Wednesday, December 29, 2021

Are your data security measures strong enough?

Are your data security measures strong enough?

Let me start this blog by asking you a question. How did your business respond to the security threats brought on by the COVID-19 pandemic? The reason we are discussing this is because a recent survey conducted by Password Keeper and Ponemon Institute revealed that during the 2020 Coronavirus pandemic, the effectiveness of organizations’ IT posture in terms of cybersecurity dipped by almost 30%.

One of the main reasons for the compromise in IT security was the hurried transition of so many businesses to the remote work model. Working from home often meant the staff were using their personal computers to access work data, sometimes, even on shared WiFi networks without the latest software updates, security patches and firewalls--all invitations to cybercriminals. But, the research also pointed out that almost 50% of the respondents were also concerned about the physical safety of their data. When employees work from home, business data is stored on their personal devices. This includes personal laptops, desktops, thumb drives, external hard disks and sometimes, even smartphones and tablets. Ensuring the data stored in such a manner is not lost, stolen or inadvertently made public is a huge challenge. The cloud can help resolve this challenge to some extent. By migrating your data to the cloud you get a range of benefits such as
  • It is easily accessible-from anywhere, anytime using an internet enabled tablet, computer or even a smartphone
  • The cloud service provider offers multiple layers of security to keep your data safe from prying eyes
  • There is no chance of losing data due to misplaced thumb drives or computer hard disk crashes
An MSP offering cloud services will be able to assist you in making the transition from physical data storage to the cloud smoothly. They can also address cybersecurity concerns and offer solutions. However, migrating to the cloud alone is not the solution to all data security issues. You will still need to train your staff on how to identify and avoid malware attacks, phishing scams and to practice basic password hygiene and data security best practices.

Wednesday, December 22, 2021

WFH is here to stay Are you ready?

WFH is here to stay. Are you ready?

The year 2020 was nothing like what we had seen before. At a certain point in time, it felt like the world would come to a standstill. With lockdowns and travel restrictions imposed across the world, businesses were pushed into a ‘new normal’. One of the things that was a part of the ‘new normal’, was working from home. This WFH set up brought along with it multiple challenges, especially to those organizations which weren’t into this model already. Accessing critical work information, carrying out meetings on Zoom, attending conferences remotely and even setting up trade show booths online, were all new concepts. While the pandemic may be temporary, one thing is certain--the remote work culture is not.

WFH existed even before the Coronavirus pandemic. There were a sizable number of companies--primarily in the IT industry that routinely hired remote workforce. Freelancers operated remotely too for the most part. However, the pandemic forced every company that can operate remotely to adopt the WFH model. While the initial switch was cumbersome, challenging and even frustrating, the benefits offered by the WFH model can’t be discounted.

Here’s how it benefited employees:
  • Helped save time and money that would otherwise be spent on commuting from home to work
  • Offered greater flexibility, as working from home let employees choose their working hours, at least in some cases
  • They needed fewer days off as things like staying home and caring for a sick child/spouse or an elderly parent didn’t mean having to take a day off work anymore
  • With lesser workplace oriented distractions, they were able to accomplish more in lesser time, which means they had more personal time and a better work-life balance
From the organizational perspective, work from home:
  • Meant more productive, focused, energetic employees with workplace distractions and long commutes eliminated
  • Resulted in lesser absenteeism as employees had flexible work schedules and could be home when their presence was needed, without having to take a day off
  • Helped them save on costs related to maintenance, utilities and employee recreation that they would be otherwise incurring
  • Can help companies save on huge rental expenses by trading larger office spaces for smaller/shared workspaces and conference rooms
So, there’s no doubt that the trend of WFH will continue well beyond this pandemic and become a norm in daily lives. It seems to be creating a win-win situation for both, the employees and the organizations they work for. However, for WFH to function smoothly, you need to have a solid IT infrastructure ensures the transition from the traditional office setup to the WFH model is smooth and the integration between the various elements involved in the new WFH environment is seamless.

Are you ready to switch to the WFH mode? It’s time to get in touch with a managed IT service provider who can help you make this move.

Wednesday, December 15, 2021

Data security in the ‘Work-from-home’ environment

Data security in the ‘Work-from-home’ environment

2020 threw a lot of challenges at the world. One of them, from the business perspective, that overshadowed the others was cybersecurity. How to ensure data safety and security in an environment where businesses can’t really control what employees do even during work hours? With the world almost a year into the pandemic, new best practices emerged that will be in use not just during the pandemic, but probably also in the future, post-pandemic era. Because the trend of working from home now seems to be here to stay. This blog will discuss some best practices for data security that can be deployed when working remotely.

  • If you can provide your employees with a computer that they will solely access for work, then that solves the majority of the issues. When employees use their own devices for accessing work data, the risk of a security breach is higher as businesses don’t have any control over staff’s personal devices. Your employee’s computer may have security loopholes such as pending updates and security patches or unauthorized software programs. If, instead, it is a company device, you can install control mechanisms that limit what your employees can do with the device. You can impose firewall restrictions, make it a part of your intranet and also monitor employee activities freely.
  • If you are allowing employees to use their personal devices for work purposes, you can encourage them to keep their device safe by alerting them about software updates, security patches and offering to install the latest version of antimalware software for their devices. This is a win-win situation for you and your employees, as you get to keep your data safe, while they get to keep their device and personal data secure.
In either case, you need to educate your employees on the basics of data security. These include password hygiene, identifying phishing attempts, attachment hygiene, etc.

Don’t forget the cloud! The cloud can help you keep your data safe and secure even in the remote working environment by adding layers of data security and eliminating storage of data on local hard drives and removable storage devices. Contact a cloud service provider today to learn more!

Wednesday, December 8, 2021

How the cloud is a solid survival tool for your business during a crisis

How the cloud is a solid survival tool for your business during a crisis

One thing the Coronavirus pandemic taught businesses is the fact that it is important to move with the times and adopt and adapt to the latest technology. While you don’t have to be the first one in the market to invest in the newest technology, once its effectiveness and usefulness is proven, it does make sense to switch to it. Here’s how the cloud allowed businesses to overcome the challenges posed by having to suddenly switch to the remote operations model.

Challenge-1: Access to critical data and applications

This could have been easily resolved by migrating to the cloud. The cloud offers unparalleled connectivity to your data—from anywhere and at any time, with any internet-enabled device.

Challenge-2: Data safety, cybersecurity concerns

The cloud provides solutions to data safety and cybersecurity challenges as well, as data stored in the cloud is naturally much safer and difficult to break into than data stored on your employee’s home computer. The cloud offers multiple layers of security, including some from your cloud service provider.

Challenge-3: Data loss

With the cloud, businesses wouldn’t have to worry about losing data, as it wouldn’t be stored on their employee’s personal computer, but at a centralized location in the cloud.

Challenge-4: Hardware issues

The cloud rendered any hardware issues non-existent, as the employee’s personal devices were just gateways to access their work stored in the Cloud. They needed devices that met the basic specifications, and the rest of the work was happening online, without additional load on personal devices.

Challenge-5: Phones

Businesses that had adopted the VoIP (Voice Over Internet Protocol) were able to overcome this challenge easily. VoIP allows you to communicate by sending voice as data packets using the internet. The VoIP system is primarily software-based and can be accessed from anywhere, using an application that your VoIP provider offers. (Physical instruments are optional). This meant, companies with VoIP systems could keep their office phone numbers responsive even when their staff were working from home.

While these technologies can help a great deal to maintain business continuity, you will need the assistance of a reputable MSP to deploy them and also to ensure they are functioning as they are supposed to. Plus, there are always other security concerns that crop up in a remote working environment when you can’t monitor your staff’s IT activities. Your MSP will be able to offer solutions and control mechanisms that can help put those concerns to rest.

Wednesday, December 1, 2021

Tech agility: A must-have for crisis survival

Tech agility: A must-have for crisis survival

It is a known fact that survival of any species depends on its ability to adapt to change. One major change for businesses in 2020 was the need to switch to the work-from-home model to keep things running during the time of pandemic. When countries all over the world started imposing lockdown restrictions, companies had no choice but to switch to remote operations if their line of business allowed them to do so. This blog post discusses the key challenges faced by businesses that had failed to adopt the latest technology on time.

Access to critical data and applications

For businesses that didn’t store their key data and applications in the cloud, this was a huge challenge. How do you ensure each of your employees have access to all the business data, programs and apps they need to operate efficiently? Companies that had already adopted the cloud as their core data storage means they didn’t face this challenge: everything was cloud-based and accessible from anywhere, using any internet enabled device (laptops/PCs/tablets/smartphones, etc., )

Cybersecurity concerns

With employees working from home, businesses’ fears of cybersecurity incidents were increased. Cybercriminals, on the other hand, knew full well all the security lacunae that existed in a hurried remote working environment setup and exploited them to the fullest. Industry reports showed that the initial few months of the pandemic saw an increase in cybercrime and related attacks on businesses.

Data loss

For businesses that didn’t operate in the cloud, data loss was another angle to look into. How do you ensure data backup and recovery when your staff is using their personal devices for work? Also, how to ensure they are taking all the precautions necessary to keep the data they are storing on their devices, safe?

Hardware issues

Some businesses provided their employees with work devices at home. For example, employees in some companies were allowed to take their office computers home for work use. But, that still didn’t solve the backup and recovery or cybersecurity challenges entirely, because the management still lacked ways to maintain control over the devices.

Phones

With employees working from home, it was a challenge for many businesses to manage their phone numbers--especially for client facing employees. Businesses with VoIP phone systems could make this transition easily, whereas those still relying on the traditional phone setup had to resort to cell phones and couldn’t use their business numbers for a while.

Key lesson: Move with the times, adopt new technologies, adapt to newer ways of working

Wednesday, November 24, 2021

What the COVID-19 crisis taught us about the cloud and business continuity

What the COVID-19 crisis taught us about the cloud and business continuity

The COVID-19 pandemic has changed life as we know it, in many ways. While its impact on our day-to-day lives has been huge, the impact has been even more severe from a business perspective. The social distancing norms, staggered operating hours so as to limit crowds, the masks, shields, barriers, and what-not! From the business continuity perspective, companies have had to adapt themselves to the new normal very quickly.

During this global crisis, one technology that truly came to the rescue of business big and small was the cloud. The cloud made it possible for businesses to keep their operations running even with staff working remotely. With all critical data stored online, all that was needed was a compatible device with an internet connection and it was business as usual...well, almost.

Here are some core business challenges that were resolved due to the cloud.
  • Access to core business data and software programs that were needed for smoothd day-to-day operations
  • Data security concerns, though not entirely non-existent due to the use of personal devices, were largely taken care of, thanks to multiple layers of security offered by the cloud service providers
  • There were no “hardware hassles”...companies that were already on the cloud didn’t have to worry about the logistics of providing office computers to their employees working from home. With all the data stored online, they could use their home computers or tablets to get the work done.
Earlier what was perceived as an advantage for employees (the permission to work from home) was now mandatory for survival of the business. Even businesses that allowed employees to operate from home before the pandemic had a tough time migrating their entire setup to the work-from-home model.

Wednesday, November 17, 2021

What’s your argument against an SLA with an MSP? Part-2

What’s your argument against an SLA with an MSP? (And why it doesn’t hold water) Part-2

In our last blog post, we discussed 3 reasons SMBs usually cite for not signing a service level agreement with an MSP. In this blog post, we suggest how an SLA with an MSP will add value to your business, irrespective of your business size, budget and the presence of an in-house IT team.

Reason#1: Our IT requirements are limited

IT is not a one-time thing where you can follow a set-it-and-forget-it approach. Want this to run smoothly? IT needs regular maintenance-- a service level agreement with an MSP is the answer. Regular data backups, timely security patch application, software updates, etc, are all important and won’t happen unless you have a dedicated resource working on them. Plus, there’s the issue of network latency. Services like periodic network monitoring offered by MSPs ensure that any latency issues are identified and taken care of before they result in a major system failure.

Reason#2: We are tight on budget

Agreed that SMBs may not have the kind of revenue inflow as expected in large organizations, but that’s no reason to skimp on your IT requirements. Skimping on IT needs and diverting the funds elsewhere may sound tempting, especially when your IT infrastructure is running great, but this can cost you a lot more in the event something goes wrong. Let’s take a look at a malware attack scenario, for example. If you don’t have an SLA in place, you are most likely to reach out to an IT expert or MSP on a transactional basis. It will not only result in a sky-high bill, but also, there’s no guarantee that you will be immediately attended to: customers with SLAs get preference over transactional ones in the event of an emergency. Plus, every minute your IT infrastructure is down, you are losing potential revenue--through online or even offline sales. In the event of a data leak or a compromise in customer/vendor data due to the malware attack, you are liable for penalties and may be even sued by your clients. So, saving a few bucks here and there by cutting back on IT expenses can prove much more expensive later.

Reason#3: We have our in-house IT person/team

So, you have in-house IT personnel? Great! But there are ways in which an SLA with a managed service provider can still add value to you. This kind of setup is called the co-managed IT model. By bringing an MSP onboard when you have an in-house IT team, you B
  • Benefit from their expertise and enrich your in-house IT team’s knowledge
  • Enjoy flexibility in terms of meeting your IT needs as you can scale your IT up or down based on your business needs
  • Reduce payroll expenses incurred as result of hiring new IT staff in-house
  • Help your in-house IT team focus on more important tasks by outsourcing the mundane IT processes to the MSP
  • Get an extra hand to assist your in-house IT personnel in the event of a major IT issue
  • Have 24/7 IT support, something that may not be viable with a small in-house IT team
Having a service level agreement with a managed service provider adds value to businesses under all circumstances, and should be considered an essential, not an option.

Wednesday, November 10, 2021

What’s your argument against an SLA with an MSP? Part-1

What’s your argument against an SLA with an MSP? (And why it doesn’t hold water) Part-1

Managed IT services are becoming more popular by the day. Businesses, big and small, are bringing managed service providers onboard to handle their IT requirements. The bigger IT players like IBM, Accenture, CISCO act as MSPs to larger organizations, while the typical managed service provider is often hired by SMBs. However, there’s a question that crops up time and again--Do SMBs really need an MSP? SMBs are sometimes in two minds when it comes to bringing an MSP on board and typically use one of the following justifications.

Our IT requirements are limited

A lot of businesses in the small to mid-size range believe that their IT needs don’t warrant a full-time service level agreement with an MSP. They believe the only times they need to invest in IT is at the start of their business or when rolling out new technology. As a result, they don’t see much value in signing a service level agreement with an MSP.

We are tight on budget

SMBs also tend to cut on the IT budget and invest those funds elsewhere--generally in areas where they see tangible results, such as hiring new customer-facing staff or a new advertising campaign. So, when SMBs find themselves a little tight on the budget, the IT department sees the cut.

We have our in-house IT person/team

Businesses with an in-house IT expert or even a small in-house IT team feel that is sufficient for handling any IT needs and an SLA is just an added expenditure.

So, did your reason make it to the list? Stay tuned for our next blog post, where we will discuss how an SLA with a managed service provider can add value to your business.

Wednesday, November 3, 2021

Equip your business with the IT foundation it needs to compete and win

Equip your business with the IT foundation it needs to compete and win

In a recent industry survey, it was found that one of the biggest factors holding back small and mid-sized firms from achieving their business goals was IT. One may argue that smaller businesses lack the capital that the bigger players have to invest in their business, but even with all other aspects being more or less equal, the difference brought about by their lack of investment in IT was found to be a key differentiating factor--far more than other elements such as marketing, human resources and even industry expertise.

There’s no denying that IT plays an important role in keeping any business running. Ignoring your IT infrastructure can prove disastrous, but maintaining an in-house IT team to take care of it can be expensive--especially for SMBs. By outsourcing IT to a trusted MSP, businesses can benefit from significant cost savings that arise from not having to hire an entire IT team in-house.

The second instance where having an Service level agreement (SLA) with an MSP helps is where you don’t have an in-house IT team. Calling on an IT service provider when there is a crisis or a there is a one-off event may mean significant surcharges

When businesses have SLAs, the MSP will be regularly monitoring their IT infrastructure. A typical service agreement will cover regular backups, periodic network monitoring for latency issues, timely security updates and patch application, etc., This means the chances of severe IT issues will be drastically reduced. Most of the time, the problem can be identified much sooner before it becomes a full-blown issue. And, in the event of an IT emergency, a client having a service agreement will be prioritized by the MSP. One time emergency requests fall to the end of the line.

Irrespective of the size of business, MSPs can add tremendous value by bringing scalability, flexibility and innovation to the standard IT set-up and help build the IT foundation it needs to compete effectively and efficiently in the industry.

Wednesday, October 27, 2021

Transitioning from average to best-in-class with IT

Transitioning from average to best-in-class with IT

Many small or mid-sized businesses don’t focus much on IT as they should. For a lot of them, the focus is on customers, ensuring they have enough staff to meet their client needs, expanding their business and driving revenue by selling. IT comes into the picture initially when the business is being set up. Once they have their IT infrastructure up and running, it tends to take a backseat. The typical mid-sized or small business owner seems to prefer the firefighting approach to IT--meaning, they reach out to an IT service provider only when they have an IT problem.

Interestingly, this is the key difference between the average SMB and best-in-class SMBs. The best-in-class SMBs tend to adopt a more proactive approach towards IT. They either have an in-house IT team or sign-up with a Managed Services Provider to take care of their IT needs on a regular basis. In contrast to the average SMB, the best-in-class almost always has a Service Level Agreement (SLA) with a reputed MSP.

Businesses that have service contracts with MSPs have access to the latest technology. The IT industry is constantly evolving and managed service providers are well aware of the changes. They know it first when a new technology is gaining widespread adoption across various industry verticals and can advise their clients accordingly. On the other hand, the in-house IT team may be too busy handling the day-to-day IT requirements to be able to focus on new technology and the various ways in which it can be applied to benefit the business. This specialized focus of MSPs also makes them a great asset to have on board when implementing new technologies or deploying new IT projects within the business.

Having a dedicated MSP-partner to take care of all IT needs helps businesses give 100% to other areas that help the business grow. With IT issues off their shoulders, management can focus more on clients, brand and market expansion.

Thursday, August 5, 2021

All Good Things...

 

Collaboration in business is not a new thing



As children we are told by our parents that "All good things must come to an end.." And so it is in the world of technology.

Today we at NetWerks Strategic Services recognize a technology milestone..  25 years ago, we became a Novell partner..  What's a Novell, you might be inclined to ask..  Once upon a time, there was a network operating system vendor named Novell who had the whole world in their hands.  Yes, before Windows Server, there was this operating system called NetWare which was for many years the market leader in connecting systems together. That might not sound like much, but back in the day, it was huge. In fact, you actually had to be very knowledgeable on both product and support, and pass some brutal certifications, just to play in the Novell sandbox..  Today – if you can fog a mirror and write a check, many vendors will consider you an “authorized partner”.

 Why do I bring this up..  Call it nostalgia..  call it a cry out for sympathy..  call it drivel – you decide..

 Today we finished migrating the last of our current clients off of what was then a popular Novell (now Micro Focus) product.. this amazing product called GroupWise. The day has been bittersweet. 

 Back in the days before Microsoft Exchange and its plethora of latent vulnerabilities lived a collaboration (email) system called Novell GroupWise.  It was ahead of it’s time, and had many features that were considered the gold standard among communication systems. In it’s time, it was king.  Easy to use, rock solid stability, and secure.  Veritably impervious to computer virus transmission short of opening an infected attachment directly made it a big hit for security wonks like yours truly. Admins loved it for the fact that once properly configured, it was a set and forget system for the most part.

 One thing Novell failed to execute on (besides marketing), sadly, was work closely with other software vendors to integrate the GroupWise ecosystem with other line of business applications.  When Microsoft Office and Exchange took a dominant position as the de facto standard of office collaboration utilities, a key factor was that Microsoft invited integration with various applications. Through the use of object linking and embedding API’s, integrating with other applications was fairly straight-forward.  Regardless of the fact that OLE is a double edged sword, Microsoft began wolfing down Novell’s lunch.  It truly is a shame, as GroupWise was in all ways superior at that time.  Unfortunately, the lack of integrations and an inability to properly market the product had taken it’s toll.

 Present day.. GroupWise is still a thing.  And it is still, as a rule, impervious to viruses as it does not script anything within the message (which is still a big concern with the Outlook email client). Unfortunately, the inability to directly integrate the platform with many popular line of business applications remains. Without robust support of third party application vendors, GroupWise has been relegated to a less than main-stream existence. It still has a following, and some level of market-share, but nothing like in it's heyday.

 Parting is such sweet sorrow as a rule, but in this case, for my last remaining GroupWise users, the ship has sailed, the need for seamless integration now a priority.  Another factor was the support challenges.  As fewer and fewer mainstream users entered the pool, support resources seem to have dwindled.  Innovation has slowed, and the once proud mover of messages has been pushed to the back end of a dimly lit shelf.

 Will GroupWise ever experience a return to its former glory? I couldn’t tell you.  Time will tell.

 If your organization is still working with GroupWise – more power to you.  If you need assistance and are having trouble getting answers, get in touch with us, we will do what we can.  If you are looking to abandon ship and migrate to either Microsoft (Office) 365 or Google Workplace (G-Suite), we can help. https://getnetwerks.com/connect.html

Wednesday, May 12, 2021

Social media at work what could go wrong?

Social media at work...what could go wrong?

As a business, there is no doubt today that you need to make your presence felt on major social media platforms such as Facebook, Twitter, Instagram and LinkedIn. But social media also exposes you to cybercriminals. In this post we talk about the steps you can take to ensure your social media account doesn’t become a gateway for cybercriminals to access your data.

Make someone accountable
The first step to a successful and safe social media experience as a company is to make someone in your organization accountable for it. Designate a social media manager who is responsible for maintaining your company’s social media accounts. This person should oversee everything--from the posts and pictures in your company account to approving/disapproving ‘Friend’/’Follow’ requests.

Train your employees
Of course you should train your employees who handle your official social media accounts about the security threats and how they need to steer clear of them, but you also need to train other employees who are not on your social media team as they could be a weak link that a cybercriminal could exploit to reach your business. Seems far fetched? Not really. A lot of people trust their ‘friends’ on social media and also unwittingly share a lot of information, which can be used to hack their personal accounts and devices, which in turn, may act as a gateway to your business. Teach your employees about general social media best practices in terms of security and also educate them about the privacy settings they can use to ensure there data is shared with trusted individuals only.

Take the necessary security measures
Make sure the devices you use to access your social media accounts are protected with firewalls and anti-malware tools and all security updates and patches are up-to-date.

Password hygiene
Practice good password hygiene and encourage your teams to do the same. That means no password sharing, no sequential letters/numerals, no obvious words or numbers as your social media account password.

Frame a social media policy
You should also frame a social media policy that spells out the dos and don’ts of social media that everyone in your organization should follow. This is important from various perspectives as employee’s statements on social media may be perceived as a reflection of your business’s values, whether you like it or not. This can make your business a target of cybercriminals and lawsuits.

Putting your business out there on the social networking sites gives your brand a lot of exposure, presents paid advertising opportunities and even helps you build and manage customer relationships, but as discussed, it can be tricky to navigate in terms of security. Businesses may find it overwhelming to manage their social media security strategy all by themselves can reach out to a managed services provider. An MSP with experience in social media security can be a valuable asset in helping you build a strong social media security strategy.

Wednesday, May 5, 2021

Multi-Factor Authentication 101

Multi-Factor Authentication 101

You have probably already come across the term multi-factor authentication. The concept is not new, but has caught on really quick of late. In this post, we will discuss what multi-factor authentication is and why you should be adopting it.

What is multi-factor authentication?
Multi-factor authentication is basically the use of more than one credential to gain access to data. It is a combination of multiple access credential types. For example, instead of gaining access to an email account by just typing your username and password, you will be asked to further verify your identity by entering some other information, such as a pin or a one-time password (OTP) that was sent to the phone number linked with the email address you are trying to log into.

Why do you need multi-factor authentication?
Multi-factor authentication offers an additional layer of security. Simple access control measures such as logging in with user ID and password are increasingly being breached by cybercriminals because no matter how much we condition ourselves to follow good password hygiene, sometimes, we slip up. Have you ever been guilty of

  • Writing down your password so you don’t forget it
  • Sharing your password with someone just to get the work done faster
  • Used the same password for multiple accounts just because it is easier to remember
  • Creating a password that was obvious/easy to figure out. Examples include your date of birth, numbers or letters in sequence, your name, etc.,
Multi-factor authentication can help prevent cybercrimes that happen due to leaked/hacked passwords.

How does multi-factor authentication work?
The working of multi-factor authentication depends on a combination of the following 3 elements.

  • What you know
  • What you have
  • Who you are
The user has to prove their identity by answering the questions related to each of these 3 elements. User IDs, passwords, secret questions, date of birth, etc., fall in the first category (What you know), while OTPs sent to your smartphone, a physical token or an access card belong to the second category (What you have) and the third category (Who you are) includes biometric authentication such as retina scan, fingerprint or voice recognition.

Multi-factor authentication is no guarantee of data safety, but it certainly reinforces your data security. While there are tools available in the market that you can purchase and deploy, you could also connect with an MSP to help you implement multi-factor authentication across your network smoothly.

Tuesday, April 27, 2021

Why MSP relationships fail

Why MSP relationships fail

A lot of SMBs opt for managed service providers who can help handle their IT requirements, and for the most part, it works well. Almost everyone knows the benefits of having a MSP manage your IT. Increased cost savings, ability to focus on your business without worrying about IT, better IT support and expertise, and so on. But, there are times when the managed IT services model fails, leaving business owners to wonder what went wrong. This blog discusses some key reasons why MSP relationships fail.

You didn’t do a reference check
Did you just pick the first MSP you found on the Google search? Did you just go by the presentations they gave you, or the information on their website? Always remember to ask your MSP for references. Talk to someone they work with and get feedback.

They don’t have enough staff
If your MSP is short of staff, they won’t be able to give you the attention you need. One of the biggest advantages of bringing an MSP onboard is having someone who proactively manages and monitors your IT requirements-- something you cannot do without a full fledged IT department. So, it is important that your MSP is well-staffed.

They are not experienced enough
Before you bring an MSP on board, make sure you pay attention to how long they have been in business. This is important because the whole idea behind hiring an MSP is to leverage their knowledge and expertise. Secondly, someone who has been in the business for quite some time is more likely to be able to scale with you as you grow.

They said they will be there, but...
You want your MSP to be available 24/7, because with IT, you never know when the problem will arise. Not only should your MSP be proactively monitoring your IT infrastructure to ensure everything runs smoothly, they should also be able to resolve IT problems when they happen--time and day notwithstanding, so that your business is back up and running as soon as possible.

They are not able to provide you with all that you need
Sometimes, as you grow, your IT needs change. You may need much more support and new technologies that you didn’t think you’d need earlier. In such cases, if your MSP is not able to grow and scale with you, then the relationship won’t work.

When choosing an MSP, think of the whole process as a partnership, and not a one-time deal. When you look at the relationship as a long-term one, you are more likely to consider all the factors that go into making your relationship with the MSP work in the long run.

Tuesday, April 20, 2021

Do your homework: 3 things to do when looking for an MSP

Do your homework: 3 things to do when looking for an MSP

Thinking of hiring a Managed Service Provider, but not sure how to go about it? Here are a few things to do before you zero in on one.

Figure out what you have already
The first step in a good plan is to figure out where you stand currently. Before you talk to an MSP, conduct an audit of your IT infrastructure to decide what you have currently. List all your hardware and software. When performing this IT audit, don’t forget other technologies that you are using, such as biometric access systems, CCTV systems and even telephone systems. You may think they are irrelevant as they are not directly related to your IT infrastructure, but, in the near future you may want them all to be connected to one another, and so, including them in the audit and inventory right now is a good idea.

Figure out what you need
This is the next step. After you determine what you already have, the next step is to figure out what you need. What do you want to add on or remove from your existing IT infrastructure? Are your servers too slow? Do you want to switch to the Cloud instead of traditional services? Do you want a Unified Communications set up instead of your current PBX phone line? Do you want to shift to a work-from-home model and need the infrastructure to support that?

Do your research
Now that you are clear about what you have and what you need, start doing your research. If you have an in-house IT team, you can ask them to evaluate the various options that can help you reach your goal. If not, then there are plenty of resources available online for SMBs that help with tech questions. https://www.sba.gov/learning-center is one great resource and a Google search will get you more.

As a part of this research, you should also make a list of credible MSPs in your area and learn more about them. A Google search can help you with that, but it would be even better if you reach out to a couple of your peers requesting them to refer you to their MSPs, if they have one.

Hiring an MSP means trusting them with your IT infrastructure, so it is very important that you have a clear understanding of what you really want and need, so you can share your expectations with your new MSP. This transparency and clarity goes a long way in determining the success or failure of your relationship with the MSP.

Tuesday, April 13, 2021

5 Lesser known benefits of choosing the co-managed IT model

5 Lesser known benefits of choosing the co-managed IT model

Even companies with IT staff on their payroll can’t deny having an MSP onboard offers benefits that exceed what they get from having just an in-house team. This blog explore 5 lesser known reasons why the co-managed IT model is popular.

An extra hand during emergencies
In the event of any unforeseen emergency such as a natural disaster or a terror attack, you may need additional IT support to get things up and running again. Your IT team may not be able to do it all instantly and of course adding to your IT staff wouldn’t be an option during such times. In a co-managed IT services model you will have your MSP to support your IT team which will help you recover faster.

Especially useful when you have a small in-house IT team
For a lot of SMBs, an in-house IT team comprises one or two IT technicians who take care of all their IT needs. But what happens when they are both out of office at the same time, due to unforeseen circumstances? You can only cross your fingers and hope no major IT problem comes up. But, in the co-managed IT services option, your virtual IT team is just a call away!

24/7 Support
24/7 IT support is a luxury for most SMBs. Their in-house IT staff usually works the same hours at the business. Most managed service providers, however, offer 24/7 services at affordable costs.

You still retain control over your IT
In a co-managed services model, you are not completely entrusting your IT to an MSP, as your in-house IT team will be collaborating with your managed services provider to meet your IT needs better. Thus, you retain quite a bit of control over your IT.

You get useful IT insights
When you bring an MSP onboard, you benefit from their expertise and on-ground experience. They can advise you on the latest IT trends in your industry and help streamline your processes and IT infrastructure based on what’s effective. This kind of insight cannot be gained with an in-house IT team as they would only be working with you.

Co-managed IT model is not replacing your IT team with an MSP. It is augmenting your existing IT support setup with an MSP and leveraging their expertise to bring thought leadership IT strategies into your organization.

Tuesday, April 6, 2021

Four reasons to opt for the co-managed IT services model

Four reasons to opt for the co-managed IT services model

Co-managed IT services model is one in which the business has its own IT team, but still contracts with an external managed services provider for certain services. In this blog we discuss four benefits of a co-managed IT services model.

Expertise
Your in-house IT team may not have all the expertise needed to manage all your IT requirements. There are new developments happening in the tech space everyday and an MSP is better positioned to stay up-to-date with them as IT is their business.

Flexibility
Opting for a co-managed IT services model allows you the flexibility to scale your IT up or down based on your business requirements. This is especially useful for companies that experience seasonal spikes in their business, such as CPA firms, around taxation times, or retail businesses around the Holidays. You don’t have to hire new IT staff to handle the sudden extra load on your IT.

Lower costs
Choosing a co-managed IT services model saves you costs that you would otherwise incur when hiring new IT staff. Bringing someone on your payroll involves HR expenses including health insurance, 401 (k) etc., which can be avoided when bringing an MSP onboard.

Help your IT team focus better
Research indicates that in companies that have an in-house IT team, their IT specialists are so caught up with the day-to-day IT tasks that they don’t have the time to focus on new technology. Tasks like security patches, software updates, backups etc., keep them busy, so they don’t get time to research or learn about the latest on the tech front. This defeats the purpose of having an in-house IT team, doesn’t it? If you could have your MSP take care of the mundane IT routine, you will be enabling your in-house IT technicians to focus on new technology, which will help you become more efficient as a business.

If you already have an in-house IT team, it is not unusual to think you don’t need the services of a managed services provider. But, as you can see, co-managed IT has its advantages and you shouldn’t strike an MSP off your list completely just because you have your in-house IT technicians.

Tuesday, March 30, 2021

Best practices for data safety in a remote work environment

Best practices for data safety in a remote work environment

Do you have staff working from home? Of late, due to the Coronavirus crisis a lot of businesses shifted to the remote working environment. While it raises some data security concerns, they can be overcome by following a few best practices.

Formulate rules
You can start by formulating rules that define the extent and manner in which personal devices may be used for work purposes.
  • Who are allowed to use personal devices for work?
  • Spell out the regulations that they must follow. For example, regular checks for malware and updates to anti-malware software, etc.,
  • If there are restrictions to the device type, software or operating systems that may be used, out of security concerns, then that should be addressed.

Focus on the 2 Ts of cybersecurity
  • Train your staff: The first T is training your staff on how to identify IT threats and cybercrime activities that they can be a victim of. Examples include phishing emails, dubious attachments, clone sites, etc., Another area to train your staff is free/public wifi. They need to know that public wifi can be a gateway for hackers and cybercriminals into your system. Accessing emails from the airport’s waiting lounge or the mall’s food court, can expose your business to IT threats.
  • Teach good password hygiene: This is the second T. Help your employees understand how important password strength is. They should be able to identify weak passwords and steer clear of them. Also, they need to know that no matter how urgent the situation seems, password sharing is not acceptable. Similarly, mistakes such as repeating the password for multiple accounts, not changing the passwords frequently, etc., can make a cyber criminal’s job easier.

Keeping things under control

You can conduct monthly audits of the devices your employees will be using for work purposes. Arrange for regular security patch implementation, firewall installation and software updates. Install quality anti-malware software, firewalls, and make sure email security systems are in place. Even in the remote environment, you can ensure appropriate data access through role and permission-based access control measures.

All of this may seem new, and tedious, especially for businesses that are looking to recover from the effects of the on-going pandemic, which is why it is a good idea to team up a managed services provider to help set up a strong, secure, work-from-home environment for your business.

Monday, March 29, 2021

Do you know who’s clocking your MRIs?

With new cybersecurity risks emerging every day, healthcare organizations are under more pressure than ever to harden their systems.
Read this HIMSS whitepaper to learn how to maintain security in the healthcare space while remaining compliant. https://partner-marketing.bitdefender.com/web/bzb26jed52lt3

Tuesday, March 23, 2021

How safe is your data when your staff works from home?

How safe is your data when your staff works from home?

The Coronavirus crisis has changed the world as we know it. With social distancing, lockdowns and work from home becoming the new normal, cyber criminals are exploiting the situation to their gains. This whitepaper discusses how the cyber crime landscape is likely to shape up in the post-pandemic world and how businesses can safeguard themselves against it.

One of the reasons for a sudden spike is cyber crimes is the work-from-home model that is increasingly becoming the norm. When you allow remote access to your data, you are virtually opening your IT infrastructure to criminals--unless you have the right security measures. It is easy for malware and hackers to get into your system and corrupt it unless you have the right measures in place.

With employees operating from home, there are a lot of loopholes that cyber criminals target. Some of them include

Lack of knowledge
Most employees don’t realize how their simple actions or non-actions can contribute to a cyberattack that can bring your whole business down. For example, they may unwittingly end up compromising on your business’s data security by sharing passwords, not using a good antivirus software or using the public WiFi to access their emails, etc.,

It is more difficult to oversee IT operations
With teams working remotely, it is difficult for businesses to manage their IT efficiently. Installation of security patches, anti-malware tools, data backups, etc., are all more difficult now.

Working from home offers businesses a lot of benefits in terms of cost savings, employee satisfaction and flexibility. But, it also raises a lot of questions from the IT security perspective. When opting for the work-from home model, it is important to clearly define the IT policies and put them into practice. You could partner with an MSP who specializes in cybersecurity and remote workspace management to help you formulate a safe, remote working environment.

Monday, March 22, 2021

What Is the Hidden Cost of Security?

[INFOGRAPHIC] What Is the Hidden Cost of Security?

With less than six months until 2020, experts forecast the industry will be struggling to secure over 20 billion devices from attacks. Cybercrime will never cease to be a money-making machine, with hackers already making trillions of dollars from stealing sensitive data, medical records, financial information and credit history.

And while hackers improve their methods, organizations still don’t understand all the vulnerabilities, gaps and misconfigurations in their IT infrastructure. The global skill shortage leaves millions of jobs unfilled, a major roadblock that businesses need to resolve as soon as possible. Industry research shows that, while 50 percent of global data breaches are caused by malicious or criminal attacks, some 20 percent are the result of human error or system misconfigurations.

Enterprises fail to understand that cyberattacks are no longer a matter of if, but when. So they must not be caught off guard. In the next two years, companies face a 28 percent chance of a recurring material breach. Most firms have inadequate protection. They use software from multiple vendors and usually take over 6 months to identify and contain a breach, leading to the high cost of data breaches. When calculating the total cost of security, senior managers only look at the cost of software, forgetting to include the hidden costs associated with slow incident response, the global skill shortage, and the considerable expense of security operations.

Check out our infographic below to see what to expect from data breaches in the near future.



Tuesday, March 16, 2021

4 things to do to ensure your business continuity planning is a success

4 things to do to ensure your business continuity planning is a success

Working on creating a contingency plan for your business? That’s great! Here are 4 things you need to consider when preparing your new business continuity plan.

Audit of your business continuity plan
Having a business continuity plan alone is not enough. You need to audit it at regular intervals to ensure it is up-to-date and relevant. Often, business continuity plans aren’t used for years, and may be obsolete or irrelevant by the time an actual emergency occurs.

Creating a team for business continuity
Constitute a team for your business continuity project. Decide who will take ownership of implementing the business continuity in the event of an emergency. Break down the business continuity plan into smaller elements and decide who is responsible for each of them. Also, remember to designate a back up for each person in the team.

Mock Drills and Dry Runs
After your business continuity plan is ready you need to check if it really works. A dry run will tell you if it is really effective and also point out to loose ends, if any, that you can fix before the actual emergency.

Don’t forget a debrief
In case you do end up using your business continuity plan, make sure you do a debrief. It will help you determine the effectiveness of your business continuity plan. The brief should focus on identifying the losses you incurred from the disaster, the time taken for implementation of the business continuity plan, the key positives of implementation of your business continuity plan and also offer suggestions, if any for improvement. Irrespective of the size of your business, business continuity planning is indispensable. Bigger companies often have their own staff (IT as well as non-IT) for business continuity planning, but for SMBs to have their own business continuity planning team can be a bit of a strain on their resources. Consider teaming up with a MSP who is experienced in disaster recovery planning, so you don’t cut corners now to regret later.

Tuesday, March 9, 2021

What are the essentials of a business continuity plan?

What are the essentials of a business continuity plan?

An unexpected emergency can wipe out your business! A business continuity plan can help it survive. But, what should a good business continuity plan cover? Read this blog to find out.

A list of your key contacts
One of the most important elements in your business continuity plan is a list of all your important contacts who should be informed of the disaster. This can include all your C-level execs, HR managers, IT Manager, client facing managers, etc.,

A comprehensive list of your IT inventory
Your business continuity plan should contain a list of all the softwares, apps and hardware that you use in the daily operations of your business. This list should identify each of those as critical or non-critical and mention details pertaining to each of them such as
  • The name of the app/software
  • Version/model number (for software/hardware)
  • Vendor name and contact information for each of them
  • Warranty/support availability details
  • Contact information for customer support for these hardware/apps
  • Frequency of usage

Backup information
Data backups are critical to your disaster recovery and so your business continuity plan should include information about data backups. It should mention how often data is backed up, in what formats and where. It should also mention what data backups are available--ideally, you should be backing up ALL data already!

What’s your Plan B?
Make sure your business continuity plan lists a backup operations plan that will come into play in the event of a disaster. Examples include alternative workflows such as options to work remotely or to allow employees to bring their own devices to work (BYOD) until the time regular business premises or systems are ready.

Floor plans and location
Your business continuity plan should also include floor plans of your offices with the exit and entry points clearly marked up, so they can be used in the event of any emergency. It should also mention the location of data centers, phones, key IT systems and related hardware.

Process definition
Make sure your business continuity plan defines the SOPs to be followed in the event of an emergency.

Think business continuity planning is too complicated? Don’t give up! A lot of SMBs, don’t create a business continuity plan thinking it is too much of a hassle. But this can prove fatal to your business later. A qualified MSP can help you understand business continuity planning and even help you create a business continuity plan that’s best suited for you..

Tuesday, March 2, 2021

3 Reasons to prepare a business continuity plan

3 Reasons to prepare a business continuity plan if you haven’t done so already

A business continuity plan is the blueprint you need during an emergency to keep your business running smoothly. If you don’t already have one, here are 3 key reasons why you should focus on creating one ASAP.

It helps retain clients
As a business, if you have problems functioning, it will definitely affect your clients. For example, if your servers are down or your supply-chain mechanism is affected or your delivery process breaks, you won’t be able to fulfill your promise to your clients. Even worse, in some situations you may not even be in a position to communicate about the crisis to your clients adding to their frustration. A business continuity plan addresses these issues beforehand and can help reduce client dissatisfaction.

Salvaging brand image and reputation
There are certain events that end up affecting only your business. For example, ransomware attacks, virus attacks, data leaks, etc., Having a business continuity plan that caters for such events can be a blessing in times of such crisis.

Minimizing revenue loss
A business continuity plan can minimize the revenue losses that occur as a result of a crisis that interrupts your business operations.

In short, a business continuity plan helps minimize the impact of the crisis on your client relations, your brand image and your revenue by equipping you with a plan to handle the situation better.

Tuesday, February 23, 2021

Business continuity planning: A must-have, not a luxury

Business continuity planning: A must-have, not a luxury

Business continuity planning is not an alien concept anymore. In recent times we have witnessed a lot of events that only serve to further intensify the need for business continuity planning. Examples include natural calamities like hurricanes, floods, wildfires, events like terror attacks or even pandemics like the recent Covid-19 outbreak.

While a business continuity plan cannot completely safeguard your business from all these events, it can certainly minimize the damage inflicted on your business. Top business consultants urge their clients to develop a business continuity plan as they consider it a part of the best practices for running a business. A business continuity plan can make the difference between survival and shutdown of a business during a crisis situation.

What is business continuity planning?
Business continuity planning is the process of creating a blueprint that helps your business respond and recover effectively from an unforeseen mishap. As discussed before, the unforeseen event could range from natural disasters to pandemics, or even accidents that affect just your place of business like a fire or even a cybercrime attack directed at your business in particular--basically, any event that can paralyze your business. A business continuity plan serves as a step-by-step guide that you can follow during an emergency to keep your business running smoothly.

True, a business continuity plan is not a sure shot method to survive a crisis, it won’t instantly eliminate the impact of the disaster, but it gives you the best chances of survival. If you are not sure of what a good business continuity plan entails , you can reach out to a reputable MSP to help you with the preparation and implementation of one.