Posts

PC Continuity Means Business Continuity

PC ContinuityIn today’s fast-paced business world, the ability to maintain continuous PC operations is crucial for your business. With limited resources and manpower, you cannot afford to lose data or prolonged downtime. A crashed laptop can take 4 or more days to repair (or replace) and rebuild. The impact on your ability to serve your clients, manage marketing and sales, and invoice will be operationally and financially disruptive.

Backup Covers the Basics

Backup solutions are foundational to business continuity, particularly for small enterprises. A reliable backup service ensures your critical data is secure and recoverable. Having backups off-premise, or in the cloud, extends your protection to physical hazards that can damage local backup systems.

Backups, while essential, come with challenges.  Before you restore, you need to repair or replace damaged equipment. This takes time. Restoring from the cloud is limited by bandwidth. This takes time.  Repair and restore gets you your data back, but slowly. Meanwhile, you will struggle to run your business.

Unique IT Challenges

As a sole practitioner or other very small business, you face unique IT challenges. With limited devices, a single computer failure can bring your business activities to an abrupt and extended halt.

Unlike larger businesses, you likely don’t have the budget to keep spare equipment on hand or to quickly purchase replacements.

As a small business leader, you want, and need, to strike a balance between risk, protection, and budget.

A Solution Set for Smaller Businesses

Fortunately, you have service options that help minimize your risk for business disruptions due to PC problems. 

PC Continuity

You can overcome the challenges and limitations of backup/recovery solutions without breaking the bank. PC Continuity solutions enable you to keep your business running while your PC is repaired or replaced and restored.

PC Continuity captures full images of your device multiple times per day. When needed, the image loads and runs on a virtual desktop in a cloud data center. You can access your system’s image from any device with a web browser or a thin client agent.

With PC Continuity, you can return to work quickly. For a small incremental fee above your backup/recovery service, your business keeps running.

Monitoring and Management

Ensuring your computers are current with respect to patches and updates helps ensure optimal performance and security.  Monitoring for system performance can also flag hardware issues before they cause damage or fail.

Remote monitoring and management services track the health of your computer and can alert your IT service team to issues and conditions before they become problems. The service allows for managing system and software updates and can provide remote access to your IT support team when needed.

Lifecycle Management

Larger companies use lifecycle management to manage their computer purchasing and upgrade cycles. For small businesses, lifecycle management focuses on extending the lifespan of your devices and understanding when it is best to upgrade or replace aging systems.

Besides tracking age and warranty status, these services can include extended warranty and accidental damage coverage plans.  These coverages provide repair or like-device replacement.  Having extended warranty and accidental damage coverage reduces the risk of maintaining older systems. In the event of an expected failure or accident, you can avoid early replacement costs.

Some lifecycle management services include certified electronics disposal, helping you avoid e-waste compliance issues and disposal fees.

Your Next Steps

Understanding the risks and impact of PC/Laptop problems, you should decide the value of the various levels of protections.  While protection and continuity services come at a cost, a single incident with your PC or Laptop can cost you in days of lost productivity, damaged or lost data, and thousands of dollars.

To assess your risks, protections, and business continuity needs, please contact us or schedule a brief intro call with a Cloud Advisor.  The assessment is free and without obligation.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

What is Pen Testing and Why You Should Care

Penetration TestingCyber threats are evolving at an alarming rate, posing significant risks to your business. Penetration testing, commonly referred to as “pen testing,” is becoming a vital, proactive tool for assessing your risks.

Pen testing simulates a cyber attack on a computer system aimed at identifying vulnerabilities and testing the security of IT systems. Pen testing goes beyond electronic systems; it encompasses the entire IT ecosystem, including human elements and physical security. 

As cyber threats diversify, pen testing has become an important cybersecurity practice and an emerging requirement for cyber insurance.

Types of Pen Testing

Pen testing falls into various categories, each targeting different aspects of your business’s IT infrastructure:

  • External Testing:
    Evaluates vulnerabilities in the systems that are visible from the outside, such as web applications, servers, and network devices. It simulates attacks attempting to breach your network from the Internet.
  • Internal Testing:
    Examines what could happen if an attacker gains access to the internal network. It highlights potential damage and data exposure risks from within your organization.
  • Targeted Testing:
    A collaborative effort between your IT team and the testers, providing real-time insights into the attacker’s perspective and your response.
  • Blind Testing:
    Testers receive limited information about the target, mirroring the knowledge an actual attacker might have. This helps assess your organization’s security posture from an outsider’s perspective.
  • Double-Blind Testing:
    An advanced form of blind testing where neither the testers nor the IT staff are aware of the test. It evaluates the effectiveness of the security monitoring and incident response processes.

Benefits of Pen Testing for Businesses

Investing in pen testing offers businesses several compelling advantages:

  • Identifying Vulnerabilities:
    Pen tests expose weaknesses in systems, applications, and networks, allowing you to address them before they are exploited.
  • Prioritizing Risks:
    Not all vulnerabilities carry the same weight. Pen tests help you prioritize risks based on their potential impact and likelihood, guiding you on where to focus your efforts and resources.
  • Enhancing Security Measures:
    Insights from pen tests can guide the implementation of stronger security controls, such as multi-factor authentication, data encryption, and improved access management.
  • Boosting Cyber Insurance Prospects:
    Many insurers require regular pen testing as part of their coverage criteria. Demonstrating proactive security measures can lead to better terms and premiums.
  • Regulatory Compliance:
    For industries with stringent regulatory requirements, pen testing can help you assess compliance with standards like HIPAA, PCI-DSS, and GDPR. It can also help you benchmark against cybersecurity frameworks, such as CIS, NIST, and CMMC.

Getting Started

The best way to get started with pen testing is to perform a basic, preliminary scan of your environment. Referred to as a “Level 1” test, this snapshot provides a baseline assessment. From this assessment, you can determine what, if any, mitigation efforts are needed to improve your security, meet compliance requirements, and/or secure cyber insurance.

Your Next Step

Cumulus Global offers a free Level 1 Pen Test to qualifying organizations. Click Here to Request your test and to access related resources.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

3 IT Trends We See Now

Working with hundreds of small and midsize businesses, we often see trends in IT interests, plans, and initiatives. Given all the hype, we expected to see Generative AI as a big trend this fall. While our clients are interested in it and beginning to use it, Generative AI is not among the top three trends this fall.

Here are the 3 trends we see now.

3 Incremental Cybersecurity

With a never-ending string of cyber attacks, new regulations, and expanded expectations from customers, insurers, and others, your peers are reassessing their cybersecurity measures and making adjustments. 

Like your business, most small businesses have some cybersecurity measures in place. Adding incremental services is a fiscally smart way to increase prevention, fill gaps in protection, and ensure a more effective response. 

Universal multi-factor authentication (MFA), penetration testing, security awareness training, and improved recovery and continuity solutions are among the services your peers are adding.

2 Virtual Desktops

Remote and hybrid work are the norm. So is bring-your-own-device, or BYOD. The challenge is ensuring your team has a consistent user experience that is productive and secure.

Virtual Desktop, sometimes referred to as remote desktop solutions, provides a cloud-resident environment that is secure and effective. With a virtual desktop infrastructure (VDI), such as Azure Windows Desktop, your team accesses a secure work environment from any device with Internet access. Apps run and data remains in the cloud – only screen, keyboard, and mouse traffic touch the local device.

By removing the end user device from the security envelope, you do not need to put security software, or company data, on employees’ personal devices. You reduce the scope of your management (and the cost) while having more control over your environment.

1 Managed Cloud Services

Your IT and cloud services are more sophisticated and capable. Keeping current, ensuring the environment is secure, and helping your team use your IT services most effectively takes time. Instead of letting things slide, your fellow small business owners and leaders are moving towards Managed Cloud Services.

Managed Cloud Services, like more traditional managed IT services, put monitoring, management, administration, and support into the hands of experts. You get an integrated bundle of security, services, and support that matches your needs and your budget.

While Managed Cloud Services often comes with some increased costs, the enhanced value gained outweighs the cost.

Your Next Steps

Our Cloud Advisors are ready to help you assess if and how Virtual Desktops and Managed Cloud Services may benefit your team and business.

To assess and adjust your cybersecurity, check out these resources:

Our eBook, Cyber Security Requirements for Cyber Insurance, defines basic, preferred, and best practice cybersecurity for small businesses. 

We also offer multiple assessments to help you understand and benchmark your current cybersecurity, including:

These assessments are free with a Referral Code. 

Contact us or schedule time with one of our Cloud Advisors to learn more and obtain your Referral Code. 

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

Best Practice – 3 Ways to Get Better IT Bids Quotes

Better IT QuotesA common statement we hear from sales experts and consultants is that 60% of IT buyers believe that they have found the solution they need before they contact their first vendor. While we are not sure of the accuracy of this claim, anecdotally we see more small and midsize businesses asking for IT quotes for specific products or services rather than a solution for a need or opportunity.

This makes sense to us. With so much information easily available, we are more comfortable researching solutions on our own. For small and midsize businesses, particularly those without dedicated IT resources, we tend to rely on market leaders, solutions seen as “best in class”, and vendor information.

We see challenges with this approach:

  • Vendor sites are designed to be easy to digest and often lack details about specific functionality you may need, integration capabilities, and training/support expectations. Selecting a solution that will work well for your business requires deeper discussions and analysis.
  • Market-leading solutions often attain that status based on enterprise-level revenue and sales. These solutions often lack design, implementation, support, and pricing options suited for small and midsize businesses.
  • “Best in Class” solutions often lack integration with the IT systems and services used by small and midsize businesses. These solutions typically evolve for enterprise and midmarket entities. Understanding the need for “best match” and “best fit” helps avoid solutions that become administrative, management, and support burdens.

To avoid these challenges and get better IT quotes, we recommend these three practices as part of your research and selection process.

1 Define Your Requirements

The first step is to clearly define your requirements. 

This advice may sound obvious, but small business owners often see an issue, or an opportunity, and dive into looking for a solution. 

Assess and define your requirements for the issue or opportunity at hand. Then, step back and analyze how any solution will need to integrate and interact with other aspects of your IT services. For user-facing services, assess the impact on workflows and any training and support services that may be needed.

Not all needs and wants are equally important. Prioritize your requirements. As the process moves forward, you will evaluate solutions against your prioritized list. If you need to work within a specific budget, the prioritized list can guide decisions concerning scope.

2 Request Solutions over Products

With a complete set of prioritized requirements, talk to service providers and vendors about solutions, not products.

Preconceived notions about which product is appropriate create blindspots and biases. These preconceptions often result in product and service selections that do not adequately meet needs, do not integrate well with other systems, or prove difficult to manage, administer, and support.

Focus less on “best in class” and “market-leading” solutions and more on “best match” and “best fit”. Make sure that the solution:

  • Meets your prioritized requirements.
  • Integrates with (or cleanly replaces) existing IT systems and services
  • Can be implemented with reasonable training and support efforts

IT solutions that work within, and improve, your IT ecosystem support better IT and business results.

3 Consider Value over Cost

Small and midsize businesses have smaller IT budgets. This is appropriate and understandable. At times, our focus on budget limits how we make decisions. We may:

  • Look too closely at the cost while neglecting the value. 
  • Focus on purchase and deployment costs without considering the full cost of ownership over time.
  • Pick a lower-cost solution that does not integrate well with our other systems and services.
  • Choose solutions that increase administrative, management, and support complexity.
  • Sacrifice integration, training, and support to lower costs without considering the impact over time.

Price is an important consideration. Focusing on value, however, creates better results over time. Consider:

  • How will the solution benefit your business objectives – directly and indirectly – over time?
  • Will the solution simplify processes and workflows for individuals and/or teams?
  • What level of training is needed for team members to fully understand and utilize the capabilities of the solution?
  • How well does the solution integrate with your existing IT services with respect to data, identity, security, communications, collaborations, and workflows?
  • Does the solution fit well with your current work environment (office/hybrid/remote, fixed vs flexible hours, etc)?
  • Does the timing of the change fit within your current business activities and cycle? If not, does the change warrant action at this time?
  • What are the hard and soft costs of inaction or pursuing another solution?

Your Next Action

The next time you are looking for a solution, go beyond your own research. Engage with a trusted IT resource early in the process – before you ask for an IT quote. 

Let us ask the “why,” “what if,” and “what about” questions that help identify requirements and priorities. 

Be open to suggestions and solutions that may not grab the headlines or industry attention, but could be the best match for your prioritized needs and the best fit for your business, IT services, and budget.

Our Cloud Advisors are ready to help and assist with any questions or concerns. Contact us or schedule time with one of our Cloud Advisors

About the Author

Bill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management. hBill Seybolt bio picture

 

Leadership Thoughts: Noteworthy Blog Posts – Aug ’24

As small business owners and leaders, you carry the responsibility for the direction and success of your business.  And while Cumulus Global provides managed cloud services that help you thrive and grow, we understand your responsibilities are broader than just IT. As a way to share some leadership thoughts, here is a curated list of blog posts from trusted experts that we hope will inform and inspire.

Human Factors

Legal and Compliance

Management

Marketing

  • AI Tools to Improve Lead Generation
    • Does your lead generation information flow through your Customer Relationship Management (CRM) system? Does your CRM provide insights, automation, and improved lead management? I’ll share how you can use AI to dynamically personalize content on your website or in your emails based on the visitor’s behavior and preferences.
    • Mike Grossman, Mike Grossman Consulting, LLC
  • Should I Be Using Threads for My Business?
    • Given the immense popularity and potential of this microblog-style social media app, you might be wondering if Threads is worth exploring for promoting your organization. I wanted to take a minute to outline some key highlights about the platform and offer my thoughts on how you can evaluate its suitability for your needs.
    • Nicole Porter, Monomoy Social Media

Productivity

Strategy and Leadership

Wellness

Technology and Security

  • Cyber Security Requirements for Cyber Insurance
    • Meeting basic cyber security requirements helps insure your cyber insurance coverage is appropriate and affordable. In this eBook, we outline the cyber security components you should have in place before getting your cyber insurance policy.
    • Cumulus Global eBook, August 2022
  • Improve Your Email Deliverability and Security in Five Steps
    • Email services are stepping up protections. Here are 5 best practices that help ensure your emails get delivered and that you are protected from identity and business email compromise cyber attacks.
    • Cumulus Global eBook, April 2024

Help us keep the ideas flowing. If you have any blog posts that are leadership thoughts you want to share, please let us know.

Sustainability: 1000 Trees and Growing

ReforestationBack in January of this year, we announced that Cumulus Global was expanding its sustainability program. To help offset the carbon footprint of our offices and operations, we have strengthened our partnership with Evertreen and are committed to planting 100 trees per month.

Our forest has grown to over 1,000 trees across 7 countries and 3 continents. 

Over the next 30 years, the trees we have planted to date will remove over 300 tons of CO2 from the atmosphere. That is the equivalent of driving an average American car 750,000 miles. As we continue to plant, the amount of CO2 our forest cleans will continue to grow.

In addition to the climate benefits, our forest is producing food, reducing soil erosion, protecting watersheds, and providing local jobs.

As an IT firm, planting trees to offset our carbon footprint is part of an overall commitment to sustainability that includes using 100% renewable energy, reuse, and recycling.

We Can Help You Do More

One of the best ways to improve sustainability is to recycle electronic waste (e-waste). E-waste recycling has challenges, including but not limited to, finding reputable recyclers and cost.

Our Basic and Business Managed Cloud Services include lifecycle management for your computer with unlimited, no-cost, e-waste recycling.

For a small number of items, we provide a prepaid label. Just box up the items and drop them off at your local post office. If you are looking to clear the shelves or empty the closet of e-waste, we can have a recycling team show up to box, label, and ship everything for you. All for free!

As an added bonus, our IT asset disposal partners partner with Veritree to plant trees with every recycling order.

Call to Action:

For more information about our Managed Cloud Services, please contact us or schedule time with one of our Cloud Advisors

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

A Model for Business Resilience

Aviate Navigate Communicate

The recent global systems outage, caused by CrowdStrike’s failed update, exposes a key flaw in how we view business resilience. When asked how we make our businesses resilient to failures, human acts or errors, disasters, and other disruptions, we tend to focus on the technologies and services we put in place to prevent/protect and restore/recover.

Business Resilience 

We define Business Resilience as your ability to get and keep your business up and running (even if it is running at a degraded level) until you can fully restore and recover.

Given the impact of the CrowdStrike failure on the airline industry, here is an aviation-themed model you can use as a guide.

Aviate

When an emergency happens in flight, the pilot’s first focus is to aviate – to ensure the plane keeps flying. If you can’t keep the plane in the air, your direction of travel does not really matter. 

The same is true for your business. If you cannot keep your business running at a minimally viable level, you can run out of time and/or money before you are able to restore and recover.

Navigate

Once the pilot knows that the plane will continue to fly, they can assess their current location and take the necessary direction and steps they need to land safely.

Once you know that you can continue to operate, even if only at a base level, you can step back and map out the potentially complex steps needed to restore, recover, and return to normal operations. You can then navigate the technical, operational, customer service, legal, and other processes needed for your safe landing.

Communicate

Once the pilot can safely navigate to a landing, they have the time and focus to communicate. Although, pilots do communicate during the aviate and navigate phases, they limit communications to only information air traffic control, ground operations, emergency responders, and others need in order to assist with the situation. Additional details and analysis come later.

The same is true for you and your business. While you are aviating and navigating, you will want and need to share necessary information with those who need it. These communications need to be “to the point” and focused. You will have the time and focus to share more detailed information as you approach, or after you make, your safe landing. You will have the time needed for review, analysis, and planning after your return to normal operations.

Call to Action:

If you are unsure or lack confidence in your business’s resilience to disruptions, we can help. Contact us or schedule time with one of our Cloud Advisors

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

Resilience, the CrowdStrike Failure, and the Real Impact on Your Business

Resilience

We have not written or posted much about the CrowdStrike failure. CrowdStrike is designed and priced for large enterprises. We offer endpoint protection, detection, and response services that are better designed for the small and midsize organizations we serve. In large part, the CrowdStrike failure has not directly impacted our clients and other smaller businesses.

However, the CrowdStrike failure has, and will, indirectly impact you and your business.

Technical Impacts

The biggest technical impact will be the role of automatic updates. The CrowdStrike failure was due to a programming error in a software update that was sent and applied automatically. Customers did not have the ability to limit or test the update prior to deployment.

Going forward, expect vendors to rethink how and when they use automatic updates. What for expectations that you, the customer, should test and approve changes. This shift will transfer more of the responsibility from vendors to your IT team. If you do not have the resources to test and verify updates, you will be taking on more of the responsibility should issues arise.

If you have an IT provider or managed service provider, you may need to negotiate this additional work into your contracts.

Business Impact

The most significant impact of the CrowdStrike failure is on our understanding of “Resilience.” When we talk about endpoint protection services like CrowdStrike, backup/recovery solutions, advanced threat protections, encryption, and other services, we are talking about tools that help our businesses become and remain resilient to cyber attacks, improper user activity, disasters, and other disruptions. 

These technical solutions provide some of the “Prevent & Protect” and “Restore and Recover” components of our Security CPR™ model and services. With the CrowdStrike failure, a tool intended to improve resilience exposed a weakness in our resilience: what happens when your solution becomes the problem?

Our understanding of resilience needs to change. We must move away from thinking about resilience as a function of IT. Resilience is a business-level function that encompasses all aspects of your organization.

Anecdotally, we learned that during the CrowdStrike failure: 

  • Airlines in Hong Kong wrote out boarding passes by hand and kept lists in notebooks to track manifests and seating assignments.
  • Lacking computers to centrally monitor infants and non-operational security doors in a California Hospital maternity ward, nurses were held over and stationed at each infant’s bedside, and security guards were tasked with guarding doors.
  • A small distributor wrote labels, bills of lading, and customs documents by hand for thousands of shipments.

The Big Question

Answer the following question for your business:

  • Can you run your business, even if it is in a degraded mode, without one or more of your key systems? If so, for how long?

Your answer is key to understanding how resilient your business is to disruption, the potential operational and business impact of a disruption, and your ability to recover and survive.

Call to Action:

If you are unsure or lack confidence in your business’s resilience to disruptions, we can help. Contact us or schedule time with one of our Cloud Advisors

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

7 IT Blind Spots Small Businesses Miss the Most

IT Blind Spots

Your small business depends on your IT services to run effectively and efficiently. Even so, like many small business leaders, you likely have one or more “IT Blind Spots”. The blind spots are not “all or nothing.” They evolve from decisions about what IT services are needed, wanted, and worthy of spending on at a particular point in time. Over time, internal and external factors change. If we do not take a fresh look, our IT services will not keep up. 

While not intentional, these blind spots create unnecessary risks and expenses. Here are the seven (7) blind spots we see the most.

1Security and Privacy

As small business owners and leaders, we understand the need for security – especially in today’s environment. We wonder, however, how much security is enough and what we should prioritize. We see small businesses with antivirus protection on their computers, strong passwords, and basic backup/recovery. While these services were the benchmark for basic security, they are now insufficient.

Check your IT blind spots for other core security services, including multi- or two-factor authentication (MFA/2FA), advanced threat protection (ATP) for email, advanced endpoint protection and response, encryption, and immutable backup/recovery services.

If you do not have these in place, your security is likely insufficient to protect your business.

2Duplicate Services

It has never been easier to sign up for new services. With a few clicks, payment information, and a quick setup, your new, cloud-based application or service is up and running. The convenience is great when you need something specific or a new solution. The low barrier to entry, however, makes it easier to sign up for apps and services that duplicate others you already have in place.

Check your IT blind spots for these duplicate services. We most often see companies paying for Zoom or GoTo, even though they have Microsoft Teams or Google Meet for online meetings and presentations. Some spend on Slack and other tools instead of using Teams or Google Chat services that are already in place. Rather than managing permissions to share files from Microsoft 365 or Google Workspace, small businesses often spend more on Dropbox and other services. While these are the most common duplicate services, we often see others across a wide range of apps and functions.

3Shadow IT

We used to define Shadow IT as any IT service in use without proper vetting or authorization. Today, we expand the definition to include consumer-grade hardware, software, and services. Team members using unauthorized IT services typically create security risks, increase costs, reduce control of company information, violate information privacy rules, and put data at risk. While less costly up-front, consumer-grade equipment, software, and services typically lack the security and integration needed for business use.

Check your IT blind spots and survey your environment for Shadow IT. Team members often go rogue for personal preference, convenience, or because they do not understand how to use features and functions already in place.

4Latent Apps and Services

When was the last time you looked to see if you were paying for IT services that you no longer use or need? With the low barrier to entry for cloud services, we often see companies that have signed up for an app or service, only to later decide that it is not the right solution or to see usage decline over time. Without a set process for on/off-boarding IT services, these often remain idle, incurring monthly or annual fees.

Check your IT blind spots for applications and services. Review company and staff personal credit cards for recurring payments. Scan Microsoft 365 and Google Workspace accounts for apps and services with federated logins.

5Business Continuity

While almost all small businesses like yours have backup/recovery in place for most of their systems and data, most still lack a business continuity solution. Even without a big disaster, the loss of a single, key system can be crippling.

Check your IT blind spots for business resilience. Can you run your business without your IT systems and services? For how long? Which systems and services can you live without for a short period of time and which are critical to your business? The answer to these questions dictates the types and extent of business continuity services you need. Focus on what you need to reasonably run your business while you make repairs and complete larger recovery efforts.

6Cyber Insurance

Most small businesses know that they should have cyber insurance in place, and many do. Too often, however, we see small businesses signing on to policies with inadequate or inappropriate coverage. We also see many businesses overpaying for cyber insurance to cover risks that could easily be reduced with incremental security services.

Check your IT blind spots for appropriate cyber insurance coverage and rates. If your policy was not purchased through a specialized agent or broker, an independent review may be worthwhile. If you do not yet have a policy, check out our resources and ask about our cyber insurance readiness assessment.

7Utilization

Multiple services tell us that most small businesses use about 15% of the capabilities in their Microsoft 365 or Google Workspace services. Your investment in Microsoft 365 or Google Workspace includes a rich set of features and functions – major and minor – that help your team collaborate and work more efficiently, individually and as a team.

Check your IT blind spots to understand how well your team is using the tools available to them. A little bit of education, training, and guidance can boost productivity within Microsoft 365 and Google Workspace by up to 60%.

Call to Action:

If you suspect, or just wonder, what is in your IT blind spot, we can help. We can help you check your blind spots and assess what, if any, changes are necessary or recommended. Once decided, we can help you plan and execute those changes. Contact us or schedule time with one of our Cloud Advisors

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America. Starting his first business at age 12, Allen is a serial entrepreneur. He has launched strategic IT consulting, software, and service companies. An advocate for small and midsize businesses, Allen served on the board of the former Smaller Business Association of New England, local economic development committees, and industry advisory boards.

Leadership Thoughts: Noteworthy Blog Posts – Jun ’24

As small business owners and leaders, you carry the responsibility for the direction and success of your business.  And while Cumulus Global provide managed cloud services that help you thrive and grow, we understand your responsibilities are broader than just IT. As a way to share some leadership thoughts, here is a curated list of blog posts from trusted experts that we hope will inform and inspire.

Human Factors

Legal and Compliance

Management

Marketing

Productivity

Strategy and Leadership

Wellness

  • 7 Tips for a Successful Workplace Wellness Program
    • In today’s fast-paced world of hybrid work, finding a balance between work and wellness is more important than ever. Prioritizing wellness at work is not only essential for individual health and happiness but fosters a positive and productive work environment with less absenteeism and lower healthcare costs.
    • Michell Grasso, Synergy Wellness Center

Our IT Ideas That Still Hold True

A few of our past IT leadership thoughts that remain true and relevant today.

  • Cyber Security Will Change Companies
    • IT change management is a structured process for evaluating proposed IT system or service changes. This procedure is carried out prior to implementing the requested change on an organization’s network, reducing or eliminating network outages.
    • Cumulus Global Blog, June 2022
  • What is a MCSP?
    • The need to monitor and maintain equipment and infrastructure drops off while your need to monitor and manage services, apps, and data increases.
    • Cumulus Global Blog, November 2017

Help us keep the ideas flowing. If you have any blog posts that are leadership thoughts you want to share, please let us know.

Webcasts

Check Your IT Blind Spots

(7/23/24) – Blind Spots evolve when we fail to reassess decisions as technology, business, and other factors change over time. Checking your IT Blind Spots will identify opportunities for savings, security, and improvements.

Select Your Managed Cloud Services

(01/16/24) – The right managed cloud services can significantly impact your team’s productivity. You can ensure your systems are secure, you team is productive, and that you are protected against cyber attacks and other disruptions. Just as important, you can protect your budget.

Your 2024 IT Action Plan

(12/19/2023) – When planning for the upcoming year, we often forget to consider the role our technology and services can play in supporting our business goals and objectives. Align your IT plans to best support your business goals.