Posts

The Longest Yard: WiFi Solutions for SMBs

WiFi ServicesBusinesses depend on WiFi service. From employee laptops, tablets, and phones, to visitors in conference rooms, WiFi service is a critical component of your network infrastructure. And yet, for many small businesses, WiFi performance and reliability degrade over time. Most WiFi installations start with a focus on coverage — ensuring all areas and users have access to the service. Often neglected is capacity, the availability of bandwidth to ensure fast, reliable service for all users. For companies with small offices, and SMBs in general, the odds seem stacked against us.

  • Installations typically use default settings, placing WiFi traffic on slower bandwidth service and on channels most susceptible to interference
  • Wireless routers and access points sold to SMBs and small offices often lack settings (bandwidth steering, antennae power control, etc) needed to manage and tune performance
  • Most SMBs and small offices do not have active monitoring of WiFi performance, or even periodic reporting about the quality of WiFi service

When SMBs and small offices have WiFi connectivity or performance issues, the typical response is to add additional access points or to increase signal power, “solutions” that often exasperate the problem.

You can and should have the WiFi connectivity and performance you need.

Even if lower cost wireless routers and access points have been installed, SMBs and you can take steps to ensure WiFi connectivity and performance. And, you can do this without expensive equipment upgrades and installations. Take an approach recognizing that the quality of your WiFi service is not static. The environment in which your WiFi operates will change over time.

WiFi Assessments:

Historically, WiFi assessments have been expensive; most SMBs cannot afford a few thousand dollars for a one-time assessment. These one-time assessments capture a point in time and may not recognize shifting usage, demand, and interference patters. These types of assessments are often vendor-led and recommend significant equipment upgrades and installations.

New technologies and services allow for one-time assessments to be completed for hundreds, not thousands, of dollars.  Drop-in devices capture all WiFi traffic and feed the data to cloud-based, AI-driven analysis engines that diagnose and prioritize issues. The AI analysis engines are able to recommend specific solution actions addresses both your WiFi infrastructure and devices accessing the network. The drop-in devices capture all WiFi signals in the area, looking not only at your networks, but the behavior and impact of WiFi signals reaching your space from other locations. And, our recommendations focus on setting changes in existing equipment rather than upgrades and overhauls.

With this lower cost, SMBs can afford to run assessments as-needed when performance or connectivity issues arise, or on a periodic schedule. With periodic assessments, you capture and adapt to changes that occur over time, often preventing issues before they impact your business.

WiFi Monitoring:

Using the same intelligent technology and services, SMBs can now also afford on-going WiFi Monitoring. With continuous monitoring, the AI engine and analysis tools can look at historical trends and address changes to the WiFi environment. This service offers incredible value to restaurants, retail, warehouses, schools, and other locations where the number of WiFi connected devices (customer, employee, IoT, etc) and usage patterns change hour-to-hour, day-to-day, or over time. As the drop-in devices also provide remote network testing, the monitoring infrastructure saves valuable time and effort when testing or re-configuring WiFi services.

Because the monitoring is not depending on your existing infrastructure of vendors, the analysis is agnostic and the recommendations are not biased to any vendor solution.

Managed WiFi Service:

For the first time, SMBs can now afford to have a managed WiFi service. With a managed service, WiFi routers, access points, and (hopefully) attached physical switches are connected to central management console. The console allows for active performance and connectivity alerts that can trigger service tickets and responses. The console also provides remote access to manage configurations and settings, diagnose issues, and resolve problems in real time.

As a managed service, we configure, monitor, and maintain your WiFi network to ensure it meets the needs of your business.

When combined with WiFi monitoring, Managed WiFi Services provide a complete WiFi service that adapts to the changing needs of your environment, ensuring connectivity and performance.


We offer WiFi Assessments and Monitoring services powered by the Wyebot Wireless Intelligence Platform along with a range of Managed WiFi Service offerings.  Please contact us for more information.


 

The Last Mile: Internet Access in the Age of Cloud

The Last Mile

Internet access has changed radically in the past half decade. With greater availability of broadband service from cable providers, small and midsize businesses are no longer limited by legacy wide area network technologies offered by traditional telephone providers. The cost of service has also plummeted.  In our area, we have gone from paying $500 per month for a 1.5 Mbps circuit to paying $149 per month for 75 Mbps service. From $330 per Mpbs down to $2 Mbps in less than five years. The impact is profound and has spurred changes on how we use the Internet. We have moved from surfing web sites and email traffic to cloud computing, creating a new set of challenges for small and midsize businesses. High speed internet is not readily available in many rural, sub-rural, and urban areas. High speed internet is often built over aging infrastructure and lacks reliability. And, most importantly …

Many Broadband Services Fail to Meet the Needs of Small Business

Most business broadband services are asymmetrical, with different upload and download speeds. With uploads running at 10%-15% of download speeds, broadband fails to meet the needs of cloud users. Working with cloud systems, applications, and file services, as much data moves “up” to the cloud as “down” to user. Symmetric upload/download speeds are critical to reliable performance and productivity.

Fortunately, Solutions Exist.

By looking to other carriers and their agency networks, we can offer solutions that delivery bandwidth, reliability, access, and coverage.

For bandwidth, many carriers offer Fast Ethernet, Gig Ethernet, and other high speed fiber and coax services. These services deliver symmetrical service with a range of speeds, usually starting at 100 Mbps. Availability is generally good in urban and suburban areas. For buildings not pre-wired for service, installation may involve pulling new wires from the street network. In most cases, carriers will waive this construction cost, along with normal installation fees, when you sign a three (3) year agreement.

For reliability, a second, fail-over, Internet connection can provide business continuity when your primary service fails. As the failures are often on the last mile — the connection from the network to your business — alternate service should not be built over the same infrastructure as your primary connection. For many small businesses, cellular can provide reliable, affordable fail-over services with reasonable speeds. Solutions like the Datto Network Appliance connect to your local provider and offer automatic fail-over to the Verizon or AT&T cellular data networks for a low monthly fee.

For access and coverage in areas without high speed Internet service, broadband satellite is emerging as a viable solution, particularly in rural and sub-rural areas.  Speeds start at 20 Mbps. Service may not be symmetrical everywhere, but coverage areas continue to grow.

The solution you need for business will depend on your location, size, and use of cloud services. Taking time and picking the right Internet access will improve performance and productivity.


If you are interested in exploring options, contact us for a free consultation.


 

 

Rules, Regulations, and Results

Rules and RegulationsFor Small and Midsize Enterprises (SMEs), the regulatory landscape remains in a perpetual state of flux with changes originating at the Federal, state, and local levels. While some rules and regulations can severely impact your business’ operations, and profitability, many create requirements that you can easily satisfy at a nominal cost.

Three regulations with upcoming deadlines or increased enforcement include:

HIPAA

HIPAA compliance is a requirement for any organization that works with personal health information of individuals — not just medical offices and insurance firms. If you are sharing employee information about benefits, insurance coverage, medical leaves, or other items that involve personal health information (PHI), you have an obligation to protect the PHI. Failure to do so can result in heavy fines and, in a few instances, criminal charges.

Historically, HIPAA compliance has focused on medical practices, insurance, and brokers. We are starting to see audits of non-medical companies, along with fines for those not in compliance. 

Fortunately, you can protect PHI by focusing on the individuals that are authorized or likely to handle sensitive employee information.  By focusing on HR, payroll, and key executive and leadership roles, you can deploy services like message-level email encryption.

What to do:

  • For as little as $5 or $6 per user per month, you can ensure that specific individuals protect PHI and sensitive information while preventing accidental disclosure
  • Contact us for information about encryption, DLP, and other HIPAA solutions.

ELD

Starting December 18, 2017, all interstate trucks in the US must use an Electronic Logging Device (ELD) to track operations and required reporting.  According to the US Department of Transportation (USDOT), fewer than 1/3 of interstate trucks have installed ELDs as of mid-November. Failure to comply can result in heavy fines, impounding of vehicles, and disruption of delivery schedules.

While enforcement is not expected to impact small and midsize trucking firms until late spring or summer of next year, your business can still be at risk.

Here are a few things to note:

  • If you have your own truck(s), they may be classified or registered as Interstate Trucks, even if you only deliver within your state.
  • If you use third parties for shipping, their failure to comply can disrupt your deliveries if trucks are stopped or impounded, or if drivers are pulled off the road.

What to do:

  • Check your own vehicles:
    • Determine if they are properly registered as Interstate Trucks, or if they should be registered as such
    • If you do not have ELDs yet, please contact us for low cost, self-install ELDs with logging software subscriptions
  • Check with your shipper(s):
    • Confirm their trucks, those of their subcontractors, and any owner/operators are properly registered and have ELDs
    • If not, have them contact us for help

GDPR

Effective May 25, 2018, the European Union (EU) General Data Protection Regulation (GDPR) takes effect. While GDPR covers data protection and privacy for citizens of EU member states, treaties allow enforcement in action against US companies operating within the US.

If you have any personal data for citizens of EU member states, you are responsible for GDPR compliance.

GDPR means more than encrypting sensitive data.  GDPR includes processes and procedures for governance, including:

  • A named Data Protection Officer (DPO) responsible for oversight, compliance, and response to individual inquiries. The DPO role can be full time or part time, internal or contracted.
  • You must report suspected breaches within 72 hours of becoming aware of the issue.
  • You need to deploy privacy by design — any new system or change in systems requires primary consideration of privacy and information security.
  • You must be able to demonstrate that you mitigate risk, even in the absence of a privacy breach.

Fortunately for most SME’s the appropriate policy changes and the risk-mitigation technologies need not be expensive of complicated.

What to do:

  • Discuss GDPR with your team, and your legal counsel, to determine your required compliance
  • Provide training, education, and “cultural support” for a data privacy mindset within your organization
  • Review systems storing or processing personal information for security and privacy compliance
  • Select and deploy relevant data loss prevention (risk mitigation) solutions for your environment

Need help? Contact us for more information.


 

What is a MCSP?

Cloud ForwardAs noted in our recent post, Moving Cloud Gets Real, many small and midsize businesses are approaching the tipping point between on-premise and cloud service. When (not if) you reach this point, how you manage and support your IT will change, and you will begin to wonder what a managed cloud service provider can do for you. In this case, the need to monitor and maintain equipment and infrastructure drops off while your need to monitor and manage services, apps, and data increases.

Enter the Managed Cloud Service Provider (MCSP)

A MCSP is a Managed Cloud Service Provider. Similar to a traditional managed service provider, or MSP, the MCSP provides you with end to end monitoring, management, and support for your IT ecosystem.

The big difference between a MSP and a Managed Cloud Service Provider:

  • MSPs focus on on-premise solutions
  • Your MCSP will provide your IT services using cloud infrastructure services, cloud-connected end user devices, and the infrastructure needed to connect the two

Because your MCSP covers you end to end, you still have coverage for your users’ computers, networks, file sharing, printing, and applications.

The MCSP Value Proposition

Historically, most MSPs charge monthly fees based on:

  • The number and type of services
  • The number of users
  • Number of devices
  • Number of vendors

MCSPs, in comparison, typically charge a single, inclusive, per-user fee covering cloud subscriptions and services and included devices. If part of the covered services, monthly fees for networking and other infrastructure may also apply.

The value proposition is greater given the Managed Cloud Service Provider per-user fee covers the user and the system — you do not have separate charges for servers and vendors. The chart, below, illustrates a sample comparison of the per-device versus per-user fees in which the monthly fees quoted were identical.

Traditional
MSP
Cumulus Global
MCSP
Device(s) Yes (Optional) Yes (Optional)
Operating System Yes Yes
Office 365 Subscription Yes Yes
Endpoint Protection Yes Yes
Support Yes Yes
Mobile Device Management Yes
Advanced Threat Protection Yes
Data Backup / Recovery (for Office 365) Yes
O365 PSTN Conferencing Yes
Message-Level Email Encryption Yes
Web Security Yes

In addition to the per-device fees in the chart, above, the Managed Cloud Service Provider options included monitoring and management fees for Active Directory and other on-premise servers that do not exist in the MCSP solution — further enhancing the value proposition.

Next Steps to Understand How a Managed Cloud Service Provider Can Help Your Business

Your next step is to understand when MCSP services are right for your business. Contact us for a complementary Cloud Advisor session; let’s discuss the opportunities and options to see what managed cloud services might be right for your business.

Buy, Lease, DaaS, or BYOD?

BYOD or DaaS?As we noted in our last blog post, Moving Cloud Gets Real, small and midsize businesses like yours are reaching the tipping point where cloud solutions outweigh those running on-site. When this happens, you need to decide if/when you move your remaining on-premise systems to the cloud. As you do, you face the question about what to do with your end user devices.

Not Just a Desktop Anymore

End user devices are no longer limited to the desktop/laptop purchased by the company. Most of your employees are regularly using personal smartphones, tablets, and other devices to conduct business — your business.

Four Options for Devices

When deciding on what devices your team will use, you have four options:

  • Buy: Purchase devices and provide them to employees, creating a company asset. Buy also includes finance leasing with the “$1 buyout” that gives you ownership of the device at the end of the lease.
  • Lease: Use a lease to pay for only the fair market value of the devices, returning and refreshing them with new models at the end of the lease.
  • BYOD: Allow users to buy and use the device they choose.  They own the device, but use it for work, exclusively or non-exclusively.
  • DaaS: Device-as-a-Service, or DaaS, is similar to a lease in that you pay monthly per device. DaaS differs from a lease in that you can, within guidelines, adjust the number of devices up or down, swap out devices for newer models, and replace damaged devices without penalties during the term of the contract. Many DaaS services include malware protection, support, and other services in the monthly fee.

Unless you are buying your staff all of the devices, they use, you already have some mix of “buy” and “bring your own device” (“BYOD”). For many businesses past the cloud tipping point, DaaS and BYOD become the best solutions. DaaS and BYOD let you equip your team with the tools that empower their productivity while maintaining cost controls.

You Own the Data (if not the device)

Whether you own your users’ devices or not, you own the data and are responsible for security and privacy.  You need to ensure you have policies and systems in place to secure, manage, and protect your company’s data. This means installing mobile device management and data security tools on devices used for business, even if they are owned by an employee. Failure to do so leaves your exposed to data loss and breaches, and the civil and criminal penalties that can result.

Fortunately, policies need to be complex or difficult to enact. Providing data protection to mobile devices (smartphones, tablets, and — yes — laptops) has benefits for your employees as well. They key is to ensure that your policies and the support technologies are aligned.

Next Steps

Now is the time to discuss your device strategy and how you are, or will, protect user devices and the company data on those devices. Contact us for a free Cloud Advisor session to discuss options, opportunities, and solutions.


 

Pumpkin Spice Cloud Solutions

Pumpkin Spice Brake PadsIt doesn’t just happen. It seems to become a bigger and bigger thing over time. More feel like they are missing out. More try to join in. Many see an opportunity and try to ride the perceived popularity. And many get turned off because of personal taste or even just to buck the trend.

Such is the tangential arc of fads and trends. And, unfortunately, such is the way many small and midsize businesses approach the cloud. 

There is little doubt that Cloud Computing is a trend that is quickly evolving into a “real thing” with staying power. Many “experts” insist it is the “thing to do”. And while we do not disagree with these experts — we do believe that cloud is the best strategic and tactical direction for most (not all!) businesses — approaching cloud as a trend in which we need to participate is the wrong approach. SMBs that get caught up in the “trend” will miss the long term opportunities and will do more harm than good.

Small and Midsize Businesses are Different!

Much of the hype around “Digital Transformation”, machine learning, augmented reality, and artificial intelligence focuses on the enterprise. Yes, these capabilities will make it to SMBs and cloud will help accelerate the availability and adoption. SMBs, however, do not generally have the resources to run DevOps teams and rebuild or build custom applications.  SMBs rely much more heavily on SaaS and packaged solutions.

For SMBs the challenge is to pick the application or system that fills the need, and integrate that application or system into the overall ecosystem. Microsoft, Google, Salesforce.com, and others are creating ecosystems that foster integration within the ecosystem, but offer less support for solutions outside the multi-vendor boundaries they create.

A Cloud Forward Approach

Given this reality, a forward-looking approach is critical to your cloud success.  Your IT should clearly help you achieve your business goals and objectives. Your goals and objectives are forward looking, so too should be your IT and cloud decisions. For many SMBs, the first major decision is which cloud, and the initial focus is on productivity.  Do you go Office 365 and build your ecosystem around Microsoft 365 and Azure?  Do you deploy G Suite and look to deploy apps and systems Google Cloud Platform? Are you using Salesforce.com and will you limit yourself to solutions on the force.com platform? Are you looking at services or solutions that run on Amazon Web Services, and if so, how do those fit in?

Cloud Forward starts by asking the question “Which Cloud?”.  To answer, we map business goals and objectives into technology-driven objectives that, in turn, guide your decisions. Knowing that “cloud” is not simply “what we have running someplace else”, we actively assess other factors that should guide your decision — the structure of your information, your company structure, the culture your have or want, your existing applications and systems, industry-specific solutions, mobile and remote work, and more. We look ask uses about their preferences and what tools they feel make them most productive. And, we look at the near-term and long-term integration required to create a holistic solution.

Without a comprehensive assessment and understanding, your cloud solution will behave like a fad — a trend that fades.  By looking Cloud Forward, you can avoid the hype and fluff. You will focus on substance and will realize tangible results.


Contact us for more information or a complementary Cloud Advisor Session. For a customized Which Cloud Analysis and Recommendation, please complete our Which Cloud Survey. We are waiving the $895 fee through the end of 2017.


 

3 More Reasons You Are an Easy Cybercrime Target

Cyber AttackLast week, we gave you three reasons why you, as a small or midsize business, are a viable and desirable target for cyber criminals.

If those reasons don’t give you enough reason to act, here are three (3) more reasons SMBs, and you, a target for cyber criminals…

SMB data is increasingly networked

  • All of your systems — databases, email, documents, marketing, point-of-sale, and more — are likely running on a single network.
  • Access to one of your systems can lead to access to others. Target’s POS system was hacked using a security flow in the HVAC monitoring system running on the same network.
  • Moving data and systems into secure cloud solutions, and segregating network traffic minimizes the cross-over risk.

SMBs are using consumer products for business data

  • Consumer grade services are often more affordable, but often lack the security and data protection features of the higher-priced, business versions.
  • Separate work and home and use solutions designed for business, and, make sure to configure the security and privacy setting accordingly.

SMBs are often lax when it comes to security

  • Many small businesses operate in an environment of trust; people know and trust one another. This trust can be exploited by a disgruntled employee or an outsider.
  • Keep user identity management and passwords private and secure; Manage administrator and “super user” passwords so that they are unique, complex, and secure.
  • Keep servers and systems with sensitive data/access secure; enforce screen locking and passwords.
  • Educate your staff on security risks and behaviors.

 

Taking cyber security seriously is the first and best step in protecting your business, employees, and customers. Protection need not be overly complex; nor must reasonable protection be a budget busting expense. Reasonable measures balance cost and security.


Interested in ensuring you are protected, contact us for a free Cloud Advisor Session, or learn about our data protection solutions and our privacy solutions.


 

 

 

3 Reasons You Are an Easy Cybercrime Target

Cyber AttackAs we’ve mentioned before, more small and midsize businesses (SMBs) are falling victim to cybercrime.  According to HP’s Cyber Security and Your Business report, Cybercrime costs SMBs 4.2 times more per employee than larger businesses, and 60% of SMBs that experience a data breach are out of business in six months.

Why are SMBs, and you, a target for cyber criminals?

SMBs spend less on security while larger businesses are increasing their security protections.

  • Your business is an easier target because you are more likely to lack basic protections. In effect, you may attract cyber criminals because you are an easier target.
  • Budget for, and implement, reasonable protections covering user identities, access controls, user permissions, data loss prevention, and employee awareness and training.

SMBs do not have in-house security expertise.

  • Keeping up with risks and trends is time consuming above and beyond ensuring that your security measures are updated and working on a day-to-day basis.
  • Leverage technology and your IT partners for automated solutions and expertise, as well as on-going management of your security and privacy solutions.

SMBS are moving into the cloud.

  • Using cloud applications and storage makes sense. But, your data is no longer behind a physical or logical “firewall”.  Protecting your data means protecting the cloud systems and services you use.
  • Always select business-grade services over consumer services. Implement all security features, including 2 Factor Authentication. And, when possible, integrate access to cloud services into a single system for managing user identities. And, do not forget to train, and periodically remind, your staff how their awareness and actions can allow or prevent an attack.

 

Start the new year off right with a review of your IT security and data privacy policies, procedures, and systems.  Doing so is an affordable way to protect your business, your employees, and your customers from cyber crime. The cost of prevention is miniscule compared to the cost of a breach.


Interested in ensuring you are protected, contact us for a free Cloud Advisor Session, or learn about our data protection solutions and our privacy solutions.


 

3 Reasons to Consider Replacing Active Directory

Identity ManagementActive Directory was designed for on-premise local and enterprise networks.  As the use of cloud continues to move forward, Active Directory has not adapted as quickly as needed to provided robust, unified, identity management.  Here are three (3) reasons to consider replacing (or augmenting) Active Directory.

1) Active Directory is not “Cloud Ready”

According to a survey by security firm BetterCloud, almost 50% of SMBs will be all cloud by 2020, up from 15% today. Even SMBs are using more than one cloud service.

Keeping Active Directory means setting up sync services and other tools across multiple cloud platforms — a complex and expensive solution.

2) Users are Mobile and Working Remotely

Global Workplace Statistics reports that between 20% and 25% of employees already work remotely on a semi-regular or regular basis. And, 50% of employees hold jobs that are compatible with remote work. Since 2005, remote work has grown 103% and continues to grow.

Keeping Active Directory means requiring employees to log into the corporate domain when working remotely, typically by VPN. This is slow and cumbersome for users, and expensive to setup and maintain.

3) The Windows-Only World is Gone

Macs are normal part of the ecosystem; Computerworld reports that 90% of Fortune 500 companies officially support Apple desktops, laptops, and tablets. Chrome devices are starting to move from education to the business market. And, most employees work at least some of their day on smartphones or tablets; iOS and Android are now business operation systems.

Keeping Active Directory means bridging identity management and policies between network operating systems or adding third party products to properly manage users and devices.

The good news is that you do not need to live with the cloud-related limitations of Active Directory. You can run directory services, manage identities, and control access to devices (even when off-network) with cloud-based directory services. These services simply administration and provide a single system of record for user identities.


Want to learn more or give it a try? Contact us and we will show you how.


 

Fast Fact Friday: Messaging & Collaboration Apps Win!

Fast FactAccording to a recent study of 1,500 HR, sales, and marketing executives commissioned by Adobe, Inc. magazine reports that:

More than half of the professionals surveyed (57 %) said mobile apps for messaging and collaboration are critical to their organizations’ success, and a similar number of respondents (59%) said such apps will continue to be critical in 2019.

Is your mobile strategy up to the task?  Contact us for a free Cloud Advisory session.

Webcasts

Spring Cleaning Your Files

(4/19/2022) – With an understanding of personal file services – OneDrive and My Drive – and domain file services – Shared Drives and Sharepoint, businesses can build a file service that organizes and protects files in ways that make them easier to find, share, and use.

Beyond Backup

(3/15/2022) – Map out how restore, recovery, and continuity solutions offer different value propositions for you and your business. Assess total cost and impact when selecting your solution.

Peak Productivity

(2/22/2022) – We all have our jobs to do. We want to do well. We want to succeed. We want and need peak productivity.  While “hacks” are trendy, productivity is boosted when we understand how to best use the tools we have.

Keep IT Simple

(1/25/2022) – Solid IT services are critical to your success, but they consume your time and budget. Using managed services ensures you have effective and affordable services and frees up time and money to focus on your core business activities.

2022 is Here; What’s Next?

(12/14/2021) – COVID-19 triggered fundamental changes in the economy, markets, and society that alter the way we need to operate our businesses and work as individuals. Explore ways small and midsize businesses can better leverage technologies and resources to respond to these challenges.

Four Cornerstones for Cloud Security

(11/16/2021) – Four security cornerstones create a solid foundation for your cloud security. Assess your security footprint; Identify security gaps; Prioritize changes and security services.

Cloud File Services

(10/19/2021) – Moving to a managed cloud file service can improve access, productivity, and resilience without sacrificing security and budget.

Manage Cloud Services Primer

(9/21/2021) – Managed Cloud Services differ from traditional managed and “break-fix” services. Explore how, beyond cost savings, Manage Cloud Services offer strategic security, services, and business advantages.

Email Security and Reliability

(8/17/2021) – A deep dive look at email security and reliability, with a focus on how DMARC prevents business email compromises, spoofing, and phishing attacks. In addition to protecting you from inbound attacks, DMARC protects your domain’s reputation and helps ensure reliable email deliverability.

Email Security and Compliance

(7/20/2021) – An updated look at email security and compliance. Summarizing risks and trends, we dive into a tiered approach to ensuring your business, data, employees, and reputation are protected.  We also discuss emerging compliance requirements and steps you can take to ensure you operate within regulatory, industry, and policy expectations.