Picking the Right Google Drive Client

Google DriveToday is the day that Google makes Drive File Stream generally available to all G Suite users. As of December 11, 2017, Google will fully deprecate and end support for the old Google Drive Client that has, up until now, provided users with the ability to sync and share files between Drive and their devices. Recently, Google also released Backup and Sync.

Which Drive Client is Right for You?

Briefly, Backup and Sync is a personal utility that Google has publicly classified as a “consumer” tool. Drive File Stream is a support part of G Suite and is designed for business users. For most businesses, even small businesses, Drive File Stream will be best. While Drive File Stream will not let you sync other local folders, it will provide “native drive” access to both My Drive and Team Drives. This style of access gives you nearly universal access to files in Drive from local applications, without large sync directories and large local storage demands.

A Deeper Look

Feature Drive File Stream Backup and Sync
Access files in My Drive Y Y
Access files in Team Drives Y
Stream files on demand Y
Sync only selected folders in My Drive Y Y
Sync only individual files in My Drive Y
Use native applications like MS Word and Photoshop Y Y
Sync other folders, such as Documents or Desktop Y

Better Look and Feel

Drive File Stream will have a new look on your local machine, instead of syncing between a “Google Drive” folder and My Drive, Drive File Stream will appear as a local disk:

  • Mac: Google Drive appears in Finder under Devices
  • Windows 7: Google Drive appears in Explorer as a mounted drive under My Computer and Favorites
  • Windows 10: Google Drive appears in Explorer as a mounted drive under This PC and Quick Access

Sync & Share

You will still be able to flag folders (and individual files!) for sync to the local disk for offline and high-performance access.

The Curse and Blessing of Office 365 Licensing

Office 365If you ask IT pros about Office 365 licensing, they are likely to roll their eyes.

If you ask which license is right for you, the conversation will likely start with a heavy sigh. Microsoft has 6 primary Office 365 license options for business, several add-ons, a number of special-purpose licenses, and over a dozen stand-alone and value-add products.

The Curse is Confusion

Between the number of options and the frantic rate of new features and updates, we are not surprised when companies complain that picking the “right license” is confusing. You end up bouncing between tabs and browsers, comparing feature lists that never seem to have enough detail. You struggle to find which add-ons work with each license type. You may not even know where to look for specialty licenses that can save you money. And with the rapid growth of features and functions, you wonder if the web pages you scour for information reflect the latest updates and options.

The Blessing is Customization

You can escape the confusion. And, in doing so, you can customize your Office 365 licensing plan to best meet your needs. With “too many options”, you can mix and match licenses to the needs of your users. You can tailor the feature sets for groups of users and lower your average cost per user at the same time. You can decide when to rely on built-in features or third party solutions to meet specific business requirements. You can decide which users get add-ons and which do not.

The Key is Understanding

The good news: with guidance and understanding of the Office 365 and Microsoft 365 licensing structures, you can plan and implement subscriptions that meet your organization’s needs at the most affordable cost. By looking beyond Microsoft-only options to select third party tools, you can mix in lower cost licenses without sacrificing compliance, threat protection, telephony, and needed features. You can map out a strategy that enables hybrid computing and services and capabilities move to the cloud over time. You can integrate your cloud an on-premise environments into a seamless service.

The better news: you do not need to gbecome an expert.  Our Cloud Advisors, backed by experts from Microsoft, are ready to assess your needs, explore alternatives, and design solutions options. You gain understanding and select the option that best fits with your needs, priorities, and budget.

Your Next Step is ….

If you haven’t settled on a Office 365 or G Suite as your cloud suite, or if you think you should change from one to the other, your next step is our Which Cloud Analysis.  You complete a comprehensive survey and we provide a formal report that assesses your needs and environment and provides specific recommendations. We will also schedule a Cloud Advisor Session to review and discuss our findings and recommendations.

If you have decided, or currently use, Office 365, contact us to schedule a Cloud Advisor Session to review your environment and needs.  We will help you assess, plan, and implement a solution that delivers the value you want and need.


 

The Email and Web Browser Protections You Need

A decade ago, the big problem with email was SPAM.  Unwanted messages pushing “healthy pills” and cell phone deals inundated our mailboxes and clogged our Internet connections.  At times, over 90% of all email traffic reaching our local servers was unwanted junk. We fought back and, for a long time, won the battle with updated email and web browser protections. With tools like Postini (purchased by Google and part of Gmail since 2008), we were able to block spam and email viruses “in the cloud” before they reached our email servers and services. And while spammers became more sophisticated, our data protection and security technologies were able to keep up.

Over the past years, however, we have clearly lost ground. It feels like we are back to square one.

Spam and malware attacks via email are on the rise. This time around, the consequences can be disastrous. Blocking unwanted emails about supplements is still needed, but cryptolocker, ransomware, and destructive malware can destroy your data and your business.

How did we get here and what can you do to implement modern email and web browser protections

5 things that happened to email and web browser protections

We see a convergence of several factors leading to the increase in successful malware attacks.

1. The IT Industry Became Complacent

Antivirus and email security vendors wrongly assumed that their existing models of protection were capable of keeping up with new types of threats.  For nearly a decade, this assumption held true. Cyber-criminals study and understand how to exploit weaknesses in our existing protections; they build malware that goes undetected by our traditional methods of discovery. Our industry was slow to recognize that systemic changes were needed to stay on top, and ahead, of the game.

2. We Face New Threats

To stay ahead of anti-virus protections, malware has grown up. A new class of malware, known as Advanced Persistent Threats, exists. On average, APTs sit on systems and networks for more than 4 months before activating. During this time, they periodically test the system security and protections. They learn how to act to avoid detection. While our legacy protections are watching the doors and windows, the threat is hiding under the bed.

3. Humans Deliver the Goods

Cyber-criminals have learned that human nature is easier to exploit than technology. They now send us messages and present web pages that look and feel valid. We are willing but unknowing accomplices when click links and install malware on our systems from fake emails and web sites. The human instincts to help and trust readily betray us when we are not careful.

4. We Assume our Vendors do the Work

Both Microsoft and Google tell our customers that their email and other information in the cloud gets backed up. What they do say is that these backups are to maintain service reliability and not to protect us from damage or loss due to application or human error. We hear “data backup” and we assume our protection is greater than the reality. This assumption holds true when we are told about built-in protections against cyber-threats.

5. We focus on Cost not Value

Cloud computing drives down cost perception faster than it drives down cost. Major cloud players wage periodic price wars. Cloud services like Microsoft Office 365 and G Suite continually add new capabilities without increasing prices. We do not expect, and do not want, to pay for extras. You are as likely to fall victim to ransomware from a corrupt or hacked web site than by clicking on an email attachment. While nearly all of our customers protect email, fewer than 5% protect web traffic. Web protection is added cost that does not appear to have value until after the cyber attack.

Good News: We have new solutions for email and web browser protection

While we have created a bit of a mess, we do have options. Innovative vendors have built new solutions that affordable confront and address the new wave of threats. Using the power of cloud infrastructure, some vendors have radically improved their solutions while others have taken a step back and built new, strategic solutions. To protect your business, you need to protect your email service and your web browsing.

  • Web protection should scan and analyze all web traffic, intended (page you click) and unintended (the auto-start video stream, cookie update, etc.) for all web traffic from any device you use.
  • Email protection should pre-screen (open and validate) links and attachments in a sandbox (safe environment) before allowing messages to reach your inbox.

The solutions are affordable, are easy to manage, and can be up and running in no time. A dollar of cost can protect against thousands of dollars loss.


For more information, or a free assessment and set of recommendations for your business, contact us today.