Posts

Moving Cloud Gets Real

SMB Cloud Tipping PointCloud Computing is reaching a tipping point for small and midsize enterprises (SMEs) as the number and value of cloud-based applications and systems surpasses those running on site. Beyond email, SMBs use Software-as-a-Service solutions for customer relationship management, operations, finance, customer service, and vendor/supply chain management. SMBs want better integration between SaaS solutions and custom-built solutions to further enhance operations, marketing, sales, and the bottom line. Over the next few years, bots, machine learning/AI, and business intelligence will become the norm for SMBs as well as larger enterprises.

SMBs are moving core systems, infrastructure, and services to the cloud.

If all you have left on premise are your Active Directory services, some of your file and print servers/services, and a few business applications, moving your remaining IT services to the cloud makes sense. You can provide the same applications, data, and services without maintaining the physical infrastructure while enabling better integration of systems, processes, and information.

3 Strategies

You have three basic strategies to choose from when moving apps and systems to the cloud:

  • Beautify
    • Also referred to as “lift and load”, this strategy works best when you have (1) a custom-built application; (2) a customized system that cannot migrate to the vendor’s SaaS offering; and/or (3) a solution you do not want to further modify or rebuild as a cloud app.
    • In this scenario, we create cloud-based networks and servers to host and run your existing systems “as-is” with remote, secure access.
    • This option is an effective interim step to a more complete cloud solution.
  • Buy
    • In this scenario, you “buy” a SaaS solution from your current software vendor or move from your existing system to a new SaaS solution.
    • Your ability to “buy” depends on the capabilities of the SaaS solution(s) versus your current system usage and needs. For example, many businesses find that the SaaS version of Quickbooks lacks features and reports that they need an use.
  • Build
    • As the name implies, build means you are replacing an app or system with a new, cloud-based solution.
    • With the current evolution in bots, machine learning, artificial intelligence, and tools, many of your existing processes can be automated by cloud-native services with little or no traditional programming.
    • No-code and low-code solutions are the wave of the future.

Next Steps

Which strategy, or combination of strategies, is best for your business depends on several factors, starting with business goals, objectives, and priorities. Current capabilities, needed features/functions, competitive positioning, internal culture, cost, and value all come into play. When you properly plan and execute your cloud migration, you should see tangible and intangible benefits.


Contact us to discuss the possibilities and opportunities for your business.


 

The Curse and Blessing of Office 365 Licensing

Office 365If you ask IT pros about Office 365 licensing, they are likely to roll their eyes.

If you ask which license is right for you, the conversation will likely start with a heavy sigh. Microsoft has 6 primary Office 365 license options for business, several add-ons, a number of special-purpose licenses, and over a dozen stand-alone and value-add products.

The Curse is Confusion

Between the number of options and the frantic rate of new features and updates, we are not surprised when companies complain that picking the “right license” is confusing. You end up bouncing between tabs and browsers, comparing feature lists that never seem to have enough detail. You struggle to find which add-ons work with each license type. You may not even know where to look for specialty licenses that can save you money. And with the rapid growth of features and functions, you wonder if the web pages you scour for information reflect the latest updates and options.

The Blessing is Customization

You can escape the confusion. And, in doing so, you can customize your Office 365 licensing plan to best meet your needs. With “too many options”, you can mix and match licenses to the needs of your users. You can tailor the feature sets for groups of users and lower your average cost per user at the same time. You can decide when to rely on built-in features or third party solutions to meet specific business requirements. You can decide which users get add-ons and which do not.

The Key is Understanding

The good news: with guidance and understanding of the Office 365 and Microsoft 365 licensing structures, you can plan and implement subscriptions that meet your organization’s needs at the most affordable cost. By looking beyond Microsoft-only options to select third party tools, you can mix in lower cost licenses without sacrificing compliance, threat protection, telephony, and needed features. You can map out a strategy that enables hybrid computing and services and capabilities move to the cloud over time. You can integrate your cloud an on-premise environments into a seamless service.

The better news: you do not need to gbecome an expert.  Our Cloud Advisors, backed by experts from Microsoft, are ready to assess your needs, explore alternatives, and design solutions options. You gain understanding and select the option that best fits with your needs, priorities, and budget.

Your Next Step is ….

If you haven’t settled on a Office 365 or G Suite as your cloud suite, or if you think you should change from one to the other, your next step is our Which Cloud Analysis.  You complete a comprehensive survey and we provide a formal report that assesses your needs and environment and provides specific recommendations. We will also schedule a Cloud Advisor Session to review and discuss our findings and recommendations.

If you have decided, or currently use, Office 365, contact us to schedule a Cloud Advisor Session to review your environment and needs.  We will help you assess, plan, and implement a solution that delivers the value you want and need.


 

3 More Reasons You Are an Easy Cybercrime Target

Cyber AttackLast week, we gave you three reasons why you, as a small or midsize business, are a viable and desirable target for cyber criminals.

If those reasons don’t give you enough reason to act, here are three (3) more reasons SMBs, and you, a target for cyber criminals…

SMB data is increasingly networked

  • All of your systems — databases, email, documents, marketing, point-of-sale, and more — are likely running on a single network.
  • Access to one of your systems can lead to access to others. Target’s POS system was hacked using a security flow in the HVAC monitoring system running on the same network.
  • Moving data and systems into secure cloud solutions, and segregating network traffic minimizes the cross-over risk.

SMBs are using consumer products for business data

  • Consumer grade services are often more affordable, but often lack the security and data protection features of the higher-priced, business versions.
  • Separate work and home and use solutions designed for business, and, make sure to configure the security and privacy setting accordingly.

SMBs are often lax when it comes to security

  • Many small businesses operate in an environment of trust; people know and trust one another. This trust can be exploited by a disgruntled employee or an outsider.
  • Keep user identity management and passwords private and secure; Manage administrator and “super user” passwords so that they are unique, complex, and secure.
  • Keep servers and systems with sensitive data/access secure; enforce screen locking and passwords.
  • Educate your staff on security risks and behaviors.

 

Taking cyber security seriously is the first and best step in protecting your business, employees, and customers. Protection need not be overly complex; nor must reasonable protection be a budget busting expense. Reasonable measures balance cost and security.


Interested in ensuring you are protected, contact us for a free Cloud Advisor Session, or learn about our data protection solutions and our privacy solutions.


 

 

 

3 Reasons You Are an Easy Cybercrime Target

Cyber AttackAs we’ve mentioned before, more small and midsize businesses (SMBs) are falling victim to cybercrime. You might believe that hackers won’t bother targeting your business due to its small size. However, it is crucial to recognize that cybercrime aimed at smaller companies is undeniably escalating, and you could be the next cybercrime target if you do not take the necessary precautions.

According to HP’s Cyber Security and Your Business report, Cybercrime costs SMBs 4.2 times more per employee than larger businesses, and 60% of SMBs that experience a data breach are out of business in six months.

So, why exactly are cybercriminals interested in your business, and more importantly, what actions can you take to combat this threat?

Why Small Businesses are Prone to Cybercrime

It’s essential for you to acknowledge the following three reasons why you may be seen as an easy target for cybercrime and take proactive and defensive measures to protect your business.

1. SMBs spend less on security while larger businesses are increasing their security protections.

  • Your business is an easier cybercrime target because you are more likely to lack basic protections. In effect, you may attract cyber criminals because you are an easier target.
  • Budget for, and implement, reasonable protections covering user identities, access controls, user permissions, data loss prevention, and employee awareness and training.

2. SMBs do not have in-house security expertise.

  • Keeping up with risks and trends is time consuming, above and beyond ensuring that your security measures are updated and working on a day-to-day basis.
  • Leverage technology and your IT partners for automated solutions and expertise, as well as on-going management of your security and privacy solutions.

3. SMBS are moving into the cloud.

  • Using cloud applications and storage makes sense. But, your data is no longer behind a physical or logical “firewall”.  Protecting your data means protecting the cloud systems and services you use.
  • Always select business-grade services over consumer services. Implement all security features, including 2 Factor Authentication. And, when possible, integrate access to cloud services into a single system for managing user identities. And, do not forget to train, and periodically remind, your staff how their awareness and actions can allow or prevent an attack.

15 Actions You can take to Improve Your Cybersecurity

  1. Implement a robust cybersecurity strategy tailored to your business needs, including firewalls, intrusion detection systems, and antivirus software.
  2. Regularly update and patch all software and operating systems to protect against known vulnerabilities.
  3. Conduct regular security audits and risk assessments to identify and address potential weaknesses in your systems.
  4. Train your employees on cybersecurity best practices, such as recognizing phishing attempts, creating strong passwords, and handling sensitive data securely.
  5. Implement strict access controls and user privileges to limit unauthorized access to sensitive information.
  6. Encrypt sensitive data both in transit and at rest to protect it from interception or theft.
  7. Backup your data regularly and store backups in separate, secure locations to ensure data recovery in case of a breach or system failure.
  8. Develop and enforce a strong password policy, including the use of complex passwords and regular password changes.
  9. Enable multi-factor authentication (MFA) for all user accounts to add an extra layer of security.
  10. Monitor your network and systems for any unusual or suspicious activity using intrusion detection and prevention systems.
  11. Stay informed about the latest cybersecurity threats and trends through industry publications, forums, and reputable security organizations.
  12. Establish an incident response plan that outlines the steps to be taken in the event of a cybersecurity incident, including notification procedures and communication channels.
  13. Regularly educate your employees on emerging threats and provide ongoing training to ensure their knowledge remains up to date.
  14. Limit the use of personal devices for work-related activities and enforce strong security measures for those devices that are permitted.
  15. Partner with reputable cybersecurity vendors or consultants to get expert advice and assistance in securing your systems.

By implementing these actions and cybersecurity best practices, you can significantly reduce the risk of cybersecurity breaches and protect your business from potential threats. Remember, cybersecurity is an ongoing effort that requires continuous vigilance and adaptation to evolving threats.

It’s always a good time to perform a review of your IT security and data privacy policies, procedures, and systems.  Doing so is an affordable way to protect your business, your employees, and your customers from cyber crime. The cost of prevention is miniscule compared to the cost of a breach.


Interested in ensuring you are protected, contact us for a free Cloud Advisor Session, or learn about our data protection solutions and our privacy solutions.


 

Myth Busting Monday: Skype and Skype for Business are the Same

Office365-Logo-and-textSkype and Skype for Business carry similar names and are sometimes confused as one and the same thing.  Both let you communicate for free between computers and hold online meetings. But that is where the similarities end.

Skype and Skype for Business are Very Different Services

Skype is a free consumer service designed for communicating with a small number of people. You can buy credits to make calls to traditional phone lines and mobile devices.

Skype for Business is a secure communication and collaboration service designed to boost productivity by letting people connect in the way that is best for them — chat, voice, video, etc.  Skype for business is more than a chat and calling app, your team can give presentations and attend meetings from anywhere with an Internet connection.

Skype for Business lets you run online meetings with up to 250 attendees, gives your enterprise security, lets you manage your employee accounts, and integrates with your Office apps and Office 365. The integration with Office 365 also includes:

  • Presence – See if somebody is available or busy at anytime
  • Instant IM – Start an IM session by double-clicking a contact name
  • Share – During meetings, share your desktop or a specific application
  • Include – Invite people outside your company to meetings with a full-feature web conferencing experience
  • See – Integrate video through webcams on any call or conference

With Skype for Business, you can skip the expensive web conferencing services, along with the hardware, software, and administration required for on-premise communication servers. You simply manage access, settings, and security.


This is the seventh of a multi-part series designed to help companies better assess the opportunity and value of cloud-based solutions. Contact us to schedule a free, no-obligation Cloud Advisor session to discuss your priorities and plans.


Myth Busting Monday: Cloud Lacks Security

Office365-Logo-and-textSecurity is still the biggest fear across SMBs considering the cloud.  IT leaders and C-level execs worry about spies, cyberthieves, governments, and vendors access their company’s data. This fear is unfounded.

You are the Sole Owner of Your Data; You Manage and Control Privacy and Access.

Like most reputable and trustworthy cloud providers, Microsoft runs the Office 365 based on several key principles:

  • Microsoft never mines your data for any reason other than to provide you with the Office 365 services
  • Microsoft’s staff does not have access to your data
  • If you leave Office 365, you can always take your data with you
  • You control the security and privacy settings; you determine who has access to what
  • Auditing and supervision prevent your admins from unauthorized access to your data

Beyond the core security and privacy capabilities of Microsoft Office 365, we offer additional configuration, tools, and services to ensure compliance with privacy regulations and/or your internal policies.

Fear not the lesser known security of the cloud. Learn, trust, and go.


This is the sixth of a multi-part series designed to help companies better assess the opportunity and value of cloud-based solutions. Contact us to schedule a free, no-obligation Cloud Advisor session to discuss your priorities and plans.


Fast Fact Friday: SMB IT in the Cloud

fastfacts2According to a survey of 1,500 SMB IT leaders by BetterCloud in the spring of 2015 …

49% of SMBs expect to run 100% of their IT in the cloud by 2020.


Are you moving to the cloud? Is your roadmap in line with your business goals? Contact us for a no-obligation Cloud Advisor session.


 

Myth-Busting Monday: On-Premise is Safer Than Cloud

Office365-Logo-and-textJust because you can see it and touch it, does not mean it is safe and secure. With the number of successful ransomware attacks up more than 400% in the past year, it is increasingly clear that on-premise systems are not inherently more secure than they would be in the cloud. Many companies are hacked and remain unaware for weeks or months, as the use by cyber criminals of advanced persistent threats continues to rise.

Microsoft Office is secured with technologies and resources beyond the reach of nearly every small and mid-market business.

Large enterprises know that security is a full-time job, requiring a team of expensive experts and advanced technologies. And while large enterprise can afford to make this investment, most small and mid-size businesses do not have the resources to prevent, detect, and mitigate security issues.

Moving to Office 365, you enter an environment designed for security, backed by a team of security experts, industry leaders in regulatory compliance, and the latest security technologies and methods. Office 365 complies with the latest rules and regulations, including but not limited to:

  • HIPAA
  • Sarbanes-Oxley
  • Federal Information Security Management Act (FISMA)
  • ISO 27001
  • European Union (EU) Model Clauses and U.S.–EU Safe Harbor framework
  • Family Educational Rights and Privacy Act (FERPA)
  • Canadian Personal Information Protection and Electronic Documents Act (PIPEDA)

And, with this security, you get a 99.9% uptime guarantee.

Thinking of going cloud — or expanding your cloud use — and remain concerned about security and data privacy, give us a chance to assess your needs and map out a solution.


This is the third of a multi-part series designed to help companies better asses the opportunity and value of cloud-based solutions.  Contact Us for more information or a free Cloud Advisor session.


Myth-Busting Monday: Cloud Means Less Control

Office 365 CloudCloud adoption continues to grow. Many business and IT leaders still have the misconception that moving data into the cloud means giving up control of your data or your technology.

In fact, when you move into Office 365 and other cloud services, you still have control over your IT environment. You have the admin tools to control the who, what, where, when, and how of your information and systems.

The role of your IS team shifts from technical issues to business issues.

When you move to the cloud, you give up most of the time spent maintaining hardware and upgrading software.  You no longer need to focus on maintenance, repairs, daily admin tasks, and upgrades. You free up the time you need to focus on improving business operations, developing new analytics and insights, and launching new and agile initiatives.

When you move to the cloud, you stop spending ever-increasing capital dollars on servers and storage while trying to match capacity with need.  Cloud solutions let you focus your IT spend on specific capabilities for specific roles and needs within your organization.

Moving to the cloud lets you think strategically and select solutions that support and respond to the needs of your managers and staff.

Think about how you want to improve your business, and contact us; we will help you select and deploy the cloud solution that can make it happen.


This is the second of a multi-part series designed to help companies better assess the opportunity and value of cloud-based solutions.  Contact Us for more information or a free Cloud Advisor session.


Myth-Busting Monday: Office 365 is not just Office “Online”

Office 365Even with the growing adoption, many still see Microsoft Office 365 as “Office in the Cloud”.

In fact, Office 365 is an entirely different suite of services.  Yes, Office 365 Business Premium and Enterprise licenses include the MS Office apps we know and use — Outlook, Work, Excel, Powerpoint, and more.  But Office 365 is not just a suite of productivity tools.

Microsoft Office 365 is a business communication, collaboration, and information management ecosystem.

Office 365 licenses can include:

  • OneNote – Multimedia note taking from any platform
  • SharePoint – Collaboration platform for file sharing, intranets, document management, workflows, and information management
  • OneDrive – Personal and shared file storage
  • Skype for Business – Voice, secure IM, video meetings, and presence management
  • Yammer – Social collaboration for business
  • Power BI – Wizard driven business analytics
  • Sway – Web 2.0 publishing to tell your story
  • Planner – Project and task management

As important as the suite of tools, Office 365 can change the way your team works together.  With your data secure and in the cloud, you share information rather than attaching files to endless chains of emails. Your team has the ability to work anytime, from anywhere, from nearly any device. Your people are connected because the data and information they use is connected.

So if you haven’t moved into the cloud, stop thinking of Office 365 as hosted email and some apps. Start thinking about how you want to improve your business. Then use Office 365 to make it happen.

Already on Office 365 and feel like you’re not using it to its fullest potential? Ask us about our adoption and engagement programs.


This is the first of a multi-part series designed to help companies better assess the opportunity and value of cloud-based solutions.  Contact Us for more information or a free Cloud Advisor session.


 

library

Nothing Found

Sorry, no posts matched your criteria