Posts

Uncertainty

For 2019: Focus on Outcomes

UncertaintyAs we close out 2018, we reflect on a year that has been a bit of a wild ride.  For our customers, we clearly are leaving a period of sustained growth into more uncertain economic times. At the macro level, the economy shows competing signs of growth and contraction. Our political climate is less certain and predictable.

We Live in Uncertain Times

Economies and business climates vary by region. Taking a look at a non-scientific survey of businesses in central New England (Worcester Business Journal, Central Massachusetts Economic Forecast 2019, December 24, 2019), we get a pulse of where are are and where we may be going. We also see a new way forward for small and midsize organizations looking to weather whatever stormy or calm seas may be in our future.

  • Only 35% see the economy improving in 2019, while 65% see the economy stagnating or declining in the coming year.  This is a significant change from a year ago when 65% expected the economy to improve.
  • While the number of business leaders who believe the economy has improved over the past year is at 77%, the number of those uncertain of our current economic health more than doubled from 7% for 2018 to 15% for 2019.
  • On the positive side, the number of business leaders expecting to hire additional staff in 2019 jumped to 49% from 40% a year ago.
  • At the same time, 72% of those surveyed are “very concerned” about finding qualified talent to hire, a major increase from only 50% of hiring employers a year ago.

In short, we see the economy as having improved over the past year, but are uncertain what course it will chart in 2019.  Many of us plan on growing but are concerned about being able to find, hire, and retain the right people.

Charting a Course

Economic uncertainty can, and sometimes should, cause us to pause and re-evaluate our plans. We often see businesses reacting quickly and pulling the plug or delaying technology projects and changes. Often, these decisions make it more difficult for you to manage changes you want or need to make in order to adapt to a changing business climate. Here are some thoughts on evaluating technology decisions during changing or uncertain times.

  • Understand What is Possible
    2018 is the year in which Machine Learning, AI, and Bots came into the mainstream. These technologies can, when deployed properly, can improve operations, expand the productivity of your workforce, and mitigate operating costs.
  • Remember the Cloud
    Most small businesses have not yet fully adopted a cloud computing strategy. Cloud computing is a means to scale IT resources and costs to the size of your business without sacrificing features, capabilities, or security.
  • Focus on Outcomes
    Don’t worry about the technology, focus on the outcome. What do you want to achieve? What do you need to happen? How do you want things to be different after making a change? Understand and clearly define the endpoint, as this will drive how you define and manage the projects and changes that will get you from Point A to Point B. Let the outcome guide priorities and, subsequently, the technologies and changes needed to make a difference.
  • Balance the Quantitative and Qualitative
    Not all outcomes will have a specific dollar value.  When deciding on outcomes, consider the near-term and long-term value to your business. Employee engagement and satisfaction improves retention. Automating repetitive tasks improves productivity. Training and support improves morale and fosters innovation.
  • Consider All Opportunities
    “Cut to Survive” rarely works.  Look beyond quick hits and savings. Look for opportunities that: (1) reduce operating expenses; (2) improve team and individual productivity; (3) simplify your IT services; (4) differentiate your business in your markets; (5) help employees do their jobs better; (6) improve customer service and engagement; (7) empower team collaboration and innovation; and/or (8) help you better understand your business and the metrics that measure success.

Change, particularly in uncertain times, often come with increased risks. Deciding to invest or make changes is more difficult. Not doing anything, however, is a decision.  It is a decision to NOT actively manage how your business moves forward; it is a decision to let external forces determine your future. How you move forward may require more thought and analysis, but continue to move forward.


We are here to help!  Wondering how you can get more value from your current IT services, cloud solutions, or emerging technologies?  Contact us to schedule a complementary Cloud Advisor session. 


Pending Storm; Pending Doom

A quick scan of the weather headlines late on Thursday afternoon: a “Nor’easter” storm going through rapid escalation, know as “Bombogenisis”, looks ready to hit New England tomorrow with rain, snow and hurricane force wind gusts. Now it is Sunday, and many small and midsize businesses along the northeastern coast are wondering when, or if, they will be able to reopen. The impact of disasters is increasing. We can argue about climate change versus weather. We can discuss our aging infrastructure. We can debate whether to plan for disaster causes or effects. If we do not, however, make our businesses more resilient, the quantity and severity of disruptions will continue to grow.

The coming storm should not foretell coming doom.

By taking advantage of proven cloud services, most small and midsize businesses can protect themselves from disruption. Many businesses in coastal areas of New England may be without power and other utilities for 2 to 4 days. Businesses with no continuity plan are down and out. Given that about 50% of businesses shut down for a week will fail within six months, “down and out” can be fatal. If you rely on VPN or remote desktop to on-premise systems, you are still at risk — no power means no on-premise networks or servers.

Businesses with key systems in the cloud, however, can be up and running if employees have power and Internet access.

So what are your next steps?

First, measure the impact on your business of a disruption lasting one day, three days, and five days?  As you do, consider the full cost of recovery, including post-disaster productivity loss as your work to recover lost data and time while keeping things moving forward.

Second, consider the value of keeping your business running rather than having to recover and regroup. Beyond the dollars and cents, understand the value to your customers, to your reputation.

Third, contact us for a complimentary Cloud Advisor Session to discuss your cloud and continuity strategies.

WiFi Services

The Longest Yard: WiFi Solutions for SMBs

WiFi ServicesBusinesses depend on WiFi service. From employee laptops, tablets, and phones, to visitors in conference rooms, WiFi service is a critical component of your network infrastructure. And yet, for many small businesses, WiFi performance and reliability degrade over time. Most WiFi installations start with a focus on coverage — ensuring all areas and users have access to the service. Often neglected is capacity, the availability of bandwidth to ensure fast, reliable service for all users. For companies with small offices, and SMBs in general, the odds seem stacked against us.

  • Installations typically use default settings, placing WiFi traffic on slower bandwidth service and on channels most susceptible to interference
  • Wireless routers and access points sold to SMBs and small offices often lack settings (bandwidth steering, antennae power control, etc) needed to manage and tune performance
  • Most SMBs and small offices do not have active monitoring of WiFi performance, or even periodic reporting about the quality of WiFi service

When SMBs and small offices have WiFi connectivity or performance issues, the typical response is to add additional access points or to increase signal power, “solutions” that often exasperate the problem.

You can and should have the WiFi connectivity and performance you need.

Even if lower cost wireless routers and access points have been installed, SMBs and you can take steps to ensure WiFi connectivity and performance. And, you can do this without expensive equipment upgrades and installations. Take an approach recognizing that the quality of your WiFi service is not static. The environment in which your WiFi operates will change over time.

WiFi Assessments:

Historically, WiFi assessments have been expensive; most SMBs cannot afford a few thousand dollars for a one-time assessment. These one-time assessments capture a point in time and may not recognize shifting usage, demand, and interference patters. These types of assessments are often vendor-led and recommend significant equipment upgrades and installations.

New technologies and services allow for one-time assessments to be completed for hundreds, not thousands, of dollars.  Drop-in devices capture all WiFi traffic and feed the data to cloud-based, AI-driven analysis engines that diagnose and prioritize issues. The AI analysis engines are able to recommend specific solution actions addresses both your WiFi infrastructure and devices accessing the network. The drop-in devices capture all WiFi signals in the area, looking not only at your networks, but the behavior and impact of WiFi signals reaching your space from other locations. And, our recommendations focus on setting changes in existing equipment rather than upgrades and overhauls.

With this lower cost, SMBs can afford to run assessments as-needed when performance or connectivity issues arise, or on a periodic schedule. With periodic assessments, you capture and adapt to changes that occur over time, often preventing issues before they impact your business.

WiFi Monitoring:

Using the same intelligent technology and services, SMBs can now also afford on-going WiFi Monitoring. With continuous monitoring, the AI engine and analysis tools can look at historical trends and address changes to the WiFi environment. This service offers incredible value to restaurants, retail, warehouses, schools, and other locations where the number of WiFi connected devices (customer, employee, IoT, etc) and usage patterns change hour-to-hour, day-to-day, or over time. As the drop-in devices also provide remote network testing, the monitoring infrastructure saves valuable time and effort when testing or re-configuring WiFi services.

Because the monitoring is not depending on your existing infrastructure of vendors, the analysis is agnostic and the recommendations are not biased to any vendor solution.

Managed WiFi Service:

For the first time, SMBs can now afford to have a managed WiFi service. With a managed service, WiFi routers, access points, and (hopefully) attached physical switches are connected to central management console. The console allows for active performance and connectivity alerts that can trigger service tickets and responses. The console also provides remote access to manage configurations and settings, diagnose issues, and resolve problems in real time.

As a managed service, we configure, monitor, and maintain your WiFi network to ensure it meets the needs of your business.

When combined with WiFi monitoring, Managed WiFi Services provide a complete WiFi service that adapts to the changing needs of your environment, ensuring connectivity and performance.


We offer WiFi Assessments and Monitoring services powered by the Wyebot Wireless Intelligence Platform along with a range of Managed WiFi Service offerings.  Please contact us for more information.


 

The Last Mile

The Last Mile: Internet Access in the Age of Cloud

The Last Mile

Internet access has changed radically in the past half decade. With greater availability of broadband service from cable providers, small and midsize businesses are no longer limited by legacy wide area network technologies offered by traditional telephone providers. The cost of service has also plummeted.  In our area, we have gone from paying $500 per month for a 1.5 Mbps circuit to paying $149 per month for 75 Mbps service. From $330 per Mpbs down to $2 Mbps in less than five years. The impact is profound and has spurred changes on how we use the Internet. We have moved from surfing web sites and email traffic to cloud computing, creating a new set of challenges for small and midsize businesses. High speed internet is not readily available in many rural, sub-rural, and urban areas. High speed internet is often built over aging infrastructure and lacks reliability. And, most importantly …

Many Broadband Services Fail to Meet the Needs of Small Business

Most business broadband services are asymmetrical, with different upload and download speeds. With uploads running at 10%-15% of download speeds, broadband fails to meet the needs of cloud users. Working with cloud systems, applications, and file services, as much data moves “up” to the cloud as “down” to user. Symmetric upload/download speeds are critical to reliable performance and productivity.

Fortunately, Solutions Exist.

By looking to other carriers and their agency networks, we can offer solutions that delivery bandwidth, reliability, access, and coverage.

For bandwidth, many carriers offer Fast Ethernet, Gig Ethernet, and other high speed fiber and coax services. These services deliver symmetrical service with a range of speeds, usually starting at 100 Mbps. Availability is generally good in urban and suburban areas. For buildings not pre-wired for service, installation may involve pulling new wires from the street network. In most cases, carriers will waive this construction cost, along with normal installation fees, when you sign a three (3) year agreement.

For reliability, a second, fail-over, Internet connection can provide business continuity when your primary service fails. As the failures are often on the last mile — the connection from the network to your business — alternate service should not be built over the same infrastructure as your primary connection. For many small businesses, cellular can provide reliable, affordable fail-over services with reasonable speeds. Solutions like the Datto Network Appliance connect to your local provider and offer automatic fail-over to the Verizon or AT&T cellular data networks for a low monthly fee.

For access and coverage in areas without high speed Internet service, broadband satellite is emerging as a viable solution, particularly in rural and sub-rural areas.  Speeds start at 20 Mbps. Service may not be symmetrical everywhere, but coverage areas continue to grow.

The solution you need for business will depend on your location, size, and use of cloud services. Taking time and picking the right Internet access will improve performance and productivity.


If you are interested in exploring options, contact us for a free consultation.


 

 

Rules and Regulations

Rules, Regulations, and Results

Rules and RegulationsFor Small and Midsize Enterprises (SMEs), the regulatory landscape remains in a perpetual state of flux with changes originating at the Federal, state, and local levels. While some rules and regulations can severely impact your business’ operations, and profitability, many create requirements that you can easily satisfy at a nominal cost.

Three regulations with upcoming deadlines or increased enforcement include:

HIPAA

HIPAA compliance is a requirement for any organization that works with personal health information of individuals — not just medical offices and insurance firms. If you are sharing employee information about benefits, insurance coverage, medical leaves, or other items that involve personal health information (PHI), you have an obligation to protect the PHI. Failure to do so can result in heavy fines and, in a few instances, criminal charges.

Historically, HIPAA compliance has focused on medical practices, insurance, and brokers. We are starting to see audits of non-medical companies, along with fines for those not in compliance. 

Fortunately, you can protect PHI by focusing on the individuals that are authorized or likely to handle sensitive employee information.  By focusing on HR, payroll, and key executive and leadership roles, you can deploy services like message-level email encryption.

What to do:

  • For as little as $5 or $6 per user per month, you can ensure that specific individuals protect PHI and sensitive information while preventing accidental disclosure
  • Contact us for information about encryption, DLP, and other HIPAA solutions.

ELD

Starting December 18, 2017, all interstate trucks in the US must use an Electronic Logging Device (ELD) to track operations and required reporting.  According to the US Department of Transportation (USDOT), fewer than 1/3 of interstate trucks have installed ELDs as of mid-November. Failure to comply can result in heavy fines, impounding of vehicles, and disruption of delivery schedules.

While enforcement is not expected to impact small and midsize trucking firms until late spring or summer of next year, your business can still be at risk.

Here are a few things to note:

  • If you have your own truck(s), they may be classified or registered as Interstate Trucks, even if you only deliver within your state.
  • If you use third parties for shipping, their failure to comply can disrupt your deliveries if trucks are stopped or impounded, or if drivers are pulled off the road.

What to do:

  • Check your own vehicles:
    • Determine if they are properly registered as Interstate Trucks, or if they should be registered as such
    • If you do not have ELDs yet, please contact us for low cost, self-install ELDs with logging software subscriptions
  • Check with your shipper(s):
    • Confirm their trucks, those of their subcontractors, and any owner/operators are properly registered and have ELDs
    • If not, have them contact us for help

GDPR

Effective May 25, 2018, the European Union (EU) General Data Protection Regulation (GDPR) takes effect. While GDPR covers data protection and privacy for citizens of EU member states, treaties allow enforcement in action against US companies operating within the US.

If you have any personal data for citizens of EU member states, you are responsible for GDPR compliance.

GDPR means more than encrypting sensitive data.  GDPR includes processes and procedures for governance, including:

  • A named Data Protection Officer (DPO) responsible for oversight, compliance, and response to individual inquiries. The DPO role can be full time or part time, internal or contracted.
  • You must report suspected breaches within 72 hours of becoming aware of the issue.
  • You need to deploy privacy by design — any new system or change in systems requires primary consideration of privacy and information security.
  • You must be able to demonstrate that you mitigate risk, even in the absence of a privacy breach.

Fortunately for most SME’s the appropriate policy changes and the risk-mitigation technologies need not be expensive of complicated.

What to do:

  • Discuss GDPR with your team, and your legal counsel, to determine your required compliance
  • Provide training, education, and “cultural support” for a data privacy mindset within your organization
  • Review systems storing or processing personal information for security and privacy compliance
  • Select and deploy relevant data loss prevention (risk mitigation) solutions for your environment

Need help? Contact us for more information.


 

Cloud Forward

What is a MCSP?

Cloud ForwardAs noted in our recent post, Moving Cloud Gets Real, many small and midsize businesses are approaching the tipping point between on-premise and cloud service. When (not if) you reach this point, how you manage and support your IT will change. The need to monitor and maintain equipment and infrastructure drops off while your need to monitor and manage services, apps, and data increases.

Enter the MCSP

A MCSP is a Managed Cloud Service Provider. Similar to a traditional managed service provider, or MSP, the MCSP provides you with end to end monitoring, management, and support for your IT ecosystem.

The big difference:

  • MSPs focus on on-premise solutions
  • Your MCSP will provide your IT services using cloud services, cloud-connected end user devices, and the infrastructure needed to connect the two

Because you MCSP covers you end to end, you still have coverage for your users’ computers, networks, file sharing, printing, and applications.

The MCSP Value Proposition

Historically, most MSPs charge monthly fees based on:

  • The number and type of services
  • The number of users
  • Number of devices
  • Number of vendors

MCSPs, in comparison, typically charge a single, inclusive, per-user fee covering cloud subscriptions and services and included devices. If part of the covered services, monthly fees for networking and other infrastructure may also apply.

The value proposition is greater given the MCSP per-user fee covers the user and the system — you do not have separate charges for servers and vendors. The chart, below, illustrates a sample comparison of the per-device versus per-user fees in which the monthly fees quoted were identical.

Traditional
MSP
Cumulus Global
MCSP
Device(s) Yes (Optional) Yes (Optional)
Operating System Yes Yes
Office 365 Subscription Yes Yes
Endpoint Protection Yes Yes
Support Yes Yes
Mobile Device Management Yes
Advanced Threat Protection Yes
Data Backup / Recovery (for Office 365) Yes
O365 PSTN Conferencing Yes
Message-Level Email Encryption Yes
Web Security Yes

In addition to the per-device fees in the chart, above, the MSP options included monitoring and management fees for Active Directory and other on-premise servers that do not exist in the MCSP solution — further enhancing the value proposition.

Next Step

Your next step is to understand when MCSP services are right for your business. Contact us for a complementary Cloud Advisor session; let’s discuss the opportunities and options.

BYOD or DaaS?

Buy, Lease, DaaS, or BYOD?

BYOD or DaaS?As we noted in our last blog post, Moving Cloud Gets Real, small and midsize businesses like yours are reaching the tipping point where cloud solutions outweigh those running on-site. When this happens, you need to decide if/when you move your remaining on-premise systems to the cloud. As you do, you face the question about what to do with your end user devices.

Not Just a Desktop Anymore

End user devices are no longer limited to the desktop/laptop purchased by the company. Most of your employees are regularly using personal smartphones, tablets, and other devices to conduct business — your business.

Four Options for Devices

When deciding on what devices your team will use, you have four options:

  • Buy: Purchase devices and provide them to employees, creating a company asset. Buy also includes finance leasing with the “$1 buyout” that gives you ownership of the device at the end of the lease.
  • Lease: Use a lease to pay for only the fair market value of the devices, returning and refreshing them with new models at the end of the lease.
  • BYOD: Allow users to buy and use the device they choose.  They own the device, but use it for work, exclusively or non-exclusively.
  • DaaS: Device-as-a-Service, or DaaS, is similar to a lease in that you pay monthly per device. DaaS differs from a lease in that you can, within guidelines, adjust the number of devices up or down, swap out devices for newer models, and replace damaged devices without penalties during the term of the contract. Many DaaS services include malware protection, support, and other services in the monthly fee.

Unless you are buying your staff all of the devices, they use, you already have some mix of “buy” and “bring your own device” (“BYOD”). For many businesses past the cloud tipping point, DaaS and BYOD become the best solutions. DaaS and BYOD let you equip your team with the tools that empower their productivity while maintaining cost controls.

You Own the Data (if not the device)

Whether you own your users’ devices or not, you own the data and are responsible for security and privacy.  You need to ensure you have policies and systems in place to secure, manage, and protect your company’s data. This means installing mobile device management and data security tools on devices used for business, even if they are owned by an employee. Failure to do so leaves your exposed to data loss and breaches, and the civil and criminal penalties that can result.

Fortunately, policies need to be complex or difficult to enact. Providing data protection to mobile devices (smartphones, tablets, and — yes — laptops) has benefits for your employees as well. They key is to ensure that your policies and the support technologies are aligned.

Next Steps

Now is the time to discuss your device strategy and how you are, or will, protect user devices and the company data on those devices. Contact us for a free Cloud Advisor session to discuss options, opportunities, and solutions.


 

Pumpkin Spice Brake Pads

Pumpkin Spice Cloud Solutions

Pumpkin Spice Brake PadsIt doesn’t just happen. It seems to become a bigger and bigger thing over time. More feel like they are missing out. More try to join in. Many see an opportunity and try to ride the perceived popularity. And many get turned off because of personal taste or even just to buck the trend.

Such is the tangential arc of fads and trends. And, unfortunately, such is the way many small and midsize businesses approach the cloud. 

There is little doubt that Cloud Computing is a trend that is quickly evolving into a “real thing” with staying power. Many “experts” insist it is the “thing to do”. And while we do not disagree with these experts — we do believe that cloud is the best strategic and tactical direction for most (not all!) businesses — approaching cloud as a trend in which we need to participate is the wrong approach. SMBs that get caught up in the “trend” will miss the long term opportunities and will do more harm than good.

Small and Midsize Businesses are Different!

Much of the hype around “Digital Transformation”, machine learning, augmented reality, and artificial intelligence focuses on the enterprise. Yes, these capabilities will make it to SMBs and cloud will help accelerate the availability and adoption. SMBs, however, do not generally have the resources to run DevOps teams and rebuild or build custom applications.  SMBs rely much more heavily on SaaS and packaged solutions.

For SMBs the challenge is to pick the application or system that fills the need, and integrate that application or system into the overall ecosystem. Microsoft, Google, Salesforce.com, and others are creating ecosystems that foster integration within the ecosystem, but offer less support for solutions outside the multi-vendor boundaries they create.

A Cloud Forward Approach

Given this reality, a forward-looking approach is critical to your cloud success.  Your IT should clearly help you achieve your business goals and objectives. Your goals and objectives are forward looking, so too should be your IT and cloud decisions. For many SMBs, the first major decision is which cloud, and the initial focus is on productivity.  Do you go Office 365 and build your ecosystem around Microsoft 365 and Azure?  Do you deploy G Suite and look to deploy apps and systems Google Cloud Platform? Are you using Salesforce.com and will you limit yourself to solutions on the force.com platform? Are you looking at services or solutions that run on Amazon Web Services, and if so, how do those fit in?

Cloud Forward starts by asking the question “Which Cloud?”.  To answer, we map business goals and objectives into technology-driven objectives that, in turn, guide your decisions. Knowing that “cloud” is not simply “what we have running someplace else”, we actively assess other factors that should guide your decision — the structure of your information, your company structure, the culture your have or want, your existing applications and systems, industry-specific solutions, mobile and remote work, and more. We look ask uses about their preferences and what tools they feel make them most productive. And, we look at the near-term and long-term integration required to create a holistic solution.

Without a comprehensive assessment and understanding, your cloud solution will behave like a fad — a trend that fades.  By looking Cloud Forward, you can avoid the hype and fluff. You will focus on substance and will realize tangible results.


Contact us for more information or a complementary Cloud Advisor Session. For a customized Which Cloud Analysis and Recommendation, please complete our Which Cloud Survey. We are waiving the $895 fee through the end of 2017.


 

Cyber Attack

3 More Reasons You Are an Easy Cybercrime Target

Cyber AttackLast week, we gave you three reasons why you, as a small or midsize business, are a viable and desirable target for cyber criminals.

If those reasons don’t give you enough reason to act, here are three (3) more reasons SMBs, and you, a target for cyber criminals…

SMB data is increasingly networked

  • All of your systems — databases, email, documents, marketing, point-of-sale, and more — are likely running on a single network.
  • Access to one of your systems can lead to access to others. Target’s POS system was hacked using a security flow in the HVAC monitoring system running on the same network.
  • Moving data and systems into secure cloud solutions, and segregating network traffic minimizes the cross-over risk.

SMBs are using consumer products for business data

  • Consumer grade services are often more affordable, but often lack the security and data protection features of the higher-priced, business versions.
  • Separate work and home and use solutions designed for business, and, make sure to configure the security and privacy setting accordingly.

SMBs are often lax when it comes to security

  • Many small businesses operate in an environment of trust; people know and trust one another. This trust can be exploited by a disgruntled employee or an outsider.
  • Keep user identity management and passwords private and secure; Manage administrator and “super user” passwords so that they are unique, complex, and secure.
  • Keep servers and systems with sensitive data/access secure; enforce screen locking and passwords.
  • Educate your staff on security risks and behaviors.

 

Taking cyber security seriously is the first and best step in protecting your business, employees, and customers. Protection need not be overly complex; nor must reasonable protection be a budget busting expense. Reasonable measures balance cost and security.


Interested in ensuring you are protected, contact us for a free Cloud Advisor Session, or learn about our data protection solutions and our privacy solutions.


 

 

 

Cyber Attack

3 Reasons You Are an Easy Cybercrime Target

Cyber AttackAs we’ve mentioned before, more small and midsize businesses (SMBs) are falling victim to cybercrime.  According to HP’s Cyber Security and Your Business report, Cybercrime costs SMBs 4.2 times more per employee than larger businesses, and 60% of SMBs that experience a data breach are out of business in six months.

Why are SMBs, and you, a target for cyber criminals?

SMBs spend less on security while larger businesses are increasing their security protections.

  • Your business is an easier target because you are more likely to lack basic protections. In effect, you may attract cyber criminals because you are an easier target.
  • Budget for, and implement, reasonable protections covering user identities, access controls, user permissions, data loss prevention, and employee awareness and training.

SMBs do not have in-house security expertise.

  • Keeping up with risks and trends is time consuming above and beyond ensuring that your security measures are updated and working on a day-to-day basis.
  • Leverage technology and your IT partners for automated solutions and expertise, as well as on-going management of your security and privacy solutions.

SMBS are moving into the cloud.

  • Using cloud applications and storage makes sense. But, your data is no longer behind a physical or logical “firewall”.  Protecting your data means protecting the cloud systems and services you use.
  • Always select business-grade services over consumer services. Implement all security features, including 2 Factor Authentication. And, when possible, integrate access to cloud services into a single system for managing user identities. And, do not forget to train, and periodically remind, your staff how their awareness and actions can allow or prevent an attack.

 

Start the new year off right with a review of your IT security and data privacy policies, procedures, and systems.  Doing so is an affordable way to protect your business, your employees, and your customers from cyber crime. The cost of prevention is miniscule compared to the cost of a breach.


Interested in ensuring you are protected, contact us for a free Cloud Advisor Session, or learn about our data protection solutions and our privacy solutions.