords.


+2 – If you include numbers in your passwords.


+3 – If you include special characters (like !@#$%*) in your passwords.


+1 – If you ever change your passwords.


+3 – If you change your important passwords at least annually (e.g., bank, credit card).


+6 – If you store passwords in a password vault, or offline.


-1 – If you include any numbers of special characters only at the end of your password.


-3 – If your password mystery relies on substituting numbers for letters (it is simply not that tr1cky or 3L1T3).


-5 – If you include keyboard sequences in your password (like "qwerty" or "mnbvcxz" or "123456789").


-20 – If you include any form of the word "password" in your password (like "password" or "pwd" or "pass").


-10 – If you repeat any letter of number more than two times (like "aaaa" or "666").


-15 – If your password includes any part of your name, username, any month or has anything at all to do with the site associated with the password (like having your Facebook password as “fbletmein” and your email password as “emailletmein”).


-50 – If you use the same password on social media, email and private sites (like shopping and banking sites).


-10 – If you have shared your personal passwords with anyone.


-20 – If you keep passwords in email or in a plain text, unencrypted file.


Total Score



Less than -50

Um. I’m not even sure why you pretend you are using passwords.

-50 to 0

Please reconsider your password habits – they are probably giving you a false sense of security.

0 to +15

In general, your password practices are not unreasonable. Check the quiz again to see how much more paranoid you are willing to get.

+15 and up

Greetings fellow paranoid security geek. Nice to know someone takes this seriously.

If you paid any attention to the scoring, you may have noticed a couple things. The positive numbers are all small, and include all of the technical parts of password construction. With a couple small exceptions, the negative numbers are more related to password usage. The technical side is the easy part – make a strong password. If any part of this is hard, it is the usage – use your password(s) wisely. It’s not like, as an industry, we consistently do either part well. But we have to do the two parts together. A strong password, used foolishly, is probably not going to help us much. At the same time, a poor password, used well, will, at best, make us think we are more secure than we really are.

Passwords are not the keys to our systems and information. At least they should not be. The purpose of a password is to help separate the wheat from the chaff, and to slow down attackers. We create good passwords, and then use them wisely for two reasons:

1. To help slow down access to our stuff, not stop it.

2. We don’t have an answer that is better than “passwords,” yet.

And, one last question for the quiz. If you have ever emailed your password to anyone you get to subtract another 200 points from your score.

Sent from Surface


Posted in: Company News

Leave a Comment (0) →

How Managed IT Support Services and Cloud Computing Improve Your Business

Small business owners who are not already on board the “cloud” may be missing out on a great opportunity to improve their business operations as well as profitability. Cloud computing has changed the landscape of business dramatically in the past few years. In order to reap the most rewards from technological advances, it is important first for business owners to understand what they are dealing with and how new technologies can improve the functionality of their business.

What is Cloud Computing?

To better understand this concept you must only turn to the Internet. How the Internet is used has changed greatly over the years and in terms of business, any programs or services that you use via an Internet connection could loosely be described as a cloud service. Cloud computing allows you to utilize software and services without having to run the servers or software in house. These outside vendors run the software and servers, making it possible for you to pay attention to what is most important, running your business. Examples of cloud computing services that are commonly used by businesses today include; which offers programs to aid sales staff in tracking customer information and data storage backup services such as those offered from

Benefits of Cloud Computing

As more and more businesses are relying on cloud computing services you might wonder how they can benefit your business. There are many benefits including long term reduction of software and computer costs, improved data security (secure off site backup and storage) and increased functionality and customer service. As cloud computing continues to evolve and offer additional products and services, many businesses that are currently on the fence will make the decision to venture to “the cloud”.

Managed IT Support Services Can Make the Transition to Cloud Computing easier

Despite the growing popularity of cloud computing and the increased number of companies utilizing these services, not all business owners nor customers are completely convinced this is the way to go. There is little doubt that this area of technology will continue to develop and likely become main stream within a few years. With that in mind, business owners who question this technology can benefit greatly by consulting with managed service providers to help guide them through any transitions. Managed services providers are up-to-date with all new technology and can offer services that include cloud computing to improve the way your business runs as well as provide much needed assistance in the event of a man-made or natural disaster.

By working with a Managed IT Support Services Provider your business can immediately reap the rewards of cloud services while still having trained professionals in your corner to ensure your business is adequately protected and invested in this technology. Finding the right managed services provider can make the difference between your small business increasing efficiency and improving functionality versus getting left behind in the virtual dust. Working with a qualified managed services provider will eliminate much of the confusion associated with “new” technology and position your business in a place where you can compete with others in your field while reducing in-house IT costs.

Click here to learn how Sentree Systems, Corp. can help you benefit from the Cloud with our Cloud Computing Solutions for your business in central Indiana and surrounding cities.


Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

How to Create a Basic Businesses Disaster Recovery Plan in 4 Steps

Loss of data is a common problem for businesses. Fortunately, it’s a problem that can easily be avoided with the correct preparation. While devastating amounts of data can be lost during catastrophes like hurricanes, terrorist attacks, fires and floods – it doesn’t take such large events to cause a business to lose important data. It can be as simple as dropping a laptop to the floor, or a power surge that results in burning out a storage device. If you don’t have your crucial data backed up, even a small situation can turn into a disaster. That’s when having a business disaster recovery plan can help.

If you still think natural disasters are the leading causes of data loss – and that the chances of it happening to you are pretty slim, take a look at the results from a study by Strategic Research Corporation of the leading causes of business continuity and disaster recovery incidents:

  • Hardware Failures (servers, switches, disk drives, etc) – 44%.
  • Human Error (mistakes in configurations, wrong commands issued, etc) 32%
  • Software Errors (operating systems, driver incompatibility, etc)14%
  • Viruses and Security Breach (unprotected systems are always at risk) 7%
  • Natural Disasters 3%

Establishing a disaster recovery plan can be done in the following four steps:

1) Take a potential risk inventory. Make a list of every potential cause of data loss and the solutions to each. Your list should include losses that won’t affect the business very much, and those that would shut the business down temporarily or permanently. Information Technology experts can assist you with creating the potential risk inventory – as they will have the knowledge and experience to identify possibilities that you are not likely to think of but need to plan for all the same. These IT experts will also be able discuss preventative solutions to guard against each type of potential data loss.

2) Rate each of your potential data loss situations. How likely is it for each of the items on your risk inventory to occur? Rating them in order of importance and likeliness to occur will help you determine where to focus your disaster recovery plan efforts.

3) Develop your disaster recovery plan. Go through each of your potential risks and their solutions, and determine how long it would take you to recover from the loss of data for each risk. Could your business be offline for 24 hours? A week? Depending on the nature of your business, being offline for even just 24 hours could result in your losing customers to your competition. Look at ways to reduce the length of time it would take you to recover from each type of data loss risk.

4) Put your disaster recovery plan to the test. Once you’ve created your plan of action for recovering lost data, you should test your solutions. A disaster recovery plan is just a plan until it can be tested and proven.

Click here to learn how Sentree Systems, Corp. can create a business disaster recovery plan for you with our Disaster Recovery and Business Continuity Services for your business in central Indiana and surrounding cities.


Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Is the iPad Useful as a Mobile Computing Device for Businesses?

Some businesses have jumped on the iPad wagon and are finding creative ways to use the iPad as a mobile computing device. For example, the Global Mundo Tapas restaurant in Sydney, Australia uses the iPad as an interactive menu. There’s a budget airline, Jetstar Airways, using the iPad for in-flight entertainment, rented for $10 a flight. A luxury sedan by Hyundai comes with an iPad instead of a user manual. Other than these extreme cases, how can an iPad be used to increase productivity or convenience by the average business owner?

Conventions and Workshops

Do you travel to conventions and workshops for your business? Many people bring their laptop to these events. While laptops are of course very convenient compared to a desktop pc for traveling, the iPad weighs less and could be even more convenient if you’re traveling from room to room at a convention or workshop. These events are also often designed for networking – so you’re not just sitting at the table all day, glued to your laptop. The smaller, 2 pound iPad could be slipped into your purse or a small bag while you walk around the room, or even carried in your hand for easy access as needed, but without being cumbersome.

Flights and Traveling

It’s true a laptop can go on a flight with you, but even the smaller netbooks and laptops add to the weight of your carry on bags and can be frustrating when in the small seats of the plane. If you’re sitting in coach, you know every time the person next to you has to get up to use the bathroom you’re trying to balance the laptop and whatever else you happened to have out in your hands with turbulence knocking you around the aisle. The iPad could be slid into the pocket of the seat in front of you if you have to get out of the way for the passenger next to you – it’s about the size of a magazine.

The same holds true on trains, in taxi cabs, or as a passenger in someone else’s car. Just don’t try to use your iPad while driving, yourself.

Presentations & Sales

Do you travel to client offices to give presentations? How sleek would it be to whip out your iPad and give a sales presentation or demonstration? Apple reports that iPads can connect to the majority of projectors, so you could even broadcast that presentation over a large screen for a larger audience if necessary.

Replace Your Briefcase

Sure, the iPad has a word processor and spreadsheet. Those are always useful for business people. It would be much more convenient to read and edit documents on an iPad over your iPhone while on the road.

But what about the stack of magazines and newspapers you lug around with you in your briefcase? You could have all of your reading materials ready for you on the iPad and skip the briefcase. Use it as an ebook reader, newspaper subscription, and file storage and you’ve literally got everything at your fingertips. With the use of third party Apps, there’s little you can’t do with the iPad for as a mobile computing device for your business.

Click here to learn how Sentree Systems, Corp. can help you get the most out of your iPads, Smartphones and other mobile devices with our Mobile Computing Services for your business in central Indiana and surrounding cities.


Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

5 Reasons to Implement a Managed IT Services Solution

Information Technology services are essential to the success of every organization, large or small. With increasingly competitive business environments, CEOs and small business owners are under great pressure to maintain a highly qualified staff and to make sure their technology is obtaining a better ROI than their competitors’.

These goals are not easily achieved, particularly for young or small businesses with less financial resources and time available. Having your own successful information technology department can eat up too much of the company’s budget and time resources, and eventually cause a loss of its competitive edge. These disadvantages of maintaining an in-house IT department are why companies of all sizes have turned to using managed service providers to either assist their existing IT department or become their virtual IT department, handling all of the technology involved in keeping their businesses running at optimal levels.

The benefits of using a managed IT services solution are numerous, but the top 5 benefits of managed services for business include:

  1. Benefit from the expertise of a specialist, without having to spend time and financial resources training your staff to become experts
  2. Decrease your technology risks with Managed IT Services. Your company doesn’t have to worry about losing and trying to replace trained staff members, or about repairing, implementing or replacing complex technology solutions with Managed IT Services
  3. Enjoy access to the most up-to-date, sophisticated technology solutions without having to invest in expensive equipment.
  4. Experience ultimate control over your business technology without having to manage an information technology department. This gives you the time you need to focus on what you do best: your business functions.
  5. Reduce stress and improve efficiency of your staff. When you make good use of Managed IT Services resources, your staff isn’t tied up with IT concerns and they have more time to focus on tasks that are productive for the business.

Click here to learn how Sentree Systems, Corp. can help you benefit from managed IT services in central Indiana and surrounding cities.


Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Contracting With A Managed IT Services Provider

When the time is right for your business to bring on a Managed IT Services provider there are several things to consider before signing a contract. Businesses both large and small have certain needs that are better managed by professionals. Contracting with a managed service provider allows owners and upper level management to focus their attention on growing and managing the business. Teaming up with a managed service provider has several benefits if you choose the right partner. Conversely bringing on a managed service provider that doesn’t understand your needs or one that is unable to provide the level of service required can be an expensive mistake. Here we look at the things you should consider before signing on the dotted line.

Does the Managed IT Services contract support the goals of both parties?

When it comes right down to it, every business is in existence to turn a profit. When you select a Managed IT Services provider you want to find one that will work with you to help your company achieve its goals. A Managed IT Services Provider that is interested in selling services or products that don’t match the needs of your company, just for the sake of making money is one that should be avoided. You are contracting with a provider that will maintain vital company systems, therefore you want someone on your side who is able and willing to create a package and price that reflects your needs and not their bottom line.

Will Managed IT Services be cost effective?

When you enter an agreement with a Managed IT Services Provider, you are agreeing to pay a predetermined amount of money for their support and services. This can be very cost effective versus paying an hourly rate for IT support. In most cases hiring a Managed IT Services Provider is the best way to go if you have sufficient need for the services provided. Traditionally companies who pay hourly rates tend to spend less money on IT support which may improve profit but decrease services or support that are needed. When you have a Managed IT Services Provider in your corner, you can feel confident all vital areas are being covered regardless of the number of hours needed to do so.

Compare several Managed IT Services companies before making your final decision.

It is easy to get lost in the mumble jumble of the IT world when you don’t understand the language being spoken. While this can be discerning, don’t let a language barrier lead to a poor business decision. You are hiring a Managed IT Services Provider to cover technological areas outside of your expertise, however you don’t want to be completely unaware of what is going on within your company. Research several companies and look beyond savvy marketing to find a company that is the right partner to help grow your business. This includes carefully reviewing services included in the contract as well as customer service, availability and the capacity to handle changes within the industry. If you don’t understand something, ask questions or you might find yourself paying for services you don’t really need.

Signing a contract with a Managed IT Services Provider ties you to that provider according to the terms of the contract. Once you have taken this step it is important to remain in the loop regarding services provided. Review progress on a regular basis to ensure the needs of your business are being met. If you have done your homework and signed on with the right Managed IT Services Provider, you will have one less thing to worry about when it comes to managing your business.

Click here to learn how Sentree Systems, Corp. can help you increase business productivity, eliminate pain and reduce costs with our Managed IT Services for your business in central Indiana and surrounding cities.


Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Do Managed Printing Services Save Money for Small Businesses?

In a struggling economy, business owners look for new ways to reduce their expenses to save money and resources in order to remain competitive. Could managed printing services offer financial and time savings for a small business?

Small business owners are in a good position to save money and benefit most through managed printing services, since they have a lower profit margin compared to their overhead expenses than larger businesses do. When a printer isn’t working effectively in a small business environment, one of the owners, managers or employees must spend time on the phone with an IT specialist trying to troubleshoot the cause of the printer or copier malfunction; as well as find a solution to get it up and running again. When this person is tied up for a long period of time, the business loses the money that would have been made during that time period.

What are Managed Printing Services?

Managed Print Service providers (MPS) monitor your printers and copiers actively from a remote location. They can predict where problems may occur and often prevent it from happening. They work with small businesses to implement plans to identify excessive spending in printers, copiers, and supplies, and to increase productivity by setting up a plan for which type of documents go to which printers in your organization.

Managed printing service providers will also make sure you always have the right amount of ink and paper supplies on hand, which means you will no longer have a closet full of supplies that are never used or run out of the paper you need in the middle of a printing project.

Advantages of Managed Printing Services

In addition to the financial savings gained by small business owners utilizing managed printing services, there are additional advantages of convenience and control. As a small business owner, your time is spent operating and managing the daily activities of your business – there is a good chance that you are unaware how much time and money is wasted on printer or copier related activities. Activities like troubleshooting printers that aren’t working properly; using double the amount of paper necessary because you haven’t learned to use the “print on both sides” option of the printers; and the time spent ordering and processing purchase orders and invoices for toner and paper supplies.

If you upgrade to more efficient and productive printers and copiers, you can also factor in energy efficiency costs of the newer equipment compared to your current, older equipment, and see the cost savings skyrocket.

When you have an MPS provider handling your printing and copying needs, you won’t lose one of your key employees (or yourself!) hours on the phone trying to troubleshoot problems – this is most likely your biggest area of savings in both financial resources and time.

The convenience associated with having an expert handling your business printer and copier needs also means no one on your staff needs to worry about ordering supplies. If there are equipment problems or malfunctions, an expert will fix them for you because it is the responsibility of a managed print services provider.

Cost will be inevitably cut with all of those changes listed above when you let the experts handle these things for you. The end result will be an efficient office when you cut expenses on paper, ink or toner, lower your electricity use and improve employee productivity.

You can reduce your overhead expenses with a managed printing services provider, as well as take back some of your time resources and increase productivity.

Click here to learn how Sentree Systems, Corp. can help you save on printing costs with our Managed Printing Services for your business in central Indiana and surrounding cities.


Posted in: Tech Tips for Business Owners

Leave a Comment (0) →
Page 26 of 27 «...10202324252627
Real Time Web Analytics