kinetik IT blog spot

Tech Buzz at its best

Creating a Disaster Recovery Plan for Your Business

It could be as big as a powerful weather event. It could be something as small as a car crashing into a power line just a few miles from your business. It could be as simple as an equipment failure. No matter what the cause, though, it all adds up to one thing for your company – disaster. Take a moment to imagine your company without power or access to your data for 12 hours. Multiply that. Imagine your business without access to any of that for 24 hours. 48 hours? It seems like just a day or two of downtime shouldn’t do that much damage to your company, but the simple reality is that it can and will.

Enter disaster recovery planning.

Every single business, no matter how small or large, has to have a comprehensive disaster recovery plan today. That problematic event is literally just around the corner. It doesn’t take much, and learning how to make certain your business will survive is an absolute must.  

Wondering how to get started when you’re already spending each day trying to stay afloat in a problematic economy? It’s an overwhelming prospect, but we can help.

The premiere IT consulting company in Phoenix, we can be here from start to finish. Take a moment to look at the services we offer.

  • Planning: Easily the most important phase of disaster recovery, we know that you may not be familiar with how to match your needs with the technology that can help. We’ll help decide what your risks are and how to protect your company, as well as how to budget for those expenses.

  • Documentation: You can plan forever, but if you don’t actually document what has to be done, you can’t respond to disaster as well as you’d like. We’ll help you get an inventory of your assets together as well as show what backup technologies are in use and the process that must occur should disaster finally hit.

  • Implementation: It can be tough to know what to do once it hits, but we’ll work with your staff members to implement all of your solutions so that what should happen in the event of a disaster actually does happen.

  • Testing: You want to make certain that you actually know what to do when disaster strikes, so we’ll help with this phase too. Once things are implemented, we can help you understand how well the backups work and exactly how the data is restored. We can even do this periodically to help test plan updates.

      You don’t want to be left in shambles when a disaster occurs, no matter how small your company or your IT budget may be. To learn more about our IT consulting and disaster recovery planning services contact us at or follow us on Facebook, Twitter, or LinkedIn.




3 Things to Keep In Mind As You Develop A New Ecommerce Website

Launching a new e-commerce website can be a bit daunting. There’s so much that can go into the planning and execution, and getting it wrong at launch could spell disaster for the entire enterprise. Fortunately, there are lots of ways to get it right, but the key lies in proper planning. Here are the three things you have to consider during those planning stages of your site.

  1. Think About the Boring Stuff: Sure, designing the storefront and how customers will interact with it is easily the best part of building an e-commerce store, but there’s so much more to it than that. You have to consider lots of other factors, particularly those that aren’t quite as much fun. There are big financial concerns behind an e-commerce site as well as security and legal matters that must be considered. Simple stuff like ensuring your merchant accounts are updated and ready to handle electronic transactions as well as more complex factors like PCI compliance and sales tax all have to factor into the planning phase at some point.

  2. The Shopping Cart Matters: There are lots of free shopping carts online these days, but they’re very basic. You’re only going to get an “Add to Cart” function and a total. You have to be able to have the functions customers are looking for like shipping cost estimates, product recommendations, and more, so look at your options carefully. Customers expect more thanks to big retailers like Amazon and Target, and if you can’t offer it, they’ll find someone who can.

  3. Think About Structure: Your design team will likely call this Information Architecture, and the more products you offer, the bigger concern this has to be. You need a good way for customers to find what they’re looking for, so feel free to browse competitor sites to see how they do it.

      E-commerce site planning can get a little complex, but we can help. The IT consulting firm Phoenix trusts most, we’re here to help every step of the way. To learn more, and to stay up to date contact us at or follow us on Facebook, Twitter, or LinkedIn.

Is Outsourcing IT A Good Idea?

Many small companies are concerned about the prospect of outsourcing anything. The reality, though, is that as you grow, you can’t handle everything anymore. Whether you shift responsibilities to those in your management team or you look for a company to handle some tasks, the idea of letting go is a bit difficult. That’s particularly true when it comes to outsourcing your IT needs. As your company grows, your IT needs become far more complex, and there’s simply no way that you can keep up with your own needs and still manage your company properly. Instead of building an IT department you can’t afford to keep, it may be time to look toward outsourcing your IT work.

IT consulting companies abound these days, and with good reason. There are many other businesses in the same spot you are, and outsourcing your IT work makes sense. Not sure there are any real benefits? Here are a few to consider.

  • Saving Money: Building an IT department from scratch is just out of reach for many people. You’ll find that you can control expenses far better by outsourcing than you ever could by hiring dedicated staffers. You won’t be paying for individuals when there aren’t problems, and you’ll know exactly how much to budget up front.
  • Better Resources: If you’re a small business, it would be tough to match the resources of bigger companies. There just isn’t the funding in the budget. By outsourcing, though, you get access to amazing resources without the amazingly large price tag. Big businesses maintain cutting edge systems, and you can have access to that same technology for a fraction of the cost.
  • Focus On Your Company: If you only need to pick up the phone when you need IT help, then you don’t have to take quite as much time away from your own goals and objectives. You focus on growing your business every single day, not dealing with this IT problem or that one.
  • Reduce Your Risk: Every business has to deal with risk at some point in time, but outsourcing means you have to deal with far fewer risks because you’ll have a partner in managing much of that risk for you. They’re going to be far better at deciding which risks to undertake when it comes to your technology and how to avoid the worst bits than you could ever be.

For many companies, outsourcing IT just makes good sense. The key is to find the right IT consulting partner to meet your needs, then you’ll start to level the playing field and help your company truly excel at what it does best every single day. Contact us at or follow us on Facebook, Twitter, or LinkedIn.

Keeping Security in Perspective

As we’ve learned from the recent attacks on major retailers Target and Nieman Marcus, and websites like LinkedIn and Kickstarter, cyber theft is a big business – and focused on big business.  When hearing stories about compromised security, it’s easy to become concerned about the level of safety on one’s own computer.  It’s also important to keep fears in check.

Discussing the topic, Kinetik I.T. President Josette van Stiphout had this to say:

security level

“I think we all get paranoid when these things happen, but we also need to keep it in perspective, because professional cyber hackers are out for massive information. They're most likely not going as much after the small individual business to capture data. They're going to go for the masses.  They want to get as much data in the least amount of time, and therefore they are targeting industries and sites that store a lot of personal data – for example the retail industry is now a huge target, with credit card numbers, personal information – that’s what they're going to go for.”

Josette advises not getting overly paranoid, suggesting that “if you are the small individual business, you want to make sure that your data is secured, that it's not easily accessible, and that you have a strong authentication process that has been tested. Furthermore, check for “back-doors” that could provide easy access for hackers to your network and servers.” Taking action that’s appropriate to your business should be a consideration.

Although cyber-security is about dealing with professional hackers and thieves who always seem to be a step ahead of technology, not having appropriate security levels in place can cause a company a great deal of issues and headaches.  

As a premier provider of internet and information technology solutions and resources, Kinetik I.T. has a mission to move clients forward, enabling them to reach their full business potential by providing products and services specially suited for their individual business needs.  To learn more, and to stay up to date with Kinetik I.T., visit or follow Kinetik on Facebook, LinkedIn or Twitter.

Kinetik I.T. At a Glance

At Kinetik I.T., we love and take pride in what we do, specializing in web site design, internet marketing, branding, software design and programming, web application development, ecommerce and shopping cart applications, computers and networking, and disaster recovery planning.  While we work with a wide variety of clients, we guarantee the highest quality work in all areas to achieve the client’s goals and vision. 

To give an overview of our work, we maintain a CV, of sorts, although the projects listed are only a small representation of client projects in the Phoenix-Scottsdale area, and across the US.  We provide this resume on the Kinetik I.T. website, as a method of outlining our diversity in experience and skills. We want both our continuing clients, as well as potential ones to see the range of our expertise.  All of our software developers and analysts have participated in the projects listed in this resume and have various skills and expertise that will contribute to any project.


Skills Summary

  • Analysis (Functional Specification)
  • Database Design
  • Software Design (User Interface, External & Internal)
  • Implementation & Coding
  • Testing
  • Integration
  • Client/Server (n-Tier)
  • Project Management

Operating Systems

Windows 8, Windows 7, Windows Vista, Windows XP,  Windows 95/98/2000, Windows NT, Windows Mobile, Windows PocketPC


Technical Expertise

Microsoft Access, Microsoft SQL Server, SQL Reporting Services, VB.NET, Visual Basic, C# (C-Sharp), VBA (Visual Basic for Applications), VB Script, ASP.NET, ASP (Active Server Pages), Silverlight, SharePoint, Microsoft Office Automation (Excel), Visual Studio.NET, Visual Studio, Visual InterDev, Expression Web, XHTML, HTML/DHTML, CSS Standards.


KINETIK I.T.’S PROGRAMMING STANDARDS, GUIDELINES & TECHNIQUES FOR: Windows Application Development, Microsoft Visual Basic, Microsoft Access, Web Application Development.

To learn more about services and products, and to stay up to date with Kinetik I.T., visit or follow Kinetik on Facebook

Keeping Info Safe Online

When a major national retailer is the victim of cyber-attack, it’s headline news.  Late in 2013, Minneapolis-based Target Corporation and Neiman Marcus succumbed to cyber thieves.  It’s now estimated that between November 27 and December 15, 2013 – prime holiday shopping season – the payment card data of 40 million shoppers who bought merchandise in-store at U.S. stores, as well as the personal information of another 70 million customers, was compromised. 

According to available data, the Target mishap is one of the country’s largest recorded data security breaches. Considering the scope of this crime, it’s easy to assume a heist the planning and implementation of which would rival those of a modern-day thriller. To the contrary, the security breach is believed to have been the result of that most innocuous of daily trifles: phishing emails.

According to recent research, while the amount of phishing is decreasing, the methods employed are more targeted, with cyber criminals becoming more skillful. And harmless as it may seem when it appears in the inbox, one of the most effective subject lines, as determined by cyber-security experts at Websense of San Diego, is an invitation to connect on LinkedIn. And if the first and second emails don’t draw in the prospect, data indicates that the third email will finally get them to click a link or open an attachment – though these may not always prove malicious.  Phishing emails proved to be Target’s downfall, when an employee of third-party contractor Fazio Mechanical Services Inc. of Sharpsburg, PA clicked through from a “malware-laced e-mail phishing attack.” Unfortunately, the company’s detection software simply wasn’t capable of protecting the company’s network from the threat.

This kind of incident leaves a business owner to ask, "What can I do to make my company data more secure?"  The best place to start is with awareness.

Security is not a one‑size‑fits‑all approach, because each business is unique, with different network and data challenges. Security measures also depend on the size of the company, the amount of business, on what data is at risk.  

Employees can also be a threat to cyber‑securing the business. The data breaches can occur by simple human error – as with the Target breach, and more recently with Kickstarter, the popular online crowd-sourcing website. This type of error can be related to many factors, among them poor decision‑making, or the consequences of someone else's decision‑making, and not understanding security policies and procedures.

Understanding existing security policies and protocols is imperative, and assembling a security matrix to addresses internal organization risk is a great place to start.  Begin by assessing and assigning appropriate levels of access and security on email servers, employees' tablets or mobile phones. 

When cyber attacks are in the news, it’s important to maintain perspective. Small-to-medium-sized businesses will have less to worry about than a major like Target, or a site with the online reach of Kickstarter.  While keeping data safe should be of concern to every business, the level of security should be appropriate to the size and scope of the individual entity and specific data or intellectual property to safeguard. 

To learn more about services and products, and to stay up to date with Kinetik I.T., visit or follow Kinetik on Facebook, LinkedIn or Twitter.