Google Workspace Transition Update – 12/01/22

Google WorkspaceMore than two years after announcing the change, the Google Workspace transition from G Suite continues.

  • For organizations running G Suite with an annual or term commitment, your transition is scheduled to occur on your next renewal date.
  • For organization on the Flex Plan (month to month), Google will automatically transition your account with 60 days advanced notice.
  • Organizations willing to transition with an annual commitment before Google transitions you automatically may be eligible for incentive discounts.

For many, if not most, organizations, this transition will result in higher subscription fees and/or loss of features.

This post identifies the restrictions and potential features impact for organizations currently running G Suite Basic and G Suite Business editions.

Current G Suite Basic Subscribers

  • Additional Storage
    • If you currently do not have additional storage assigned to at least one user:
      • You can no longer add this service.
      • You will not have the ability to add storage to your Google Workspace subscription.
      • As users reach the 30GB limit, you will need to upgrade to Google Workspace Business Standard or Business Plus editions at an additional cost.
    • If you currently have additional additional storage assigned to at least one user:
      • You may grandfather this service and you may be able to add more storage.
      • The duration for how long you can maintain your existing additional storage or add new additional storage has not be clearly defined by Google. At the end of the grandfather period, you will need to upgrade to a version of Google Workspace that meets your storage needs.
  • Vault
    • If you currently have Vault:
      • You may be able to grandfather this service.
      • The duration for how long you can maintain Vault as an add-on has not been defined by Google. At the end of the grace period, you will need to upgrade to Google Workspace Business Plus to maintain this service and data.
    • If you currently do not have Vault:
      • You should select and upgrade to Google Workspace Business Plus to add this service.
  • Advanced Endpoint Management
    • This feature is not available in Google Workspace Business Starter or Business Standard subscriptions. You will not be able to set up company-managed mobile devices or selectively distribute apps to mobile devices.
    • If you use this feature, you should select and upgrade to Google Workspace Business Plus.
  • Organizational Branding / Templates
    • This feature is not available in Google Workspace Business Starter. You will no longer be able to create or use custom templates for Google Docs, Sheets, Slides, Forms and Sites. Documents created from the templates remain.
    • If you use this feature, you should select and upgrade to Google Workspace Business Standard or Business Plus.
  • Advanced Chat Space Features / Spaces
    • This feature is not available in Google Workspace Business Starter. You will no longer be able create spaces that allow external users. Existing spaces remain and users can make changes to existing spaces, such as adding or removing members.
    • If you use this feature, you should select and upgrade to Google Workspace Business Standard or Business Plus.

Current G Suite Business Subscribers

  • Storage Capacity
    • Your storage capacity will be limited based on the Google Workspace Business tier subscription you select for you transition:
      • Business Starter: 30GB per user, fixed
      • Business Standard: 2TB per user, aggregated across all users
      • Business Plus: 5 TB per user, aggregated across all users
    • To maintain unlimited storage capacity, you should select and upgrade to Google Workspace Enterprise Standard or Enterprise Plus.
  • Google Vault
    • This service will not be available if you transition to Google Workspace Business Starter or Business Standard.  Additionally, holds and retention rules will stop protecting your organization’s messages and files. Google will immediately remove all data that users deleted more than 30 days ago from all Google systems. You cannot recover this data.
    • To keep the Vault service, you should select and upgrade to Google Workspace Business Plus or an Enterprise tier subscription.
  • Advanced Endpoint Management
    • This feature is not available in Google Workspace Business Starter or Business Standard subscriptions. You will not be able to set up company-managed mobile devices or selectively distribute apps to mobile devices.
    • If you use this feature, you should select and upgrade to Google Workspace Business Plus.
  • Organizational Branding / Templates
    • This feature is not available in Google Workspace Business Starter. You will no longer be able to create or use custom templates for Google Docs, Sheets, Slides, Forms and Sites. Documents created from the templates remain.
    • If you use this feature, you should select and upgrade to Google Workspace Business Standard or Business Plus.
  • Advanced Chat Space Features / Spaces
    • This feature is not available in Google Workspace Business Starter. You will no longer be able create spaces that allow external users. Existing spaces remain and users can make changes to existing spaces, such as adding or removing members.
    • If you use this feature, you should select and upgrade to Google Workspace Business Standard or Business Plus.
  • Shared drives
    • This feature is not available in Google Workspace Business Starter. You will no longer be able manage existing shared drives. In addition, users and owners will not be able access shared drive content or add or delete content to or from shared drives. Before switching editions, ask shared drive owners to review their content and move it to their My Drive to maintain access.
    • If you use this feature, you will should select Google Workspace Business Standard or Business Starter.
  • Organization-Specific Drive Settings
    • This feature is not available in Google Workspace Business Starter. All users in your organization will inherit the settings of your top-level organizational unit, but the organizational structure itself will not change.
    • To maintain this feature, you should select Google Workspace Business Standard or Business Plus.
  • Meets
    • If you transition to Google Workspace Business Starter, your Meets will be limited to 100 participants.
    • Select G Suite Business Standard or Business Plus to maintain you Meets capacity.
  • Calendar Advanced Controls
    • These controls will not be available if you transition to Google Workspace Business Starter or Business Standard.  Rooms aren’t automatically released when all attendees decline. Rooms that decline invitations aren’t replaced. You can’t set a default duration for events.
    • To maintain access to these controls you will should select Google Workspace Business Plus.
  • Data Regions
    • These controls will not be available if you transition to Google Workspace Business Starter or Business Standard.  You can no longer choose a geographic location for your data.
    • To maintain access to these controls you should select Google Workspace Business Plus.
  • Session Length for Google services
    • These controls will not be available if you transition to Google Workspace Business Starter or Business Standard.  You can no longer control how long users can access Google services without having to sign in again.
    • To maintain access to these controls you should select transition to Google Workspace Business Plus.
  • Predefined Content Detectors
    • This feature is not available in Google Workspace Business Starter. If you use any predefined content detectors data-loss prevention, Google will remove them from any settings that use them.
    • To maintain this feature, you should select Google Workspace Business Standard or Business Plus.
  • Automated User Provisioning Applications
    • Google limits the scope of this feature in Google Workspace Business Starter. If you have more than 3 automated user provisioning applications, you must first remove automated user provisioning from all but 3 applications before downgrading.
    • To maintain this feature, you should select Google Workspace Business Standard or Business Plus.
  • Target Audiences
    • This feature is not available in Google Workspace Business Starter. You can’t recommend specific groups of people, like departments or teams, for your users to share their items with. Important: Any target audiences currently in use aren’t automatically deleted when you switch to this edition. You might want to delete them before switching.
    • To maintain this feature, you should select Google Workspace Business Standard or Business Plus.

Call To Action

Contact us or schedule time with one of our Cloud Advisors to discuss your options to best manage your transition. By default, Google will transition your G Suite account to the version of Google Workspace based on your user account and your use of the services and features listed, above. Your subscription fees may double or triple.

Responding to Ransomware: Police, Pay, or Panic?

ransomware response plan
In today’s digital landscape, the threat of ransomware looms large, posing a significant risk to businesses and organizations of all sizes. Ransomware, a malicious form of cyber attack, can swiftly encrypt critical data and hold it hostage until a ransom is paid. These attacks can disrupt operations, compromise sensitive information, and inflict financial losses. In the face of this evolving threat, having a robust ransomware response plan is imperative.

At Cumulus, we understand that responding to ransomware is complicated.  With the continuing increase of successful cyber attacks against small businesses, we hear a lot of debate on two aspects of your ransomware response to a successful attack.

  • Should you contact law enforcement?
  • Should you pay the ransom?

Both of these questions have pros and cons. How and when you answer these questions can have a long-lasting impact on you and your business. Read on to learn about top ransomware response plans, how to prevent a ransomware attack, and other vital information to keep you and your business safe.

Ransomware Incident Response Strategies

Involving Law Enforcement

The debate about if and when to contact law enforcement often centers around what happens after law enforcement gets involved.  Typically, you would contact your local police department which, in turn, would contact the cyber crimes unit of your state police (if your state has one) and/or the FBI. You can also report a ransomware attack directly to the FBI or the Cybersecurity and Infrastructure Security Agency (CISA).

The biggest risks to involving law enforcement are the effects of a criminal investigation. You may not be able to repair and rebuild your systems until a forensic investigation is complete. In some cases, your computers may be considered evidence as part of a criminal investigation. By delaying your access to your computers, these actions can disrupt your ability to recover those systems.

The biggest advantages to involving law enforcement is the assistance the cyber security agencies can provide during the investigation and recovery. The FBI Cyber Division, CISA, and the National Cyber Investigative Joint Task Force can help identify the specific attack. For known variants, they often have valid decryption keys.  If involved quickly enough, the FBI and other agencies have a history of recovering at least some ransoms and thefts (e.g. the Colonial Pipeline incident).

If you have cyber insurance, you may not have a choice about reporting the attack to law enforcement.  Your carrier may require you to involve law enforcement as a condition for processing your claim. Your insurer may also mandate a forensic analysis to fully understand the scope of the attack and the necessary steps to recovery.

Paying the Ransom

Responding to ransomware, you want to move quickly and correctly. Wiping and rebuilding systems, restoring your data from backups, and recreating missing or damaged data takes time and money. Decrypting the data can be faster and easier.  Paying the ransom is tempting. Your insurance carrier may also pressure you to pay the ransom to lower the cost of the claim.

Before you pay a ransom, consider the following:

  • As noted above, law enforcement may already have decryption key;
  • It is a funding mechanism for hackers to carry out future and repeated attacks;
  • Paying a ransom does not guarantee you will receive a decryption key;
  • Even with the decryption key, you may not be able to recover all of your data;
  • Attackers will often demand additional payments to prevent the release of stolen information; and
  • Paying the ransom is likely to be a federal crime as it may be funding hostile nations, terrorism, human tracking, or child exploitation.

To the latter point, paying ransom to an organization or government on a sanctions list, including those tied to terrorist activities, violates US law (18 USC 2339A, 2339B, 2339C). In October of 2020, the US Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued a warning that “Ransomware Payments with a Sanctions Nexus Threaten U.S. National Security Interests” and could result in civil and criminal actions.

Recommended Actions For a Ransomware Response

When responding to ransomware, you will need to work with your cyber insurance carrier. Contacting law enforcement early is more likely to help your recovery than hinder it.

  • Additional expertise
  • Simultaneous investigation/forensics with your insurer
  • The possibility of known decryption keys for your ransomware variant
  • The ability to cover lost or stolen funds
  • The potential identification of the source of the attack

These benefits can mitigate the damage and help speed recovery.

Paying the ransom should always be a last resort. To avoid violating US law and facing the risk of criminal charges or civil sanctions, paying a ransom should not be done without consulting law enforcement.

For more information about cyber security and protecting your business, visit our Resource Center, or schedule an introductory call with one of our Cloud Advisors.

 

Cumulus Global Receives Inc.’s Inaugural Power Partner Award

2022 Inc. Power Partner AwardNew award highlights B2B partners that support startups across all business functions and empower growth

WESTBOROUGH, MA, November 22, 2022 – Cumulus Global is honored to be recognized by Inc. Business Media with a listing on the inaugural Power Partner Award list. The awards honor B2B organizations across the globe with proven track records supporting entrepreneurs and helping startups grow. The list recognizes 252 firms in marketing and advertising, health and human resources, technology, finance, and security, and other areas of business.

“We are proud of the recognition in both the Cloud Computing and IT Management and Systems categories,” stated Cumulus Global CEO Allen Falcon. “Our team deserves the credit. The Power Partner Award recognizes our team’s consistent focus on quality services and impactful business results.”

All 252 companies received top marks from clients for being instrumental in helping leadership navigate the dynamic world of startups. These B2B partners support entrepreneurs across various facets of the business, including hiring, compliance, infrastructure development, cloud migration, fundraising, etc., allowing founders to focus on their core missions. 

“Trusted B2B partners provide guidance and expertise that founders rely on at various steps of their organization’s journey. Partners that possess a demonstrated ability to deliver quality support are at the core of entrepreneurship and help bring big ideas to life,” says Scott Omelianuk, editor-in-chief of Inc. Business media. 

Cumulus Global has helped over 1,500 small and midsize organizations move core productivity services into Google Workspace and Microsoft 365. By understanding clients’ business objectives, Cumulus Global helps companies drive efficiencies and growth by leveraging secure, managed, cloud services and solutions. Cumulus Global services businesses, from solopreneurs and family-owned businesses to fast-growth startups and mature enterprises across multiple industries and markets.

About the Power Partner Awards

Inc. partnered with leading global social and media intelligence platform Meltwater to develop a proprietary methodology that uses sentiment from online conversations about organizations and translates it into numerical scores. Judges evaluated companies on commitment, reliability, trust, creativity, supportiveness, and other virtues that offer value to clients. Inc. gathered client testimonials as part of the process. 

To view the complete list, go to: https://www.inc.com/power-partner-awards/2022

The November 2022 Issue of Inc. magazine is available online now at https://www.inc.com/magazine and on newsstands.

Read more

2022 SMB IT Security Needs Study Highlights & Contradictions

Security firm Action 1 recently published the results of its 2022 SMB IT Security study after surveying 750 small and midsize businesses.Data Protection & Security

Key Findings and Contradictions of the Action1 SMB Report

It is no secret that perceptions about our security risks differ from reality.  Not surprisingly, some of the 2022 SMB IT security needs survey results contradict one another.

52% vs 65% vs 37%

52% of respondents acknowledge that they lack sufficient skills and technology to effectively protect against cyber attacks. But 65% believe the cost of protection is too high and 37% complain that security controls hurt productivity. Businesses clearly struggle to balance the security they need with the cost and the user experience. Often SMBs are presented with security solutions designed – and priced – for larger organizations. As employees use added security steps for everyday transactions (online banking, etc.), the overhead of security protocols is less intrusive.

63% vs 81% vs 40%

While 63% believe that their SMB faces a lower cyber risk compared to larger companies, 81% of respondents had at least one security incident within the past 12 months. 40% of SMBs had 2 or more incidents. Too many SMBs continue to have a false sense of security. Cyber criminals understand that is easier to hack 10, or even 100, small businesses than it is to successfully attack 1 large enterprise. And with current tools, cyber attacks are inexpensive to launch and manage.

Where the Security Risks Exist

40% vs 39% vs 34%

The most common forms of successful cyber attacks are password attacks (40%), ransomware or other malware (39%), and phishing (34%). Note that these forms of attack are not mutually exclusive.  One form of attack, malware for example, can be used to gather the information needed for a successful password breach.

63% vs 43%

Looking at root causes, 63% of SMB IT Security study respondents noted that attacks began with phishing.  Unpatched systems were the starting point for 43% of attacks. These numbers make sense as these attack vectors provide access to information that supports further attacks.

Who is Helping

96% vs 23%

The vast majority of SMBs rely on outside experts for help with their security needs.  93% of respondents use an IT firm for at least some of their IT security needs.  That said, 23% of small businesses are looking to replace their IT service providers in the coming year. While security is not the only trigger for changing providers, it is one consideration.

48% vs 33% vs 29%

SMBs responded that poor system performance (48%), system outages (33%), and long problem resolution times (29%) are the three primary reasons for switching service providers. Each of these issues relate to business interruptions.

2022 SMB Security Study Conclusions

Examining the SMB IT Needs Security Study results, we see three clear conclusions.

  1. Failing to recognize the risks leads business owners to under value security technology and services.  The cost to respond and recover to a single incident dwarfs the cost of reasonable protections.  For SMBs, the average successful cyber attack can disrupt business operations for 18 to 21 days at a total cost to recover exceeding $200,000.
  2. With 50% of employees working remotely, at least part time, individuals and systems are more exposed to attack. Physical security is no longer sufficient. SMBs need a security services designed to protect against the most common and the most costly types of cyber attacks.
  3. As an IT service provider, we must ensure that our services, first and foremost, do no harm.  While security protocols can introduce some inconveniences, our services cannot interfere with performance, availability, or reliability.

Next Steps to Improve Your IT Security

Step back and take a look at your security services and footprint.  Our Rapid Security Assessment is a quick and simple starting point to identify security gaps. You can also schedule a call with one of our Cloud Advisors to review your security and IT services.

 

Service Update: Vault Former Employee End of Life – Aug. 15, 2022

Cumulus Global 15 Years of ServiceService Update: Vault Former Employee End of Life: VFE Licenses will no longer be available as of January 15, 2023.

As previously announced by Google, free Vault Former Employee (VFE) licenses will no longer be available as of January 15, 2023. To maintain data for past employees, these licenses will transition to Archive User Licenses with compatible Google Workspace subscriptions.  This transition impacts fees beginning in January 2023.

Background

With the launch of Google Workspace, VFE license were replaced by Archive User Licenses.  Existing VFE customers with free licenses were grandfathered.  Google’s original plan to phase our VFE licenses by the end of January 2021 were delayed.  Google recently announced a definitive timeline.  Cumulus Global has also sent informational emails to all of our clients with VFE licenses.

To prevent a loss of data, you should plan your transition to Google Workspace Archive User Licensing (AUL).  Note that AUL is a paid service running with monthly per user fees of $4 to $7.

Impact

If you take no action, you will either:

  1. Lose access to the VFE accounts and data; or
  2. Transition from a free service to the paid AUL service.

Archive User Licenses are not available with G Suite. Therefore, you must transition to Google Workspace to use AULs. 

The cost of AULs varies based on your Google Workspace subscription:

  • Google Workspace Business
    • Plus: $4/user/month
  • Google Workspace Enterprise
    • Standard: $5/user/month
    • Plus: $7/user/month

Note that AULs are NOT available with other Google Workspace licenses.

Action Plan

We will help you with the following steps:

  1. Decide if you need (or want) to continue keeping accounts for past employees.  If so, for how long will you keep the data and how many accounts do you need to license?
    1. Remove accounts no longer needed
    2. Export accounts to preserve data, as appropriate
  2. Assess your current G Suite or Google Workspace subscription for licensing and compatibility
    1. Plan your transition to Google Workspace if you are currently on G Suite Basic, Business, or Enterprise
    2. If you are on Google Workspace, determine if you need to upgrade licenses for AUL compatibility
    3. Confirm that your VFE licenses are now a free trial of Archive User Licenses and the trial end date
    4. Understand the impact on your monthly or annual costs
    5. Determine if you are eligible for transition incentive discounts
  3. Transition, as needed, to Google Workspace before your AUL Trial End Date.

Financial Impact

  • In addition to the per user fees for the Archive User Licenses themselves, you may need to upgrade your Google Workspace subscription to ensure access to AUL services.
  • For existing customers, Cumulus Global will begin invoicing for Archive User Licenses in January.  For those on an annual agreement, the fees will be prorated accordingly.

Please contact us by email, via our website, or by scheduling time directly with one of our Cloud advisors, with any questions or concerns regarding this Service Update covering Vault Former Employee end of life.

Cumulus Global Recognized on CRNs 2022 Fast Growth 150 List

2022 CRN Fast Growth 150

Cumulus Global proudly announced today that the company is being recognized for its sustained growth on the 2022 Fast Growth 150 List, published by CRN®, a brand of The Channel Company®. Ranked at #84, Cumulus Global is among the fastest growing IT solution providers and integrators in North America over the past two years. 

“We are honored for the recognition of our sales and growth, along with the confidence and trust of our clients,” stated Cumulus Global CEO Allen Falcon. “Our team collaborates, working with businesses to leverage cloud forward solutions and existing IT services to further their business goals. Our growth reflects positively on how clients see the value of our services.”

To maintain consistent growth within the highly competitive and rapidly evolving IT industry, solution providers must constantly evolve.  Staying ahead of changes within markets and client priorities requires forward-thinking business strategies, strong technical skills, and consistent service quality. CRN’s Fast Growth 150 list acknowledges companies, like Cumulus Global, that demonstrate an ongoing dedication toward success and innovation. 

“Despite the near-constant disruptions and unforeseen challenges today’s IT companies face, they must still be ready to adapt and change at a moment’s notice. With the CRN 2022 Fast Growth 150 list, we honor those IT solution providers that have managed to thrive in an industry where stability is often a luxury,” said Blaine Raddon, CEO of The Channel Company. “The companies that earned spots on this year’s list represent the very best in business acumen and strategy, inspiring fellow industry members and proving that with perseverance, meaningful growth is attainable in even the most chaotic business climates. On behalf of CRN and The Channel Company, I wish a heartfelt congratulations and continued success to all companies featured on the 2022 Fast Growth 150 list.”

As a Managed Cloud Services Provider, Cumulus Global blends the best aspects of traditional MSP services with a “cloud first” perspective. Leveraging the economies of cloud computing, Cumulus Global offers these robust, secure services at costs below traditional IT services for small and midsize businesses.

A sampling of the 2022 Fast Growth 150 list will be featured in the August issue of CRN Magazine. You can view the complete list online at www.crn.com/fastgrowth150.

About Cumulus Global

Cumulus Global is an industry-leading managed cloud service provider with a mission to deliver solutions with tangible value.

  • What We Do: We translate your business goals and objectives into solutions and services.
  • How We Do It: We start with your business needs and priorities. Planning and migration includes guidance to help your team adopt and utilize new services. Your team benefits from co-managed services, on-going support, and client success services. We help you adapt as your business changes and grows.
  • What We Offer: Managed cloud solutions featuring Google, Microsoft, and more than three dozen providers.

About The Channel Company

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers, and end-users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelcompany.com  

Follow The Channel Company: Twitter, LinkedIn, and Facebook.

The Channel Company Contact:

  • Jennifer Hogan
  • The Channel Company
  • jhogan@thechannelcompany.com

Debunking 5 Cyber Security Myths for SMBs

Data Protection & SecurityAs owners and leaders of small and midsize businesses (SMBs), we have limited resources for IT and cybersecurity.  We should not be surprised, therefore, that SMBs face the biggest threat from ransomware and other cyber attacks.  Beyond the cost and risk of ransomware and encryption attacks, SMBs face business email compromise (BEC) attacks and threats to disclose regulated information.  Recovery costs, fines, and legal actions resulting from a successful attack can destroy your business. And yet, many SMBs remain unaware of the risk and/or lacking reasonable data protections and security.  This post intends to debunk five (5) cyber security myths for SMBs.

1My company is too
small to be a target

While note every attack is successful, one global report states that 86% of SMBs have been hit by ransomware attacks, with 20% attacked more than six times. With fewer resources and less focus on cyber security, SMBs represent an attractive target for attackers.  The increase in remote work and use of remote desktop protocols creates additional opportunities for attackers. Securing and managing these services requires time and attention.

The impact of a successful ransomware attack continues to increase.  According to Verizon’s 2020 Data Breach Investigations Report, the average cost of a successful ransomware attack grew from an average of $34,000 to just under $200,000.

2I cannot afford to protect
against cyber attacks

Cyber attacks are inevitable. Protecting your business does not require expensive solutions.  Your cost for endpoint protection for your devices, advanced threat protection for email, and security awareness training is pennies per day per person.  You can deploy multi-factor authentication (MFA), local disk encryption, and the Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) protocols for free. You can deploy cloud-based business continuity and disaster recovery (BCDR) for less than traditional backup/recovery solutions.

3I have backups,
so I am safe

Not all backup solutions are equal.  Many backup/recovery solutions for SMBs run on the same servers and networks as your business systems. Ransomware and other cyber attacks will seek out and encrypt/damage backup servers to render your backups useless.  Your backup/recovery solutions should be segregated from your production network and systems to shield them from attack.  Business Continuity/DR solutions offer the additional ability to bring systems back on line in an alternate cloud data center while you recover your primary systems.

4Technology alone
will save me

As with most security protocols, people are your first line of defense.  As many as 93% of cyber attacks begin with a phishing attack. People click on links, unwittingly downloading malware or sharing usernames and passwords.

Security awareness training should be a standard practice within your business.  The training is a proven way to reduce risk, decrease infections and help desk requests, reduce the chances of a security breach and strengthen the overall security posture.

5Cyber resiliency is
too hard to achieve

Cyber Resilience is the ability to withstand security attacks and land on your feet, no matter what happens. Cyber resilience protects your business, customers, and employees from ransomware, business email compromise, and other potential issues and attacks.

While some gaps in security will always remain, you can affordably improve your cyber resiliency.

To overcome these 5 small business cyber security myths, review your security footprint, and improve your resilience, please contact us by email, via our website, or by scheduling time directly with one of our Cloud advisors, with any questions or concerns regarding this service update.

Service Update: Client Information Update – July 6, 2022

Cumulus Global 15 Years of ServiceService UpdateAs part of our commitment to provide industry-leading services, we are launching a project to verify and update our client information.

Beginning this month, we will be contacting all of our clients to confirm and update their company information.  Our goal is to ensure that we have current and correct information about your business and the people.

Why are we undertaking this effort?

  • We want to ensure that authorized persons are requesting service changes or actions:
    • We are not always notified when somebody leaves your business or when roles and responsibilities change
    • To help ensure your security, we will limit security change requests to specific individuals
    • We want to ensure that only authorized persons can commit your business to new services that will increase your costs
  • We want to avoid any unnecessary delays in shipping, billing, or processing payments

Company and Contact Info

At the company level, we will be confirming and/or updating:

  • Your primary, billing, and shipping addresses, if different
  • The person(s) responsible and contact information for billing and payments
  • Business level contacts responsible for accepting proposals and approving contracts and contract changes
  • Technical and administrative contacts and their service authorization levels

Authorization Levels

We will be asking you to identity contacts and the authorization levels.  These levels determine their ability to request services and make changes to your account and services.

  • Admin
    • Open service tickets for problems on behalf of users or the IT team
    • Request administrative actions that do not change security settings or permissions
    • Request changes or removal of users and groups
    • Schedule service requests for end users (with Premium Service)
  • Super Admin
    • Admin, plus
    • Request new user accounts
    • Request changes in security settings within client policies
    • Identify and authorized Admins
    • Co-manage service changes and/or deployment/migration projects
  • Business Admin
    • Admin and Super Admin, plus
    • Identify and authorized Super Admins
    • Sign quote, proposals, or contracts that add, modify, remove services

The Process

Over the next several weeks, expect or receive an email message from a member of “Data Heroes” team.  The message will include a linked or attached spreadsheet with the current information we have for the account.  Following the directions provided, you can update, remove, and add information. Follow the simple steps to return the spreadsheet to the team.  Our team will update your company and contact information as needed in our financial and operational systems, and will follow up if they have any specific questions.

Please contact us by email, via our website, or by scheduling time directly with one of our Cloud advisors, with any questions or concerns regarding this service update.

Service Update: Google Workspace Transition Update – June 30, 2022

Google WorkspaceService Update: As part of the transition from G Suite to Google Workspace, Google began rolling out service changes to both the Google Workspace and G Suite platforms.

Please contact us by email, via our website, or by scheduling time directly with one of our Cloud advisors, with any questions or concerns.

Additional Storage

You can no longer add additional storage to G Suite Basic or to Google Workspace Business Starter licenses. This change impacts both managed and personal storage. Existing added storage will remain in place and functional.  You cannot, however, adjust the amount of existing additional storage to a user account. Nor can you add any additional storage to accounts approaching the 30GB limit.

If you need additional storage for users, the preferred action is to transition to Google Workspace Business Standard, which includes 2TB per user of storage that is pooled and available to all users accounts.

By default, Google will move your entire domain (all users) to Google Workspace Business Standard. Your standard license fees will double from $6 per user per month ($72/year) to $12 per user per month ($144/year). We can assist in arranging discounts to help mitigate your cost increase if you transition before your renewal period (annual commitments) or Google’s automated transition (month-to-month customers).

Depending on your number of user licenses, you may be able to split licensing between Google Workspace Business Starter and Standard subscriptions, limiting the more expensive licensing to only those users with a need for more than 30GB of storage.

Automatic Transitions

We have been discussing the transition from G Suite to Google Workspace and providing updates since November of 2020.  Google is now working to finish the transition process.

Google is automatically transitioning month-to-month customers to Google Workspace.  Your account administrators will receive notice 60 days in advance of the transition.  Google will transition all of your users based on storage, features, and security settings in use.  By default, all users will transition to the highest license level needed by any user within your domain.  These changes will increase your license costs; for many these increases will be significant.

You may be able mitigate costs by  splitting licenses within the Business and Enterprise tiers. Eligibility is based on your number of users and utilization.

We can also work to obtain discounts related to your transition.

For us to help, we need to begin your transition before Google initiates your automatic transition process.

Please contact us by email, via our website, or by scheduling time directly with one of our Cloud advisors, with any questions or concerns regarding this service update.

Change Management in Cyber Security

Security, Privacy, & ComplianceCyber Security Will Change Companies

IT change management is a structured process for evaluating proposed IT system or service changes. This procedure is carried out prior to implementing the requested change on an organization’s network, reducing or eliminating network outages.

At a recent security and risk management summit, Gartner shared their views of how cyber security will change companies.  While Gartner’s predictions focus on larger enterprise, several of their observations will likely hold true for small and midsize businesses (SMBs) when it comes to change management in cyber security processes.

Here are some observations and our view of how they will impact small and midsize businesses.

Impacts of Cyber Security Change Management

Through 2023, government regulations requiring organizations to provide consumer privacy rights will cover 5 billion citizens and more than 70% of global GDP.

Privacy regulations will continue to expand as more nations pass legislation establishing privacy requirements.  Within the US, we expect more states to follow California, New York, and Massachusetts with varying levels of regulations. Along with the regulations come the potential for fines and increase civil litigation, making it vital to pursue cyber security change management. In many of the statues, the protection is afforded the customer based on the customer’s location, not the location of the business.

For SMBs, establishing and maintaining a sound change management cyber security footprint is essential. Beyond the cloud infrastructure technology tools, businesses need to educate employees and have the policies and procedures in place. These policies and procedures should define expectations for employees and for how the business will respond to an incident.

By 2025, 80% of enterprises will adopt a strategy to unify web, cloud services and private application access from a single vendor’s SSE (Security service edge) platform.

Protecting access to systems is more challenging as the proliferation of usernames and passwords continue.  As the human element can be the greatest security challenge, Identity and Access Management (IAM) solutions will become the norm.

For SMBs, Single Sign-On (SSO), centralized identity/password vaults, and other tools are available and are, generally affordable.  Many SMBs current hesitate given the incremental cost per user per month. As the cost and risk of missing becomes greater, we expect SMBs will see value of Identity and Access Management solutions. These solutions will become the norm within a cyber security strategy, not an add-on.

By 2025, 60% of organizations will use cybersecurity risk as a primary determinant in conducting third-party transactions and business engagements.

With increased concern and scrutiny from customers, consumers, and regulators, businesses are under increasing pressure to monitor and protect against third-party cyber security risks.  This trend will impact SMBs in two ways.

  1. Given the prevalent use of business email addresses as identities for third party applications and services, SMBs will monitor for reported breaches. Third party breaches give cyber criminals an attack vector.
  2. Larger enterprises will see businesses in their supply chains as potential security risks. They will increasing include cyber security requirement in vendor authorization process and in contracts.

SMBs need to be ready to meet the security and risk management demands — people, process, and technology — of their customers.

By 2025, 70% of CEOs will mandate a culture of organizational resilience to survive coinciding threats from cybercrime, severe weather events, civil unrest and political instabilities.

As businesses adapted to the COVID-19 pandemic, the inability of most businesses to respond to large scale disruptions exposed flaws in traditional business continuity planning. The pandemic put a spotlight on the need for business resiliency and continuity plans for businesses that had not yet considered continuity to be a priority.  The level of planning to address the threats from cybercrime will need to be the same as the planning for other disasters and business disruptions.

For SMBs, leveraging cloud solutions will remain the most cost-effective business continuity option.  Moving systems and applications into cloud services increases security, adds redundancy, provides geographic diversity, and provides better remote access than on-premise systems.  SMBs are at greatest risk from local or regional issues. Managed cloud services … even if only a “lift and shift” of existing servers and applications … will be accepted as a cost-effective way to improve cyber security processes, security and resiliency.

Final Thoughts on Change Management in Cyber Security

We expect small and midsize businesses will need to expand and change their cyber security footprint and processes. They will need to improve resiliency.  Appropriate solutions such as cyber insurance and breach response are available and are affordable.  Businesses can meet their security, resiliency, continuity, and operational needs effectively and affordably. The inherit advantages of cloud services and solutions make this possible.

To evaluate your requirements and readiness for better security and resilience against cyber attacks and other business disruptions, contact us for a consultation, or book some time with a Cloud Advisor.  The consultation is free and without obligation.