Posts

Service Update: Advanced Threat Protection

Service Update Announcement

Beginning July 1, 2022, Cumulus Global is adding Advanced Threat Protection services to all clients using Microsoft 365 and Google Workspace.

With more than 40% of cyber attacks targeting small businesses and two thirds of attacks using email, Advanced Threat Protection is no longer an option. The stakes are too high. Recovery takes an average of 21 days and 60% of small businesses fail within six months of a successful attack.

To minimize the impact, we are waiving the standard setup fee and discounting the service by 20% for customers with an annual commitment. The fee will be reflected on your annual invoice or monthly invoices, as appropriate.

You may opt out of the Advanced Threat Protection service. To opt-out, please notify us by email prior to May 25, 2022. If you elect to opt-out, please review the terms of our Service Level Agreement as posted on our website.

Please contact us or schedule time with one of our cloud advisors if you have any questions.

Deadline 3/1/22: Microsoft 365 Price Increase

Microsoft 365

On March 1, 2022, the pricing for Microsoft 365 will increase.  Depending on your current subscription and licensing, you will see a Microsoft 365 price increase ranging between 10% and 25%. You can, however, minimize or avoid the increase.

Details

Monthly per user pricing with an annual commitment* will increase as follows:

  • Subscription
  • M365 Business Basic
  • M365 Business Standard
  • M365 Business Premium
  • O365 E1
  • O365 E3
  • M365 E3
  • Current Fee / User / Month
  • $5
  • $12.50
  • $20
  • $8
  • $20
  • $32
  • New Fee / User / Month
  • $6
  • $12.50
  • $22
  • $10
  • $23
  • $36

*Pricing for monthly commitment (no annual commitment) will include a 20% surcharge.

What is the Impact?

Historically, Microsoft 365 and Office 365 subscriptions were sold with an annual commitment.  Within the annual commitment, you could adjust the number of licenses up or down on a monthly basis. Microsoft now classifies these types of subscriptions as “Monthly Subscriptions”.

Going forward, you can choose an “Annual Subscription”. With an “Annual Subscription”, your current license count becomes your minimum purchase commitment for the next 12 months. You may add licenses during the year, but you cannot remove any licenses until your annual renewal.

A “Monthly Subscription” allows you to increase or decrease you licenses monthly.

Annual Subscription pricing will increase as noted in the table, above.  If you are a monthly subscription, you will pay an additional 20% per license.

Minimize the Impact

You can minimize, or completely avoid, the Microsoft 365 Price Increase by assessing your subscription licenses and usage, and:

  • Transition to an Annual Commitment before February 28, 2022.
    • Continue with monthly or annual invoicing
  • Remove past employee accounts by either:
    • Exporting and deleting

Act Now!

Schedule time with one of our Cloud Advisors.  We will assess your current subscription, the impact of your transition, discuss subscription and licensing options, and determine if you qualify for incentive discounts.

 


Technology Solutions for Solopreneurs and VSBs

Technology Solutions for Solopreneurs

Entrepreneurs are a unique breed.  Solo entrepreneurs, solopreneurs, even more so.

If you are a solopreneur, or lead a very small business, you face some unique business and IT challenges. One of these challenges is balancing your business and your personal lives.  To do this, you want and need your technology solutions to save you time and energy.

If you are like most solopreneurs and very small business owners, you are probably

  • Paying for duplicate services
  • Unware of features that can improve your productivity
  • Not taking time to explore ways to work more efficiently
  • Missing security and data protections
  • Not getting the guidance and support you need

At the same time, you most likely lack the time, energy, or expertise to research, select, deploy, and learn the right IT services. As a part of our managed cloud services, we offer technology solutions, tools, and apps for solopreneurs that are tailored to meet your specific business needs.

Managed Services are a Technology Solutions for Small Businesses

Often used by larger businesses, managed services provide your information technologies, support, and services as a comprehensive bundle for a set monthly or annual fee. By definition, managed services are designed to offload your IT responsibilities and place them in the hands of experts. These managed service providers should start with guidance, get your systems up and running, administer your services, and provide you with support.  If they are performing their services well, these technology solutions for small business and solopreneurs should also help you identify features and functions that improve your work processes — make you more efficient.

5 Ways How to Move Towards Managed Services as a Technology Solution

Before moving forward with managed services, we recommend taking a step back and assessing how you want your IT services to help you and your business.

1. Start with A Goal and Objectives

  • Your technology and services need to empower you and enable your business.  Regardless of the devices, applications, and tools they use, your IT should:
    • Be easy to use
    • Save you time
    • Secure your data, and that of your customers
    • Keep your business data private
    • Support any compliance requirements you may have
    • Fit within your budget.

2. Focus on the Benefits

  • Discuss which capabilities will help you work more efficiently, more productively
  • Avoid the technology trap. Instead of thinking, for example, about email, calendars, and file sharing, think about automating appointment scheduling, protections for confidential information, and one-click video conferencing.

3. Define Your Baseline Services

  • Map your benefits to technologies
  • Base your IT decisions on your prioritized needs and wants
  • Define the minimum set communications, collaboration, and security tools to run your business
  • Explore and leverage ways to work more efficiently

4. Add / Enhance as Needed

  • If your business must be compliant with legal or industry regulation, add the technologies and services you need to meet these requirements.
  • If you find ways that technology can improve productivity, determine if the gains are worth the investment.

5. Managed Cloud Services

As the name implies, Managed Cloud Services are managed service that, whenever practical, leverage cloud services and solutions. Cumulus Global has the expertise and experience to move your business to managed cloud services. By leveraging cloud solutions, baseline services and foundational security are affordable and can easily be tailored to meet specific business needs.

Learn More About Our Technology Solutions, Tools, and Apps for Solopreneurs and Small Business

To learn more about our IT solutions that are tailored to meet your specific business needs, get in touch or view our additional resources below.


The Kaseya Attack Effect

Data Protection & SecurityThe Kaseya attack demonstrates how cyber crime is a big, organized business.  How big? You can subscribe to “Ransomware as a Service” and outsource attacks on your intended targets.  How organized? Hacker groups and service providers, such as the REvil Ransomware Group and DarkSide, actively manage their brands and reputations.  The REvil attack on Kaseya shows us that cyber criminals are technically advanced and operationally sophisticated. The nature of the attack, and its scope, should scare you.

By using known vulnerabilities in Kaseya’s VSA Remote Monitoring and Management system, REvil was able to create an automated ransomware distribution network. They used the very systems that Managed Service Providers (MSPs) use to monitor and manage customer servers, computers, and networks.

The Impact

MSPs update their Kaseya VSA servers automatically installed the Ransomware on their customers’ systems, as well as their own. Best estimates are that up to  1,500 small and medium-sized companies are victims. While this number seems small, those 1,500 business face an existential threat. Remember: more than half of businesses victimized by ransomware fail within six months.

Most MSPs shut down their Kaseya VSA services before spreading the ransomware. These firms had no ability to monitor, manage, or remotely support their customers. Customers facing IT issues were met with longer diagnostic and resolution times, resulting in business disruption, lost productivity , and the possibility of data loss.

As a managed cloud service provider, Cumulus Global does not use the Kaseya VSA system.  Our clients were not at risk, via our services, from this attack.

The Lessons

We were on the sidelines for the Kaseya attack. We understand, however, that the way in which may cloud services are managed create connections between vendors, resellers, partners, and customers. While these connections do not generally provide any access to customer data, they do provide access to management functions and information about users.  This information, in turn, could be used to improve the effectiveness of phishing attacks, spoof identities, and gain access to systems.

As a trusted IT advisor and a managed cloud service provider, we are part of a connected supply chain. We take our responsibility to secure our part of that chain seriously. While we follow commercially accepted best practices for security and privacy, the Kaseya attack warns us to step back and re-evaluate our strategy, policies, and procedures.

Our Next Steps

Cumulus Global is conducting an internal review of all of our internal and operational systems, including vendor portals and services we use to order, provision, manage, and support cloud services. As part of this review we are examining our policies and procedures related to:

  • Identity management and protection
  • Access to the systems
  • System level permissions related to function and data
  • Roles and responsibilities with respect to security and privacy
  • Business continuity plans and capabilities

Through this process, we are challenging our assumptions, re-assessing how we operate security and effectively, and raising our expectations for how well we protect ourselves and our customers.

We will also be making recommendations to our clients, and the broader community, on steps they can take to improve their security profile and protections.

Your Next Steps

As a user of cloud services, and technology in general, have responsibilities as well.

We Can Help

To assess your cyber security status, discuss your risks and needs, and identify solutions that fit your business and your budget, contact us to schedule a complimentary session with one of our Cloud Advisors.

The State of SMB Cyber Security

Data Protection & SecurityGone are the days when cybercrime was exclusively a big business problem. In the modern workplace, all businesses are at risk, regardless of their size or industry. Today, we recognize that implementing a cyber security program, much like hiring people and growing sales, is an essential part of running our companies.

With 43% of cyberattacks targeted at SMBs, it’s not surprising that many have identified cybersecurity as a priority. And while most of us have deployed protections, it is challenging to know if you have the right balance of protection relative to your risk.

Here are 4 key findings from research conducted by Microsoft:

01 Businesses understand that cybercrime is a problem, but understate the severity of the threat and overestimate their preparedness

The vast majority of businesses (85%) cite cybercrime as a concern, and more than half (56%) believe it is a top priority. Businesses are backing up this belief with action. Most have begun to invest both time and dollars into protecting their company from hackers and other malicious actors.

However, when you look a little deeper, it becomes clear that many have underestimated their risk. 74% of businesses don’t believe they are likely to be attacked at all and that corporations are two times as likely to be attacked.

90% of businesses say they have the right protections in place to prevent an attack, and those with more than 50 employees are even more confident. It is encouraging that businesses are investing in security, but the reality is that they are at greater risk than they think. Nearly half (41%) have been attacked

02 Small and medium-sized businesses are just as likely to be attacked as large corporations

For solutions that do cost money, businesses allocate about 15% of IT budgets go to cybersecurity,  and  21% plan to increase how much they spend protecting the company. Businesses recognize that this investment is worth it because three out of four know that it costs more to recover from an attack than it does to prevent one.

03 Employees can be a business’s biggest protection and also their biggest threat

As a small business owner, you face many of the same threats as larger businesses, but also unique challenges.

Given the number of security events tied to employees, businesses run the risk of underestimating the threat of employees leaking data or  sharing sensitive information, whether maliciously or accidentally.

Insider threats take several forms. Employees or partners may find it more convenient to transfer sensitive data using personal email or an unsecure cloud drive, not realizing the risk to your company. In fact, 30% of security events are attributed to careless or uninformed employees. More alarming is the roughly 36% of attacks where a malicious employee steals sensitive data.

04 Businesses have begun taking steps to protect themselves and there is a set of solutions and practices available to them

Most small and midsize businesses don’t have the same scale of resources to combat security threats and implement cyber security solutions as larger entities.

Fortunately, there are right-sized solutions and strategies designed to overcome the unique vulnerabilities of smaller companies. An effective security strategy doesn’t have to be expensive—or time-consuming. With a few simple, no-cost/low-cost steps, you can make a significant  impact on your company’s overall security profile. The key is to match security to your business needs and your budget.

To assess your cyber security status, discuss your risks and needs, and identify solutions that fit your business and your budget, contact us to schedule a complimentary session with one of our Cloud Advisors.

Top 3 Types of IT Security Threats and How to Prevent Them

Data Protection & SecuritySecurity Threats: 3 You Know and 1 You Should

Security threats take many forms. Most owners of small and medium-sized businesses (SMBs) are aware of the need to defend against the top three — viruses, ransomware, and phishing attacks — but their organizations are generally not as prepared to deal with the risks related to employees leaking data or sharing sensitive information, whether maliciously or accidentally.

Top 3 Types of IT Security Threats

1. Viruses

According to research conducted by Microsoft, infection by a computer virus is the most commonly cited among security threats facing businesses. Preventing viruses requires an integrated approach to endpoint and identity management.

How to Prevent Viruses:

  • Deploy next-gen antivirus software, with advanced threat protection, installed and updated, on all devices
  • Use web filtering and monitoring services to prevent infection, even from trusted sites
  • Roll out mobile device management to secure work devices (including laptops and desktops), as well as personal devices used for work
  • Enforce the use of multi-factor authentication as part of an integrated identity and access management solution

2. Ransomware IT Security Threats

Ransomware is a type of malware that restricts access, encrypts files, or even stops you from using your systems. Like viruses, ransomware can enter the company through insecure endpoints or unsuspecting users.

While virus protections also protect against ransomware, no protection is perfect. You need to be ready to respond and recover in the event of a successful cyber attack. This includes implementing solutions and services, and ensuring you have the proper protocols in place.

How to Prevent Ransomware Security Threats

  • Backup your data and system images, in the cloud, to ensure your ability to restore and recover
  • Encrypt all data, at rest and in motion
  • Deploy business continuity services to spin-up copies of servers in parallel with remediation
  • Pre-arrange access to forensic, legal, and communications resources to ensure a proper business response
  • Acquire cyber insurance to cover remediation, recovery, and regulatory costs, along with lost revenue
  • Focus on the four pillars of cloud security, and continue to review them on a yearly basis

3. Phishing Attacks

The majority, 67 percent, of cybersecurity professionals surveyed consider phishing attacks to be the greatest security threat facing your business and employees. Take the proper steps today to protect your people, your data, and your business.

How to Prevent Phishing Attacks:

  • Configure advanced threat protection services to identify and block attacks via email using links and/or attachments
  • Monitor inbound and outbound email traffic
  • Provide your team with awareness training to recognize problem emails, and how to respond/act
  • Instruct your team to report suspicious messages, links, and attachments
  • Deploy domain level services to prevent identity-spoofing

1 Additional IT Security Threat You Should Know

!! Internal Leaks & Threats

Insider security threats are often overlooked, and small and midsize businesses are generally unprepared to deal with these IT security threats, accidental or malicious. Surveys indicate that 53% of organizations have experienced insider attacks against their organization.

These risks take several forms. About 37% of internal leaks can be attributed to careless or uninformed employees. In many cases, these employees are using personal, less secure or unsecured services to conduct business.  Whether consumer versions of email or cloud drives for sync and share, these “shadow IT” services pose a significant risk.

While the majority of internal leaks and threats are unintentional, 36% of internal leaks are identified as attacks by a malicious employee.

To prevent data leaks and breaches, you should:

  • Actively manage access and permissions to networks, systems, applications, and data; periodically review permissions for compliance
  • Leverage features within your systems that help you manage and protect confidential and proprietary information
  • Deploy information protection solutions, such as Data Loss Prevention (DLP) and document/message level encryption, to block sensitive data from leaving your control
  • Implement proper cyber insurance and breach response protocols

>> Take Action Against IT Security Threats

All of the suggestions, above, fall within our CPR best-practice model for data protection and cyber security: Communicate & Educate; Prevent & Protect; Respond & Recover.

To assess your cyber security status, discuss your risks and needs, and identify solutions that fit your business and your budget, contact us to schedule a complimentary session with one of our Cloud Advisors.

Productivity Suite Assessment Helps Small Businesses Choose or Improve their Cloud

May 25, 2021 – Westborough, MA – Cumulus Global is pleased to announce the launch of its new Productivity Suite Assessment, a consulting service that helps small and midsize businesses (SMBs) determine which productivity suite best meets their needs and how to fully utilize the suite to improve productivity and support business goals. Whether considering, or currently using Microsoft 365 or Google Workspace, the productivity suite is the foundation for IT services. The right match is about more than the marketing hype and basic features. The right match integrates with how you work and other systems to support business goals, needs, priorities, and budget.

“For businesses not yet in the cloud, we guide them to the best fit and solution,” stated Allen Falcon, CEO of Cumulus Global. “For those only using some of the Microsoft and Google suite services, we help them fully adopt, utilize, and leverage capabilities.”

The Productivity Suite Assessment gives businesses:

  • A comprehensive review of current technology platforms and how well they are serving the business
  • Expert analysis of challenges, gaps, and opportunities to improve productivity and efficiencies
  • Recommendations: “what” technologies are a best fit and “how” to leverage them for greatest impact and value
  • Savings on implementation of recommendations.

“We help businesses decide if Microsoft 365 or Google Workspace best aligns with their operations and technologies. More impactfully, we identify under-utilized capabilities and guide adoption,” noted Falcon. “Using these recommendations, businesses improve processes, empower employees and teams, reduce costs, and enable growth.”

The Productivity Suite Assessment follows Cumulus Global’s best-practice methods.  The three phase project includes: detailed discovery, thorough analysis; and recommendations with guidance on implementation and adoption.  Cumulus Global partners with both Microsoft and Google, providing objective analysis and recommendations. Founded in 2006, Cumulus Global has 15 years experience delivery cloud solutions to small and midsize businesses.

Microsoft 365 Enhances Meetings and the User Experience

One of the benefits of Cloud is the ability to add features and capabilities without complex, technical rollouts.  To enhance collaboration, communications, and the user experience, Microsoft is adding features to Microsoft 365.  Here are a few new features you should know about.

PowerPoint Live in Microsoft Teamssales analysis

Enhance your ability to present and collaborate in Teams meetings.  In addition to a robust presenter view and tools, PowerPoint Live supports co-presenters with seamless transitions.

Customize how your video feed and content appear to your audience, including the ability for the audience to see you in front of your presentation. Create interactive presentations with hyperlinks and videos. Interactive presentations improve attention and allow attendees to move at their own pace.

Learn more about PowerPoint Live in Microsoft Teams

Microsoft Whiteboard in Teams Meetings365 enhancement

Sometimes a picture is worth a thousand words. Participants in your Teams meetings can collaborate on a shared digital canvas with Whiteboard. Whiteboard integration in Microsoft Teams meetings is powered by Whiteboard for the web. Participants of Teams meetings collaborate with text, graphics, notes, videos, and other content.

Learn More About How to Use Whiteboard in Microsoft Teams

Microsoft Viva Insights

Microsoft Viva Insights provides personalized recommendations to change how you work to do your best work. Get insights to build better work habits. Improve follow-through on commitments made to collaborators. Protect your focus time for uninterrupted, individual work. Insights summarize your Microsoft 365 data – data that you already have access to – about emails, meetings, calls, and chats.

Insights for individuals are completely personal and private. Personal insights are for your eyes only; neither your manager nor system administrators can see them.

Larger File Size Upload Limits

Gain more flexibility with 250 GB file size support.  Optimized file upload performance helps reduce upload times for files moving into SharePoint, Teams, and OneDrive.

Insights to Improve Your User Experience

Microsoft Productivity Score can help you improve your user experience with better endpoint boot times, app reliability, networking, and Microsoft 365 Apps health.

To learn more about these new features, to arrange an immersive, hands-on, demo experience, or to discuss how Microsoft 365 might help you achieve your business goals, contact us and schedule a complimentary Cloud Advisor Session.

The Business Case for Teamwork Solutions

CollaborationHow our teams work, and our businesses run, continues to evolve. Teamwork — communication and collaboration — brings people together to share information, work together, and accomplish common goals and objectives. When you have a place to create and make decisions, you empower your team to achieve.

Market Dynamics

Finding secure, easy ways to connect across teams and locations is a high priority if you want to create a competitive advantage in today’s quickly changing business landscape.

83% of knowledge workers depend on technology to work together

72% of workers will work remotely, full or part time

35% of knowledge workers still collaborate on documents using email

 

Cloud Forward teamwork solutions enable you to customize your workspace, keep your team secure, and communicate more effectively.

Challenges You Face

Most businesses see the value of Cloud Forward solutions, but migrating to the cloud does not ensure results. Real value requires changing some of the ways you work, leveraging features, and enhancing individual and team productivity and effectiveness.

Communications: How can you bring teams and resources together?

  • Enable real-time communication
  • Provide secure mobile access
  • Empower teams to work remotely

Mobility: How can you enable employees to work from virtually anywhere, on any device?

  • Enhance mobility within your company
  • Reduce overhead, and save money on office space, as employees work remotely

Secure Sharing: How can you make it easier to connect with customers, co-workers, and others?

  • Secure and preserve company data when sharing information with others
  • Distinguish between the information external users can and cannot access
  • Keep track of who has what information

Solutions that Drive Success

Adopting Microsoft 365 means more than migrating emails and files. Adopting Microsoft 365 involves managing change; educating your team on ways to use the teamwork technology to:

Get more done

Teamwork technology embedded in Microsoft 365 enables productivity solutions that:

  • Streamline teamwork
    Integrate team chats, meetings, and files in one place; increase productivity
  • Enable real-time teamwork
    Make it easy for teams to work together on documents; rapidly advance ideas and innovation
  • Connect applications
    Provide the tools and services customers use every day to collaborate; connect people, information, and ideas

Work better together

Microsoft Teamwork solutions enables collaboration solutions that help you:

  • Improve security
    Strengthen your overall security posture and improve compliance and reduce your use of unsecure apps
  • Work from virtually anywhere
    Use digital tools to empower teamwork across your mobile workforce, no matter where your people work or what devices they use

Build your business

Microsoft 365 makes it easier to set up and manage users, devices, and data within a highly secure, cloud-based productivity platform.

  • Use an integrated solution
    Save time, money, and the headache of managing multiple vendors and technologies for security and team solutions
  • Reduce costs
    Microsoft technology provides a nearly 80% cost savings over similar technologies provided by third-party vendors

Partner for Success

We understand that change is challenging. We also see that the results outweigh the effort when teams embrace and adopt new capabilities and improve how they work.  Empowering your team enables success.  Through our Managed Cloud Services, we co-manage your IT services and provide on-going education and support to help your team adopt and leverage new capabilities.  We help your employees succeed at their jobs; we enable your company to achieve your desired results.

Contact us or email us to learn more. Or, schedule a complimentary Cloud Advisor Session and discuss your goals, challenges, and opportunities.

Exchange Server Zero-Day Threat

On March 3, 2021, Microsoft issued an emergency Microsoft Exchange Server patch alert for multiple zero-day vulnerabilities that are being exploited by a nation-state affiliated group. The order impacts on-premise Exchange Servers 2010, 2013, 2016, and 2019. Older editions are past end of life and do not receive security updates. Microsoft highly recommends that you take immediate action to apply the patches for any on-premises Exchange deployments. The first priority is servers which are accessible from the Internet (e.g., servers publishing Outlook on the web/OWA and ECP).

To patch these vulnerabilities, you should move to the latest Exchange Cumulative Updates, followed by the relevant security updates on each server.

The vulnerabilities and risk do not exist for any version of Microsoft Exchange Online. The risk does not impact any version of Microsoft 365 or Microsoft Office 365.

As discussed in past posts, one of the benefits of cloud-based solutions is the integrated management of the environment. You are not depending on how well your IT provider of staff keep up with maintaining your systems and your security updates. Moving your infrastructure to the cloud shifts the burden of maintenance and operations, letting your team focus on activities that help your run and grow your business.

Want to learn more, contact us and schedule a complimentary Cloud Advisor session.

library

Email Security: Good, Better, Best

eBook | Source: Cumulus Global —
Cyber attacks by email have skyrocketed over the last decade. Email and domain impersonation attacks, fueled by successful phishing attacks, bypass account-centric security. This eBook discusses how to protect your business and domain from Business Email Compromises and impersonation attacks.

IT Services for Solopreneurs and VSBs

eBook | Source: Cumulus Global —
IT Services pose unique challenges for Solo entrepreneurs, aka “solopreneurs”, and very small businesses (VSBs). More than having IT services that are “good enough”, solopreneurs and VSBs need technology to save them time, effort, and money.

State of Security for Small and Midsize Businesses

eBook | Source: Microsoft —
This eBook identifies key findings in studies and surveys covering security for small and midsize businesses, and provides set of recommendations to ensure …

Protect Your Business – Top 3 Security Threats

eBook | Source: Microsoft —
This eBook explores how you can safeguard your business against the top three security threats, plus the one threat your business is probably overlooking.

Crash Course in Office 365

eBook | Source: Microsoft —
You already know the productivity power of Office applications like Word, PowerPoint, and Excel. Full adoption empowers you to access your …

Unblocking Workplace Collaboration

eBook | Source: Microsoft —
Poor workplace collaboration is 1 of 5 top reasons people quit their jobs. Break down collaboration blockers so that teams …

Simplify Security with Microsoft

Infographic | Source: Microsoft

SaaS Protection Buyer’s Guide

eBook | Source: Cumulus Global