It’s time to bring your technology into the 21st century

March 29th, 2019 by Julie Lough

Microsoft to end support of Windows 7

Grand Rapids, Mich. – If your computer is beige and your network server is old enough to drink, it’s time to take a look at what 21st-century technology has to offer. Micro Visions Inc., a local leading IT managed services provider (MSP) started in 1989 – the same year the World Wide Web was invented – knows how to make business technology as efficient, secure and productive as current technology allows.

Helping Grand Rapids businesses run their companies more effectively with state-of-the-art technology for the past 30 years, Micro Visions offers advice and service excellence enhanced by research, lab testing, certifications and regular training to stay abreast of ever-evolving technology trends, tools and practices.

Read the rest of this entry »

Lessons from Somebody Hacking the Hackers

May 31st, 2016 by Jennifer Lough

Hackers Hacking HackersCall it irony, poetic justice, karma, whatever you like., a popular website for sharing hacking information, was hacked in the beginning of May. Unfortunately for any hacker wishing to remain anonymous online, the entire database is open for perusal. It contains 536,064 user accounts, 800,593 personal messages between users, 12,600 invoices, 5582 purchase records, and quite a few passwords and IP addresses. Since the hackers paid the website owners to keep such information under wraps, they’re probably just as disgruntled as their previous victims. On the plus side, this presents an excellent opportunity for law enforcement. Law abiding citizens may also learn a few things from the hackers’ misery. was using the IP.Board community forum, which has had 185  known security vulnerabilities. Supposedly, all of them are fixed, but that doesn’t account for any new or unknown problems. At the time of this writing, the most widely accepted explanation for how the counterhackers accomplished the breach involves exploiting the numerous holes in the website host’s security. However, given that most security reviews for IPb commend them, there are certainly other possibilities. Read the rest of this entry »

BYOD and Poisonous Amphibians (Yes, They’re Related)

March 14th, 2016 by Jennifer Lough

BYOD and Poisonous Newts - Micro Visions, Inc.Having spent the last few months of my life in a zoologist’s lab poking at poisonous amphibians, there is one thing I would do well to remember: Never put the toxic newts in tanks with the nontoxic.

Separating the toxic from nontoxic is standard procedure for labs, but companies tend to be less dedicated to separating personal from professional devices. Enter Bring Your Own Device (BYOD), in which the personal devices invade the business zone and make operations more difficult. Read the rest of this entry »

Comprehensive Backup Plan Phase II: Creating a Data Recovery Plan

December 16th, 2014 by Pamela Michael

data recovery MVIA few weeks back we talked about developing a comprehensive backup plan to ensure that you have a copy of all crucial enterprise data should you ever need it. Once this is done, you can move to the second step of your overall Data Protection Strategy; A data recovery plan (DRP). This plan outlines the steps necessary not only for eliminating risk and hopefully preventing a loss, but perhaps even more importantly, for bringing your systems back to a state in which they can support your business following disaster, corruption, or accidental deletion.

A good data recovery plan will outline two key metrics:

Recovery Point Objective (RPO) – This is the maximum time prior to loss that you will need to have all data safely available at another location. In other words, at what point in time, as you work backwards from the moment of disaster, could you lose all data and still survive. Could you lose 12 hours of data or new work? 24 hours? One hour? Your answer here will determine how often you should be doing backups. Read the rest of this entry »

Five Keys to a Comprehensive Backup Plan

November 11th, 2014 by Pamela Michael

MVI backupsIn today’s age, data is more valuable than ever. Just like we insure our buildings and our physical assets, we also need to ensure that we are covered in the event of data loss. The costs associated with recovering data, permanently losing data, or data reconstruction can be enormous. Regular backups are an essential form of protection against the significant financial impact of computer downtime and lost data.

With that in mind, does your company have a Data Protection Strategy that includes a Comprehensive Backup Plan? If not, it’s time to build one. Here are the five key factors you should consider as you put together your plan:

1.  What is going to be backed up?

Read the rest of this entry »