Posts

Major Google for Education Licensing and Price Changes

Google for Education Logo

As you are hopefully aware, Google announced major changes to both licensing and pricing for paid Google for Education editions

These changes will impact most schools after February 1, 2026, and will affect some schools as soon as October 1, 2025.  Depending on your annual renewal date, your district may experience a significant increase in Fiscal 2026 over current budgeted amounts.

The following are the licensing changes, pricing changes, and timing for the changes. We are also sharing our general recommendations based on your current subscription and plan.

Licensing Changes

  • Google is eliminating licensing that differentiates between students (full and part time) and faculty/staff. 
    • All users will require the same license(s)
    • You will no longer receive a staff license at no cost for every four (4) student licenses.
    • Every active user must be assigned an Education Fundamentals license
  • Education Standard and Education Plus subscriptions are designed and intended to cover all active users, not just a subset. 
    • Partial domain licensing is no longer possible, with few exceptions.
  • If you subscribe to either Standard or Plus, you must:
    • Purchase enough paid licenses to cover every user with an Education Fundamentals license
    • Ensure that all users with an Education Fundamentals license have an assigned paid license
  • Google is enforcing a minimum purchase requirement for paid licenses of 50 seats.
    • If your school has fewer than 50 faculty/staff and students, you must purchase 50 Education Standard or Education Plus licenses.

Pricing Changes

Google is increasing Google for Education pricing as follows. Note that subscriptions that were licensed and paid per-student will now be per-user, inclusive of students and faculty/staff.

Education Standard

  • Price remains at $3 per user per year.

Education Plus

  • Price increases from $5 to $6 per user per year
  • If subscription cost increases more than 10%, you may be eligible for a 1-year 10% discount on your license fees
  • Discounts are available with multi-year contracts

Teaching and Learning add-on

  • Price increases from $48 to $60 per user per year for Annual/Fixed Term Plan Subscriptions
  • Flexible Plan subscriptions increase from $4.80 to $6 per month

Timing of Changes

License and pricing changes start as early as October 1, 2025, for new all subscriptions and existing Flexible Plan subscriptions.  The changes take effect beginning February 1, 2026, for all existing Annual/Fixed Term Plan subscriptions.

New Purchases

  • For new Education Standard and Plus purchases, the new pricing takes effect as of October 1, 2025. The new pricing is for both Flexible (monthly) Plans and Annual/Fixed Term Plans (1+ year commitment with annual or monthly payments).

All Flexible Plan Subscriptions

  • If you are on Flexible Plan (monthly) subscription, the new pricing begins as of October 1, 2025.

Annual Plan Subscription Renewals

  • If you are on an Annual Plan Subscription, the price increase takes effect with your next annual renewal, on our after February 1, 2026.  As such:
    • If your renewal is before February 1, 2026, you may renew with the current licensing and pricing for one (1) year only.  Any renewal for multiple years will use the new licensing structure and pricing.
    • If your renewal is on or after February 1, 2026, your subscription will move to the new licensing and pricing structure upon renewal.
  • Please note that 
    • If your renewal is after February 1, 2026 and within your current fiscal year, your new cost may not be fully budgeted if your budget was finalized before considering the new licensing and pricing structure.
    • If you are renewing Education Plus and see a cost increase of more than 10%, Google will authorize a 10% discount for the first year of your renewal.

Annual Plan Subscription Upgrades

  • If you are using Education Standard, you can upgrade to Education Plus using the current licensing structure and pricing until January 31, 2026.  This includes mid-term upgrades that change your renewal date.
  • As of February 1, 2026, upgrading from Education Standard to Plus will move you to the new licensing structure and pricing even if the upgrade is prior to your renewal date.

Downgrades

  • If you choose to downgrade from Education Plus to the Teaching and Learning add-on, the new licensing and pricing takes effect October 1, 2025.

Our Recommendations

Depending on your current Google for Education subscription and plan, we recommend you consider the following:

New Education Standard and Education Plus Subscriptions

  • Schools planning to add Education Standard or Education Plus should do so with an Annual Plan commitment before September 30, 2025. 
  • This will provide first year savings over the new licensing and pricing structure and provide you with the ability to properly budget for FY2027.

Current Education Plus Subscriptions

  • Consider a multi-year commitment with possible discounts.
  • Evaluate your usage and determine if downgrading to Education Fundamentals and using the Teaching and Learning add-on is appropriate.

Upgrading from Education Standard to Education Plus

  • Schools planning this upgrade should do so with an Annual Plan commitment before September 30, 2025.
  • This will postpone the price increase and will provide a year savings over the new licensing and pricing structure and provide you with the ability to properly budget for FY2027.

Flexible Plans

  • Assess the stability of your user counts and, if feasible, move from your monthly plan to an Annual Plan prior to September 30, 2025. 
  • This will lock in current licensing and pricing for the first year and give you the opportunity to budget for increasing costs in the future.

We Will Help

Plan Now; Act Soon.  As with any major change, we expect you will have questions and that you may need to reassess your budget.  With the first deadline approaching October 1st, you have limited time to make decisions.  

Our Cloud Advisors are here to assist. We can review your current subscription, discuss your options, and help secure the initial year and multi-year discounts.

Please schedule time with one of our Cloud Advisors for assistance.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

Rightsizing IT: Managed Cloud Services for Smaller SMBs – Part 2

Rightsizing IT for Smaller SMBs with Managed Cloud Services

Smaller businesses, like yours, use technology differently than larger organizations. You rely more on commercially available solutions than custom-built or highly-customized solutions. You are held to the same security standards as larger companies, but you lack the expertise and budget of bigger businesses. Rightsizing your IT means carefully matching your IT services to your needs, priorities, and budget. This is key to keeping your services productive, secure, and affordable.

In Part 1, we discussed the unique IT challenges you face as sole practitioners, solopreneurs, or very small business (VSB) owners and leaders. In Part 2, we dive into the process of rightsizing your IT.

1
Pick the Right Productivity Suite

Think beyond just email and calendars; focus on how you communicate and share information with your clients, customers, contractors, and vendors. Do you send and share documents? What CRM and financial apps do you use? Do you rely on and use any industry-specific software locally or in the cloud?

While other platforms exist, some at lower costs, Microsoft 365 and Google Workspace offer the most comprehensive platforms for small business productivity, communications, and collaboration.  Microsoft and Google promote different philosophies:

  • Microsoft 365 works best as a hybrid solution, with full-featured software running locally, slim web versions, and a range of integrated apps, such as planning, bookings, and PowerBI. 
  • Google promotes a cloud-first approach. Focused on core communication and collaboration, Google expects you will select and integrate cloud-based (Software as a Solution / SaaS) business apps to meet your specific needs. Google is designed to serve as your identity manager, providing integrated access to your cloud apps and services.

Consider the business apps and systems you use and how you want them to work with your productivity suite. Your line of business and back-office apps can guide whether Microsoft 365 or Google Workspace is the best fit for your IT ecosystem and your business.

2
Avoid Duplicate Services

Both Google Workspace and Microsoft 365 are robust productivity suites. And yet, we often opt to purchase additional solutions out of convenience even though we already have similar features at our fingertips. The most commonly duplicate services across our smaller business clients are:

  • Meeting services
  • External file sharing
  • Generative AI
  • AI assistant tools (transcription, note taking, etc.)

Learning to use your existing features and capabilities negates the need to spend money on – and manage – additional solutions. You can easily overcome concerns by ensuring you and your team know how to use the features you need. For example, when scheduling a meeting with a client, you might say, “I will send you a Google Meet invite, or if you prefer Zoom, you can send the invite.”

Note that features may vary based on your Microsoft 365 or Google Workspace subscription. You may need to upgrade in order to access certain features you require. This upgrade is likely less expensive than licensing another third-party app.

3
Be Cloud Forward

For smaller businesses, the cloud offers significant advantages over on-premise solutions.

  • Mobility: Securely access your systems, apps, and data, whether you are in the office, a coworking site, at home, or on the road.
  • Security: Leveraging the cloud simplifies your security exposure, lowering your costs while maintaining or increasing your protections.
  • Business Continuity: Cloud-based services protect you from local outages and service disruptions, reduce the number of ‘things’ that can break, and make it easier to recover when things do go wrong.
  • Ease of Access: Get to work without having to jump through VPN hoops. Your access is the same, regardless of where you are working.
  • Affordability: With a simpler, more secure, and integrated IT ecosystem, you pay less for the support and services you need and want.

4
Pick the Right Partner

If you are a sole practitioner, solopreneur, or VSB, most IT service providers do NOT want you as a client. Our research indicates that fewer than 10% of traditional IT and managed service providers want clients with 10 or fewer employees. Their business models require an economy-of-scale that is not viable with very small clients.

Pick an IT partner that wants your business and does not see you as an exception to their normal or preferred type of client. Look for an IT service provider that has:

  • A successful history working with smaller businesses.
  • Services and solutions tailored to your needs and priorities as a smaller business.
  • Gives you options that let you make value-based business decisions about your IT services.
  • Focuses on affordability as much as features, capabilities, and security.

How Will Cumulus Global Help?

At Cumulus Global, we truly value sole practitioners, solopreneurs, and very small businesses. We specialize in tailored solutions designed just for businesses like yours, backed by a proven track record of success.

Our top priority is ensuring that you have productive, secure, and affordable Managed Cloud Services, Cloud Forward IT Service and Support, and Security CPR™ Managed Security services. 

We focus on how your IT services can best help your business thrive and grow without overspending.

Schedule a meeting with a Cloud Advisor and take your first step towards better IT for you and your business. 

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

Rightsizing IT: Managed Cloud Services for Smaller SMBs – Part 1

Rightsizing IT for Smaller SMBs with Managed Cloud ServicesSmaller businesses, like yours, use technology differently than larger organizations. You rely more on commercially available solutions than custom-built or highly-customized solutions. You are held the same security standards as larger companies, but lack the expertise and budget of bigger businesses. Rightsizing your IT – carefully matching your IT services to your needs, priorities, and budgets – key to ensuring your services are productive, secure, and affordable.

As a sole practitioner, solopreneur, or very small business (VSB) with fewer than 20 employees, you face an additional challenge. Most IT firms prefer clients with over 20, or even over 30, employees. The business model for most IT service firms, including Managed Service Providers (MSPs), requires clients that can provide an economy of scale. In short, most MSPs see you as an unprofitable client.

By rightsizing your IT with managed cloud services, you can find and benefit from affordable, secure, and productive IT solutions and the services your business needs and deserves.

How You Are Unique

Smaller businesses rely heavily on commercial software and public IT services. Given the investment required, you are less likely to use customer-built and highly-customized solutions. Software packages, software-as-a-service, and public cloud services (Microsoft 365 and Google Workspace) best meet your needs.

Sole Practitioner

As a Sole Practitioner, you are the business. When it comes to IT, you likely …

  • Run your business on a laptop, smartphone and maybe a second computer.
  • Work from a home office, coworking space, or wherever you can when you are on-the-go. You are mobile.
  • Rely ubiquitously on your technology. Your IT focuses on your productivity in all your day-to-day activities.
  • Worry that security and other IT costs are, or will grow, beyond your budget.
  • Fear IT problems as disruptions, or downtime, immediately impact your business.
  • Rely on others, formally or informally, for IT advice and assistance.
Solopreneur

As a Solopreneur, you are the business, for now, as you plan for growth. When it comes to IT, you are similar in need to sole practitioners with some added concerns. You likely …

  • Expect to grow your business adding staff, freelancers, or contractors over time.
  • Want your IT solutions and services to scale with your business, without overtaking your budgets. You must manage fixed costs.

In addition, you may have investors and other stakeholders with opinions, or requirements, for how you should manage your business and which technologies to use.

VSB Owner or Leader

As an VSB owner or leader, you have a team that relies on you to provide a productive and effective working environment. You likely …

  • Understand how critical effective collaboration is to your success.
  • Have team members with varied levels of tech skills; your staff needs help and support at times.
  • Work with customers that share expectations or requirements about information security.
  • Have access to IT resources. These may be informal or professional, internal or contracted.
  • Face budget constraints on your IT spending.

Given your IT needs, business priorities, security requirements, budgetary constraints, and the challenge of engaging qualified IT professionals, you and your business face significant challenges.

Rightsizing IT is the Solution

Rightsizing IT, matching your IT solutions and services to your prioritized needs and budget, with managed cloud services ensures your business can operate productively and securely without destroying your budget.

In our next blog post, we share how to assess and right-size your IT, and how to find and leverage the right IT resources.

How Does Cumulus Global Help?

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable Managed Cloud Mervices, Cloud Forward IT Service and Support, and Security CPR™ Managed Security services.  We focus on how your IT services can best help your business thrive and grow without overspending.

Schedule a meeting with a Cloud Advisor to discuss your challenges, needs, and priorities.  We will help you assess, plan, and execute the right IT services for your business and your budget.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

Why Not Prevent AI Data Breaches?

Data Loss PreventionTo state the obvious, AI data breaches and leaks will damage your business. Even sharing sensitive or protected information internally will cause problems.

Less obvious is the fact that you have already shared information that should not be shared. You should expect that private, sensitive, and protected information in Google Workspace or Microsoft 365 has been shared inappropriately to people within your company, outside your company, and/or publicly.

Not obvious to most is the fact that integrated AI tools, like Google Gemini and Microsoft Copilot, will find, use, and share any information the tool can access.

Just because an employee or a customer has never reported seeing something they shouldn’t have does not mean they have not done so. Nor does it mean they will not see something that should be secure in the future.

The Problem

The problem we face: the myths we believe when it comes to our own information security and the risk of AI data breaches.

Myth 1 – Oversharing Does Not Happen

What do we mean by oversharing?  Oversharing is when somebody gives access to information (files or folders) that unintentionally gives others access to the information, directly or indirectly.  

Most often, this happens when sharing a file or folder by link in an email or chat. You are prompted by the system to grant access. Typically the prompt is to give view access to “Anyone with the link” or “Anyone within your company.” This one-click option is easier than finding the file and editing the permissions.

The risk of course is that “anyone with the link” can be anybody — inside or outside – to whom the message is forwarded or added to a reply.

And “anyone within your company” means just that. They may not see it if they never search for it or for something similar.

Myth 2 – Security Breaches Require a Deliberate Act

We want to believe that our employees would never intentionally breach security or leak sensitive information. When we equate intentional acts with deliberate acts, we forget that many user actions can, and will, intentionally share information beyond what is appropriate.

With email, we diligently warn people that clicking the wrong link is damaging and to remain vigilant. We are not nearly as diligent when it comes to files and folders. Most of us assume that the permissions set on files and folders will keep us safe.

Myth 3 – Google Workspace and Microsoft 365 are Secure

Like most myths, this myth is partially true. Both Google and Microsoft aggressively secure their cloud services and have a “shared responsibility” security architecture.

Microsoft and Google secure the services they provide to ensure only authorized users can access the services. They also provide the infrastructure for you to manage user accounts, access, and permissions. You are responsible for the security of your data within Google Workspace and Microsoft 365.

As an example, both services allow you to block external file sharing. If you choose to allow external file sharing and a file is mistakenly shared externally, this is your issue to resolve.

The Reality

When you use Microsoft Copilot and Gemini AI, the tools have access to data according to the access available to each user. If a user has inappropriate access to confidential information, Copilot or Gemini have access as well. 

Since the AI tools will collect, analyze, and integrate multiple relevant sources, the AI tools are more likely to find and use the information.

The Solution

Ensuring that your information is properly protected as you begin using AI tools is not easy. The solution for preventing AI data breaches, however, does not need to be difficult or expensive. 

Data Loss Prevention

Modern Data Loss Prevention (DLP) services give you the ability to 

  • Set policies and rules for handling sensitive and protected information
  • Analyze the content of files and folders against the policies and rules
  • Notify, report, and automatically mitigate any violations

Mitigation can include redacting sensitive information and/or modifying permissions to bring them into compliance.

More robust DLP solutions offer advanced tools to manage access and permissions, such as conditional access, time-limited access, and managed permission overrides.

DLP Options

Both Microsoft 365 and Google Workspace offer DLP features and capabilities. Most of these features are within the Enterprise tier (more expensive) subscriptions.

For small and midsize businesses using Business tier subscriptions, adding an integrated, third-party DLP service will be less expensive than upgrading. 

Third-party services offer robust management portals that are generally easier to learn and use than the built-in features.

Getting Started

First things first, do not panic. Begin by reviewing your current security and permissions policies, procedures, and top-level settings. Also, consider how you and your team are currently using Copilot, Gemini, and other AI tools, and how you expect or plan to use them in the future.

With a high level assessment, you can explore how you want to use DLP and which services will provide the most effective and affordable solutions for your needs.

Cumulus Global can assist with real-time assessments of your file and folder security to provide a benchmark and a baseline for planning and decisions. From there, we can help implement, configure, and manage your DLP services

Why Cumulus Global?

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you do not overspend on services and to focus your IT dollars on the capabilities and services you need.

Let us know how we can help, or schedule a meeting with a Cloud Advisor.

We will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

Save or Spend? IT Decisions for Turbulent Times

Radical changes in government policies, along with unpredictable tariffs and trade policies,  create a level of economic uncertainty that impacts our business decisions. Across all aspects of our businesses, including IT services, is it time to save or spend?

Background

Global Economic Policy Uncertainty Index

Global Economic Policy Uncertainty Index through March 2025

US Economic Policy Uncertainty Index

US Economic Policy Uncertainty Index through March 2025

According to Economic Policy Uncertainty*, the Global Economic Policy Uncertainty Index is the highest it’s been since the index was created in January 1997. For the US, and globally, the Index is at or above record highs seen at the onset of the COVID-19 global pandemic.

With this level of uncertainty, we need to reassess our existing strategies and plans. The trends and assumptions used to create long- and near-term plans may no longer hold true. The lack of clear policies that we can use guides further complicates matters. 

Impact on Our Decisions

How does economic uncertainty impact us as small and midsize business owners and leaders?

Downturns

Generally, when we expect an economic downturn, we focus on saving. With the potential of stagnant growth or drops in revenue, we seek ways to reduce costs. With respect to IT services, these savings can be tangible. Delaying equipment replacements and software upgrades is one common example. Savings can also be intangible, or indirect. Increasing automation and streamlining processes to improve productivity can mitigate staffing needs and reduce the need for additional IT resources and services.

Growth

When we expect a period of economic growth, we tend to spend. More specifically, we focus on investments that enable us to take advantage of growth opportunities. For IT, direct spending often looks like investments in new technologies and services. Indirect investments commonly focus on productivity and automation to mitigate staffing needs as your business grows.

Should We Save or Spend?

For your business, and specifically at your information technology and services, should you save or spend?

You should do both! Save and spend.

Save

Most small and midsize businesses overpay for portions of their information technology and services. The most common culprits are duplicate services. Poor license management, shadow IT, and a lack of lifecycle management often contribute to overspending.

Now is a great time to assess your IT services, for example:

  • Identify areas where you can standardize and consolidate
  • Examine on/off boarding to ensure you remove unused licenses and services
  • Work to eliminate shadow IT services
  • Monitor consumption-based services for saving opportunities
  • Explore using cloud services, such as VDI / Remote Desktops to extend the life of laptops and desktop
Spend

The economy is changing and may require you to adapt to new market realities. These changes may also create unexpected opportunities. 

You want (and need!) to be ready. Investing now can help ensure you are ready to exploit new opportunities, adapt to changing market conditions, and leverage future growth opportunities.

Tactically, look for opportunities with quick returns. One-time expenditures can provide long-term value. 

  • User Training and Support: Help your team get more value out of current IT services; improve productivity and job satisfaction.
  • Migrate more to Cloud Services:
    • Expand support for hybrid, remote, and flexible work patterns
    • Improve security and meet security requirements more cost-effectively
    • Replace fixed capital expenditures with variable operating expenses you can scale based on need and usage

Strategically, explore opportunities to invest in technologies and services that will enable your business to grow.

  • AI-Powered Solutions: Look for ways to improve marketing, sales, customer service, or internal team productivity.
  • Replace or Upgrade: How well are your key systems servicing your business? Could you benefit from better customer relationship management, marketing and sales tools, financial systems, or reporting?

We Will Help

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you do not overspend on services and to focus your IT dollars on the capabilities and services you need.

Our IT Assessment may be a good place to start. Let us know or schedule a meeting with a Cloud Advisor.

We will help you adapt while keeping your IT services secure and cost-effective.

* Economic Policy Uncertainty is a non-profit research collaboration from Northwestern University Kellogg School of Management, Stanford University, and the Hoover Institution

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

Microsoft or Google Calling? Call Your Trusted Advisors

Ringing PhoneYou work with an IT service provider that learns your business, priorities, and IT needs. They work to address your needs and priorities within your budget and in alignment with your business goals and objectives. When economic conditions shift, the vendors with whom your IT service provider partners – Google, Microsoft, and others – get nervous and begin calling you directly, bypassing your trusted advisors.

Since February, we have seen and received reports that our customers, and those of other Microsoft partners, are receiving unsolicited calls, emails, and calendar invites from “Microsoft” about their accounts, licensing, and renewals. These unsolicited contacts are NOT Microsoft “solutions consultants” or “international suppliers” as they might claim. They are Microsoft telemarketing contractors tasked with convincing you to upgrade and expand your Microsoft licensing.

Why is This a Problem?

The contractors doing the outreach do not know your business, nor do they know the extent of your relationship with us, or your Microsoft partner.

  • Their suggestions are often incorrect.
    • They are not aware of how you are using your Microsoft 365 services and the needs of your business.
    • They are not aware of other services you are using, such as backup/recovery and third party security services.
    • Many of their recommendations will duplicate services and costs.
  • The communications and tactics are often aggressive.
    • They may state that they have reviewed or audited your account and you need to upgrade. They may also claim that you need to do an audit, giving you the impression that you are out of compliance.
    • They may attempt to refer you to specific vendors for assessments and services. These often duplicate services you already have or that can be provided more cost-effectively by us or your current Microsoft partner.
  • Customers and Microsoft partners report that the calls and meetings are often just high-pressure sales pitches to buy more seats – a waste of time.

What To Do

If you receive a call or email that you suspect is from a Microsoft “Solutions Consultant” or “International Suppliers”, verify that this is the case. Ask if they are a Microsoft employee or contractor and where they are based. Note that their email address will start with a “v-”, indicating they are a vendor – even though the domain remains “microsoft.com”.

If you do not want to engage, let them know as much and instruct them to contact Cumulus Global, or your partner. We, or your partner, will be happy to screen the call and advise you if the offer is worth considering.

Do you want to engage? Insist that Cumulus Global, or your Microsoft partner, is invited and participates in the meeting. We can provide context to the “consultant” and guidance to you.

Microsoft is not the only vendor that may bypass your IT service provider and contact you directly. It is always best to loop-in your IT service provider.

Your Next Step

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordably managed cloud services. We work to ensure that you do not overspend on services and to focus your IT dollars on the capabilities and services you need.

If your needs or priorities change, let us know or schedule a meeting with a Cloud Advisor. We will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

Debunking Cyber Insurance Myths

Cyber Insurance Risk Assessment

Your business faces an ever-increasing array of cyber threats. Beyond protections, cyber insurance is an essential component of a robust risk management strategy. Therefore, understanding cyber insurance realities is necessary for you to make sound security and business decisions. In this post, we focus on debunking common cyber insurance myths.

1MYTH: Cyber Insurance Policies Offer the Same Level of Protection

In reality, policies vary significantly with respect to coverages and services. Opting for bundled policies generally results in coverage gaps, as most general liability policies treat cyber coverage as an add-on.These gaps leave your businesses vulnerable to liabilities and losses.

Standalone cyber insurance policies, provided by financially strong carriers, offer comprehensive protection tailored to the specific needs of your business. They address unique risks associated with cyber threats given your industry, business size, and other risk factors. Standalone policies also often include coverage of forensics, temporary resources, and other recovery needs. Dedicated coverage helps you respond more effectively to a cyber incident.

2MYTH: Your IT Security Measures Dictate Your Premiums.

While robust security practices can positively impact premiums, broader industry trends and company-specific factors play a more significant role in determining pricing.

Industry-wide loss ratios have a substantial impact on insurance costs. Peer group averages impact premiums as well. Insurers assess the risk profile of businesses within sectors. As insurers issue more policies and analyze claims, insurers refine actuarial, incorporating additional factors and risks.

3MYTH: Cyber Insurance Policies do Not Pay Out

Many businesses hesitate to buy standalone cyber insurance policies out of fear that their policy will not pay out in the event of a claim. Reputable cyber insurers with strong financials rarely deny claims with a valid cause..

Inaccurate, or fraudulent, applications are the most frequent reasons for claim denials or reductions. 

Your application must accurately reflect your cyber insurance risk profile. The information you provide on your cyber insurance application should reflect a thorough review process. Cybersecurity tools offer verification of your security profile.

4MYTH: Cyber Insurance is All You Need

Many businesses, including yours, may need additional layers of protection for specific cyber risks. These additional coverages may not be available within a traditional cyberinsurance policy.

Cyber warranties offer additional layers of protection by covering these specific elements of cyber risk. Combining cyber warranties with cyber insurance creates a more comprehensive safety net. This approach bolsters your overall security strategy and ensures appropriate coverage.

5MYTH: Robust Cybersecurity Measures Eliminate the Need for Cyber Insurance

Investing in strong cybersecurity defenses provides crucial protection for your business. No security profile or system, however, will stop every cyber attack, data breach, or data loss incident. Cyber threats continually evolve. Even the most secure systems fall victim to sophisticated attacks.

Cyber insurance serves as your financial safety net. Beyond covering direct financial losses, better policies help you recover from incidents that slip through the cracks of your security measures. These resources include forensics, data recovery, customer relations, legal expenses, and more. Cyber insurance protects you financially if and when a cyber attack gets past your defenses.

6MYTH: Obtaining Cyber Insurance is Complicated and Time-Consuming

The thought of obtaining cyber insurance deters many businesses from seeking the coverage they need. Horror stories of complex applications, surveys, and audits create anxiety and fear of the process. 

Unfortunately, this myth can come true. Businesses that apply through general insurance agents and fail to leverage knowledgeable IT resources often run into issues during the underwriting process.

Cumulus Global partners with cyber insurance specialists that offer streamlined application processes and non-committal quotes. Our partners work with more than two dozen carriers, ensuring you have options to choose the policies that meet your business needs and budget. Non-biased policy reviews help you understand your coverages and make informed decisions.

Your Next Step 

Avoid falling prey to cyber insurance myths. Contact us and let us introduce you to our cyber insurance partners.

We can provide you with a Cyber Insurance Risk Assessment and help you assess your cybersecurity profile.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

Your 2025 IT Checklist – The Next 3 Items

IT Checklist

The Next 3 Items on Your 2025 IT Checklist

As we move into 2025, our businesses face a new set of challenges. Political and economic changes, rapidly emerging technologies, and increasing security threats will all demand our attention.  Where we focus, and the decisions we make, will impact our businesses, customers, and employees. Is your 2025 IT Checklist ready to help?

Your information technology services remain critical to your business operations. Pragmatic, thoughtful planning and decisions now, will empower your team and enable your business to address the coming challenges – and opportunities.  Here are the next three of six key areas to explore as you build your IT goals and objectives, and your 2025 IT checklist.

4 Enhance Security Measures and Compliance

Evolving threats and regulatory requirements keep cybersecurity a top priority for businesses. Beyond protection and prevention, focus on resilience. Ensure your business can maintain operations during and after a crisis.

  • Benchmark your security profile against recognized frameworks, like CIS or NIST, as well as industry standards and regulatory requirements. 
  • Conduct regular security assessments and penetration tests to identify vulnerabilities, scope risks, and prioritize solutions 
  • Implement a phased approach to security improvements; start with high-impact, low-cost changes. 
  • Educate employees on security protocols. Emphasize their role in maintaining a secure environment. 
  • Update your security profile, risks, and priorities over time with periodic assessments and penetration testing.

5 Streamlining IT Infrastructure for Efficiency 

As your IT environment becomes more complex, inefficiencies and costs will escalate. Simplify your IT systems and services to reduce redundancies and enhance productivity.

  • Identify and eliminate duplicate services to reduce license, admin, and support costs.
  • Focus on removing apps and tools that duplicate capabilities in your Google Workspace or Microsoft 365 services.
  • Identify and eliminate shadow IT services to lower costs and prevent data loss.
  • Address mismatched systems that may hinder productivity. Lack of integration between cloud and local applications, for example, requires extra time and effort to store, share, and secure files and information.

6 Prepare for the Future: Trends and Innovations

Stay ahead of technology trends to ensure your business remains competitive. 

  • Keep an eye on innovations in areas like cloud computing, artificial intelligence (AI), communications, and cybersecurity.
  • Invest some time to regularly assess how these trends might benefit your business – strategically or tactically.  
  • Invest in employee education and training so they can adapt quickly to technology and business changes. 
  • Prioritize building a flexible IT infrastructure and services that will adapt and incorporate future innovations. Ensure your business remains resilient and agile in an ever-evolving digital landscape.
  • Foster a forward-thinking culture. Anticipate challenges and capitalize on new or different opportunities.

Next Steps

For help with any part of your 2025 IT checklist, or to tap into our expert guidance, book a complementary  intro  call with our Cloud Advisors.  Ask for an IT Assessment Referral Code and request your IT assessment

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

The First 3 Items on Your 2025 IT Checklist

IT ChecklistAs we move into 2025, our businesses face a new set of challenges. Political and economic changes, rapidly emerging technologies, and increasing security threats will all demand our attention.  Where we focus, and the decisions we make, will impact our businesses, customers, and employees. Is your 2025 IT Checklist ready to help?

Your information technology services remain critical to your business operations. Pragmatic, thoughtful planning and decisions now, will empower your team and enable your business to address the coming challenges – and opportunities.  Here are the first three of six key areas to explore as you build your IT goals and objectives, and your 2025 IT checklist.

1 Navigate the Windows 10 End of Life Transition

As we approach 2025, one of the most pressing IT challenges for businesses is the transition away from 

Windows 10 reaches end of life on October 14, 2025. Microsoft will no longer provide updates, support, or free security patches. Now is the time to prepare. The move to Windows 11 will impact your IT planning, budget, and operations.

  • Inventory all devices running Windows 10, including laptops, desktops, and any embedded systems in manufacturing or distribution equipment.
  • Evaluate each device for Windows 11 compatibility and identify machines that require replacement.
  • Determine if compatible machines can/should be upgraded or replaced to ensure performance.
  • Subscribe to the Extended Security Update program for systems that cannot or will not be replaced in time.

As you assess your needs and plan replacements and upgrades, be mindful of potential supply chain issues. Expect the current political and economic climate, and increased demand for new devices, to impact pricing and availability.

2 Maximize Your Productivity Suite Utilization

Your productivity suite – Microsoft 365 or Google Workspace – is the backbone of your business operation. And yet, studies show that over 65% of small businesses leverage less than 40% of their productivity suite’s features. 

Unlocking the full potential of these tools can drive efficiency and collaboration.

  • Encourage a culture of continuous learning and sharing within your organization. Share shortcuts, tips, and best-practices.
  • Help your team explore, utilize, and gain comfort with new features.
  • Identify and share ways new features can streamline existing workflows and tasks.
  • Set expectations for team members to learn and use their systems more efficiently and effectively, and to adapt to updated workflows.

3 Integrate AI Effectively into Your Business Operations

Artificial Intelligence (AI) is becoming a cornerstone of modern business operations. Beyond the hype and hyperbole, AI can benefit your business when part of realistic, practical use cases.

In 2025, prioritize practical AI applications while safeguarding data security and managing costs.

  • Refine your data governance policies to protect sensitive information. 
  • Identify and prioritize use cases for AI, such as automating repetitive tasks or enhancing customer service. 
  • Explore AI capabilities in your existing systems before investing in new solutions. 
  • Provide thorough training to ensure employees understand AI tools and their role in streamlining workflows.

Next Steps

For help with any part of your 2025 IT checklist, or to tap into our expert guidance, book a complementary  intro  call with our Cloud Advisors.  Ask for an IT Assessment Referral Code and request your IT assessment

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

Picking the Right Google Workspace Subscription for Your Business

Google Premier PartnerTo meet widely varying customer needs, Google offers five core subscription options spread over two tiers. For larger organizations with frontline and deskless information workers, Google offers additional, specialized license options. If you are looking at a Google Workspace subscription for the first time, considering an upgrade, or looking for Gemini AI features, you’ll want to choose the subscription and licensing that meets your needs without overpaying.

Subscription Tiers

Business Tier

Businesses with fewer than 300 employees typically select one of the Business Tier subscriptions– Workspace Starter, Standard, and Plus. These subscriptions limit the number of users and focus on the features and security most appropriate for smaller organizations.

Enterprise Tier

Larger businesses, as well as those requiring more advanced capabilities and security, often opt for the Enterprise Tier subscriptions– Standard and Plus. The Enterprise Tier also includes specialized license versions for frontline workers and knowledge workers with other email services.

Selection Criteria

When selecting a subscription, most businesses focus on a few key capabilities, such as:

  • Storage capacity and shared drives
  • Vault archiving/e-discovery
  • Google Meet features
  • Select security capabilities

With AI now integrated into all Google Workspace subscriptions, you should take time to understand the Gemini features included in each plan. A deeper review of security features can also help guide your selection.

Here is a deeper look at key selection criteria.

Storage

Since September 2024, all Google Workspace subscriptions use pooled storage.

Vault, the compliant archive/e-discovery service, covers Gmail, Drive, Groups, Chat, and Calendar, is available for all Enterprise Tier subscriptions and Business Plus.

The amount of storage, allocated per user and pooled, is as follows:

Business Tier

  • Starter = 30 GB
  • Standard = 2 TB
  • Plus = 5 TB

Enterprise Tier

  • Essentials = 1 TB
  • Standard = 5 TB
  • Plus = 5 TB

Meet

Google Meet is a robust meeting and collaboration system that generally negates the need for third party solutions.

Google Meet with Business Standard and Plus

Meet Features in Business Standard and Plus Subscriptions

All Google Workspace licenses include a core set of features:

  • External participants
  • Secure meetings
  • Screen sharing
  • Mobile app
  • Dial-in (US & international)
  • Digital whiteboard
  • Hand raising
  • Reaction

At the Business Tier, Meet features scale up  as noted in the table.

The Enterprise Tier includes live streaming and additional security features with all licensees.

Participant limits increment as follows:

  • Essentials: 250
  • Standard: 500
  • Plus: 1000

Gemini AI in Google Workspace

The following matrix summarizes the Gemini AI features in each of the core Google Workspace subscriptions.

Google Workspace Gemini AI Features

Security

Google Workspace provides a comprehensive set of security features and tools. With too many settings and options to list here, we published a Google Workspace Security Feature Matrix as an eBook. 

Review security features against your regulatory, industry, and business requirements.

Selection Process

When evaluating Google Workspace subscriptions, it’s essential to assess the details. Part of your selection process should include determining whether selecting a higher subscription tier or upgrading is more cost-effective than integrating third-party tools to provide the functionality you need.

For example, while Google Workspace’s Standard Data Protection includes email sandboxing, the feature does not offer the same capabilities– such as QR code analysis– as many third-party email threat protection services. 

In many cases, upgrading your Google Workspace subscription provides the needed capabilities at a lower cost than using a third-party tool. This is often true for Google Meet compared to third-party web meeting tools like Zoom.

For other capabilities, however, a third-party integrated solution may still be required.

Your Next Steps

For help assessing your needs and options, please contact us or schedule a brief intro call with a Cloud Advisor.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

Webcasts

Secure Your Data for Gemini AI

(05/20/25) – Take steps to ensure that Gemini and other AI tools will not expose sensitive information internally or externally. In this 3T@3 Series online event, Cumulus Global CEO Allen Falcon is joined by Paul Lees, CEO of Bespin labs to discuss the importance of data governance and security with gen AI in Google Workspace.

Pick the Right Service Plan

(04/15/25) – Management, administration, training, and support determine how much value you get from your IT services and systems. In this live 3T@3 Series online event, Cumulus Global CEO Allen Falcon discusses how to select the right service plan and managed cloud services for your business.

Managed Cloud Services Update

(03/18/25) – Cumulus Global is updating our Managed Cloud Services to expand protections against cyber attacks. Cybersecurity Enhancements Add Value to your Managed Cloud Services. Changes to our traditional Service Plans give you even more options.

Data Loss Prevention (DLP) for SMBs

(02/18/25) – If your business must comply with government or industry regulations covering disclosure of protected information, Data Loss Prevention (DLP) can be complex and expensive. This session coves affordable, effective DLP solutions for small and midsize businesses, like yours.

Your 2025 IT Checklist

(01/21/25) – 2025 will be a year of change.  Expect new economic, political, business, and technology opportunities and challenges. Smart IT spending requires upfront planning. A 2025 IT Checklist for creates a roadmap for cost-effective IT decisions that yield better results.

A Techy Look at 2025

(12/17/24) – Technology, the economy, and governmental policies will each impact our businesses in separate and intertwining ways. Consider these 5 technology related Issues as you make your 2025 plans

IT Safety for Sole Practitioners, Startups, and Smaller Businesses

(11/19/24) – Your computer, and your IT services, are your business lifeline. Manage, protect, and secure them to protect your business. Here are affordable solutions to protect you and your business.

Google Gemini Quick Start

(10/15/24) – The value of Google Gemini depends on how well you are able to use it. This Gemini Quick Start gives you an overview of your options, shares more than 11 ways you can use Gemini, and covers Gemini’s limitations.

Cybersecurity: Enough is Enough

(9/24/24) – Beyond industry and regulatory requirements, your cybersecurity should match your business’s risks, needs, and budget .. and nothing more. This event focuses on affordably scaling your cybersecurity.

Check Your IT Blind Spots

(7/23/24) – Blind Spots evolve when we fail to reassess decisions as technology, business, and other factors change over time. Checking your IT Blind Spots will identify opportunities for savings, security, and improvements.