Posts

A 5-Step Strategy for Responsible AI

5-Step Strategy for Responsible AI

AI is changing how our businesses operate and compete. As we rely more on AI, having strong governance is essential to ensure our AI tools are used securely, ethically, and responsibly. Our use of AI should align with your company’s values and regulatory standards.

By setting clear policies and accountability, you can reduce risks like data breaches, ethical issues, and noncompliance. Strong governance also prevents unauthorized AI use, making sure that every AI activity supports your business goals.

1 Create Comprehensive AI Use Policies

Unauthorized AI use, or Shadow AI, creates serious risks for your business. To manage Shadow AI and other risks, you need visibility, control, and guidance for your team. A well-crafted AI Usage Policy reduces the chance of mistakes or misuse and helps you responsibly manage AI usage.

Your AI usage policies should:

  • Define allowed and unallowed use of AI as a tool/resource
  • Outline principles for ethical and appropriate use
  • Specify security guidelines to ensure data protection and compliance with regulations, industry standards, and contractual obligations

Your policies should also clearly state:

  • How your team should handle your company data
  • How your team should handle and protect third party data
  • Which AI tools are approved
  • When and how team members may use external AI resources

2 Implement and Monitor Controls

Implementing access controls and monitoring systems helps you identify when AI tools are being used outside approved channels.

Create processes for:

  • Your team to request access to AI tools and services
  • Evaluating requested tools for applicable use cases, usability, security, and cost
  • Deploying new AI tools and services, including education and training

Periodically audit your environment to spot unauthorized applications before they create problems. 

Work with your team to move to authorized AI tools that provide the same capabilities or review and select a solution you can secure and support.

3 Ensure Legal and Regulatory Compliance

Compliance is a key aspect of responsible AI use. Your AI practices need to follow data privacy laws, industry regulations, and contractual obligations. 

Begin by identifying and reviewing relevant laws, industry standards, and contractual obligations related to data privacy. Identify any specific conditions or requirements related to the use of AI services.

You want to be able to demonstrate and document your compliance. Review the security compliance certifications and practices of your AI services and tools. Collect the necessary information, including how your AI tools collect, store, and use data. 

Regular audits will help catch potential issues, particularly with Shadow AI. 

Stay current with evolving legislation to ensure that your AI practices remain compliant over time.

4 Prioritize Ethical AI Practices

Ethical AI builds trust and protects your reputation. When you prioritize ethics, you show that your business values integrity and fairness, strengthening relationships with clients and stakeholders.

  • Regularly review your AI models and the data they use to remove bias and ensure transparency in decision-making. In addition to bias detection and mitigation, AI training should include diverse data sources and that results are not skewed by inherent biases.
  • Make sure your AI is fair, explainable, and accountable, so your team and clients can trust its outcomes. AI tools should articulate results and decisions in human-understandable terms. People need to be able to understand the rationale behind the AI results.
  • Ensure you have human judgement and intervention at every stage of your AI journey. Clear lines of responsibility provide accountability. Human review prevents over-use of AI, particularly in decision-making. Encourage feedback from employees, clients, and other stakeholders.

5 Train and Support Your Team

Your AI strategy will only succeed if your team knows how to use AI safely and effectively. When your team is confident in using AI, you maximize its benefits while minimizing risks.

Provide training and support that covers technical skills, applicability to relevant use cases, and ethical considerations. 

Support strategies include:

  • Offering training sessions and user guides.
  • Providing a dedicated support team for questions.
  • Offering ongoing learning opportunities as AI evolves.

How We Help

Using AI securely and ethically requires careful planning and ongoing effort. Our Cloud Advisors can help you identify use cases, select tools and services, endure data security and government, and help your team get the most from your AI investments.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

{URGENT}: Windows 10 Support ENDS on Oct. 14th. Extended Security Updates Available

Windows 11

ACT NOW!  Support for Windows 10 officially ends on October 14, 2025. After this date, Microsoft will no longer provide software updates and technical assistance. If you are not upgrading to Windows 11, you must purchase Windows 10 Extended Security Updates to continue receiving critical and important security updates.

Without these extended security updates, continuing to use Windows 10 dramatically increases your exposure to significant risks. Your systems become prime targets for cyberattacks, ransomware, and data breaches. You risk costly downtime, loss of sensitive information, and severe compliance issues. 

Proactive planning and action are not just recommended, they are critical for your business continuity and security.

Know Your Windows 10 Options

We agree with Microsoft’s recommendation to upgrade all eligible systems to Windows 11. We also understand you may have budget constraints or compatibility issues with older software.

You can check if your PCs will run Windows 11 using Microsoft’s PC Health Check app. If your PC will not run Windows 11, you have options other than buying new devices.

Windows 10 Extended Security Updates (ESU): 

Microsoft has release pricing for ESU licenses.  The license are available as a one-time purchase for each year. You do not need to commit to multiple years up-front, you can purchase the licenses annually if needed.  The pricing is as follows:

  • Year 1 – from October 2025 to October 2026 – $61 each
  • Year 2 – from October 2026 to October 2027 – $122 each
  • Year 3 – from October 2027 to October 2028 – $244 each

Important Notes:

  • Not all systems are eligible to install the updates. To be eligible to install updates from the ESU program, devices must be running Windows 10, version 22H2. For more information on prerequisites and enabling ESU in commercial environments, see Enable Extended Security Updates (ESU).
  • ESU Program updates do NOT include: New features; Customer-requested non-security updates; Design change requests; or General support.
  • The Windows 10 ESU only includes support for the license activation, installation, and possible regressions of the ESU itself for organizations with a support plan in place.

Keep in mind, the Windows 10 Extended Security Update program serves as a temporary bridge and does not address underlying hardware or software compatibility issues related to upgrading to Windows 11.

Virtual Desktop Services: 
  • Using virtual desktop services, such as Azure Virtual Desktop, allow you to use your existing PCs to access a robust and secure Windows 11 environment. Virtual desktops work well for hybrid team members and to mitigate the cost of upgrading multiple devices.
  • Connect with one of our Cloud Advisors to explore this option.

Windows 11 Upgrade HelpPlan for Your Windows 11 Transition

Regardless of the strategy you choose, proactive planning is crucial for a smooth and secure transition. Follow these steps to ensure you’re ready:

Assess Your Current IT Environment
  • Use Microsoft’s PC Health Check app to determine which devices can run Windows 11, which can be upgraded, and which require replacement. If you use Windows 10 in embedded systems, check with your vendor.
  • Confirm which of your business-critical applications and tools are compatible with Windows 11. Identify necessary software upgrades or migrations.
Prepare Your Budget
  • Accurately map the cost of upgrading and/or replacing devices. Keep in mind that older systems, even if upgraded now, may soon require replacement.
  • Identify any software upgrade costs.
  • Keep in mind any fees for tech support or professional services. You may need or want help transferring applications and data to new devices or setting up virtual desktops.
Develop Your Transition Plan & Data Strategy
  • Plan your timing and procedures for upgrades, purchases, and migrations. Focus on preventing data loss during migration and consider staging your rollout in phases to minimize disruption.
  • Crucially, ensure all critical data is securely backed up before upgrading or migrating systems. 
  • Remember to allow time to test critical software on Windows 11 before upgrading.
Train Your Team
  • Provide resources and help your team become familiar with the Windows 11 interface and new features.
  • If you are upgrading your business software for compatibility, you may want to provide additional training on new functionalities and capabilities.
  • Stay Informed: Monitor Microsoft’s official updates and announcements. Keep current with regarding Windows 10 end of life and Windows 11 developments.

Cumulus Global Will Help

Plan and Act Now.  As with any major upgrade, we expect demand for PCs, laptops, and technical services will increase as the deadline nears. Waiting may result in delays and missed deadlines. Losing Windows 10 support can result in costly business disruptions.

For assistance, schedule a brief, free call with one of our Cloud Advisors to discuss your assessment, plan, and upgrade needs, priorities, and budget.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

Avoid MFA Pitfalls and Lockouts

MFA PitfallsMaybe you have seen the meme about spending 6 hours per day entering multi-factor authentication (MFA) codes. While inconvenience is one pitfall of MFA, improper configuration and management of MFA can lead to more damaging pitfalls and lockouts. Your ability to work can take days to recover.

The MFA Pitfalls 

Most of us are not using a separate security key; we authenticate using our smartphones. Whether by Authenticator app, SMS text, one-time passwords/codes, or local app login, we need our smartphone to access our apps and services.

Imagine this scenario:

  • Your iPhone is lost, stolen, or damaged.
  • On your laptop, you need to login to check email and the authentication goes to the Authenticator app on your phone.
  • You could opt to have a one-time password emailed to you, but you cannot access your email.
  • You could send it to your recovery email, which you rarely use, is logged out and the MFA also goes to your phone.

You get the picture. You are stuck, but you still have other means of access. Depending on your configuration, restoring access may be complex and take too much time.

And while this scenario may seem unlikely to happen, we see online forums where over 80% of help requests relate to account lockout and recovery. Almost all of the problems were avoidable with proper configuration and management.

Tips to Avoid MFA Pitfalls

To help you avoid MFA pitfalls and lockouts, we created a list of things to consider when configuring management of your MFA services.

  • Use a Sustainable Phone Number for MFA and for Recovery: MFA texts and messages should only go to a phone number that can remain in use if you switch phones or phone systems. Whether to a physical phone or a VoIP service, make sure that you will not lose your number if things change in the future.
  • Have a Separate Recovery Phone Number: If your phone is not available for MFA calls or texts, it is not going to work for recovery codes, calls, or texts. If at all possible, use different phone numbers for MFA and recovery. If your MFA phone number is your smartphone, your recovery phone number could be your business’ VoIP phone number, or the number of a trusted coworker or spouse.
  • Use a Separate Recovery Email: If the email account that receives MFA messages is inaccessible, you will not be able to use it for recovery. Use an alternate email address. This could be a personal (@gmail.com) account or a one belonging to somebody you trust. When setting up your recovery email account, make sure that account is not reliant on the same methods and devices.
  • Stop Before You Drop: Before you give up, abandon, or change a phone number or email address, review the MFA setup across all of your apps and systems. Make sure you move them to your new number and/or email address before you give up the old ones.
  • Backup Your Authenticator Apps: Both Microsoft Authenticator and Google Authenticator let you backup your Authenticator App data. This lets you reinstall and recover your Authenticator settings and accounts on a new or different device. Make sure, however, that the backup location does not require the Authenticator App for access.
  • Create, Print, and Save Recovery Codes: Many systems, apps, and security tools let you create emergency recovery codes. If available, create the codes, print them, and keep them in a safe location (“Put it with your Passport”). Having these codes can reduce account recovery time by hours or days.
  • Use a Password Manager: Password managers provide a single, secure login to allow access to complex passwords and validation for the connected apps. Using a password manager reduces the risk of account lockout.
  • Do Not Buy Direct: Buy your cloud apps and services through authorized partners. For most SaaS and cloud solutions, your partner has administrative access to your account. They can reset passwords and recover accounts. If needed to expedite access or recovery, your partner can change MFA configuration and/or temporarily remove MFA from an account.

These steps require some planning. As MFA settings and preference can often be set individually, you will need to communicate and coordinate with your employees. 

We Will Help

Our Cloud Advisors are here to assist. We can:

  • Review your current MFA services and configurations
  • Identify risks and recommend changes
  • Assist your team members with settings and recovery codes
  • Provide your with Password Manager services
  • Provide license and account co-management for your cloud services

Schedule time with one of our Cloud Advisors now to discuss your next steps.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

Don’t Fall for the Call

Don't Fall for the Call

IT support scams are back and on the rise. Over the past few weeks, the reports of vendor phone calls and emails claiming to contact people about suspicious activity in their accounts have skyrocketed.  

Do Not Fall for the Scam

Google, and Microsoft, will NEVER call your or email you to start a service or support call.  Let me repeat that, but this time in bold. Google, and Microsoft, will NEVER call your or email you to start a service or support call.

Some of these calls and emails attempt to get you to enter your username and password into a fake web page. 

Many of these attacks request the multi-factor authentication (MFA) code. The attackers initiate a password reset. If given the MFA code, they access the account and can change credentials, access other services, and exfiltrate information.

It is more difficult to spot fake landing and sign in pages

While historically easy to spot, attackers use generative AI to create sophisticated fake login pages. 

Attackers are also using legitimate landing page, marketing, or document tools. The link in the email may open a validly hosted page or document with instructions and another link that, in turn, takes you to the fake login page. 

As the hackers take you through a legitimate service, as a pass-through, you may be less likely to notice that the page asking for your credentials is fake. This method is also more difficult to combat since the pass-through may require valid credentials for access.

Steps You Can Take

You can take a few simple steps to prevent these types of attacks from successfully damaging your business.

  • Education – Inform and educate your team about current and emerging cyber attack methods, what to look for, and how to handle suspicious activity.  Cyber Awareness Training, if well managed, is an affordable means to keep security top of mind.
  • Advanced Email Threat Protection – Email threat protection focused on sender domains, links, and attachments is not enough. Attackers use masking, images, and QR codes beyond the capabilities of many email protection services. Upgrading to a more robust service will provide better protections. Solutions that provide banners and “one-click response” better empower users to flag and manage suspect messages.

We Will Help

Our Cloud Advisors are here to assist. We will:

  • Assess your current security profile and protections
  • Prioritize options and recommendations for security improvements
  • Help you plan and budget for any changes
  • Deploy and co-manage your security solutions to keep you protected.

Schedule time with one of our Cloud Advisors now to begin your security review and improvements.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

5 Cyber Threat Trends You Should Know

5 Security Cyber Threats You Should Know

Earlier this week, we shared CrowdStrike’s 2025 Global Threat Report which identified five (5) cyber threat trends that you should know. While cyber-fatigue is real, understanding the threat landscape helps you assess your risks and security posture and make informed decisions on how to prioritize security-related spending and investment.

5 Cyber Threat Trends

Here are the 5 cyber threat trends you should know.

1 China on the Rise

Cyber attacks originating in China – both nation-state and organized crime – jumped 130% over the prior 12 months. At the enterprise-level, China-nexus attackers focus on telecommunication systems. For most businesses, the increase in attacks on unmanaged devices should be of concern. 

Unmanaged devices lack detection and response capabilities that allow attackers to lurk, monitor, and capture credentials for greater access to your systems, applications, and data.

2 Hands-On-Keyboard Attacks are Making a Comeback

The best way for cyber attackers to avoid modern malware protection, such next-gen endpoint protection and managed detection and response (MDR) services, is for the attacker or a surrogate to use the keyboard. These manual, interactive attacks are up 27% over the prior year.

We may imagine hands–on-keyboard attacks as movie-like scenarios of corporate spies posing as custodians sneaking onto computers while avoiding the security guards making their rounds. In reality, the hands-on-attack may be your employee responding to somebody they think is IT support or a vendor helping them solve a problem.

3 Rapid Ransomware Reach

The speed at which cyber attackers can launch ransomware attacks after an initial breach is accelerating. From breach to spread, attacks are up to 32% faster than previously known.

This speed gives cybersecurity systems less time to identify behaviors and patterns that identify the cyber attack, weakening the effectiveness of the protections.

4 AI for Evil

With the help of AI, certain types of cyber attacks have jumped 220% over the prior year. Cyber attackers are using generative artificial intelligence (Gen AI) technologies to power more-effective attacks.  

Using GenAI, attackers create more realistic fakes – emails, documents, phone calls, and videos – to trigger responses and reactions that enable and facilitate access and breaches.

At the same time, cyber attackers are using security vulnerabilities in the platforms and tools businesses use to build AI agents, just as they use vulnerabilities in web, application, and office productivity platforms.

5 Cloud Attacks Gain Altitude

Cloud intrusions – successful cyber attacks on cloud systems and services – jumped 136% during the first half of 2025 compared to all of 2024. These attacks vector through compromised identities, improper security configurations, API vulnerabilities, lax security and permissions governance.

Steps You Can Take

To ensure your security footprint protects your business appropriately:

  • Conduct IT and Security Assessments that benchmark your security posture.
  • Prioritize your risks based on the nature and size of your business, industry standards and expectations, and regulatory requirements.
  • Level our Security CPR® model and managed services to plan, prioritize, and implement appropriate security and business resilience solutions that:
    • Address your prioritized risks as your budget allows
    • Protect from the most common and the most damaging/costly types of attacks.

We Will Help

Plan Now; Act Soon. Our Cloud Advisors are here to assist. We will:

  • Review your current systems and services and prioritize your risks. 
  • Help you prioritize, plan, and budget for security changes and improvements that may be necessary or preferred
  • Deploy and co-manage your security solutions to keep you protected.

Schedule time with one of our Cloud Advisors now to begin your security review and improvements.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

AI in Google Workspace – AI Ultra for Business

Google AI Ultra for BusinessGoogle Workspace is a comprehensive and secure platform that empowers organizations to be more productive, collaborative, and creative. This series explores the power of AI built within Google Workspace across each of the workspace apps. In this post, we cover the Google AI Ultra add-on for Google Workspace.

Google AI Ultra for Business

Google AI Ultra for Business is an add-on for existing Google Workspace Business and Enterprise subscribers, offering enhanced capabilities.  Beyond the highest access to the Gemini app, Google AI Ultra for Business delivers advanced tools for deep reasoning, images, and videos.

Here are 4 reasons to consider Google Ultra for Business:

1 Gemini App
  • Dive deep with the most capable models, including Gemini 2.5 Pro and Deep Research.
  • Deep Think, with the ability to explore multiple scenarios and answers before responding, is coming soon.
2 Video Generation
  • AI Ultra for Business includes advanced filmmaking tools:
    • Veo 3 — Professional video production tool
    • Flow — Create cinematic scenes using Veo 3
    • Whisk — Image and text to 8-second videos, using Veo 2

3 Project Mariner

  • Research prototype for streamlined human-agent interaction
  • Allows AI agents to handle multiple tasks concurrently
  • Coming soon, initially to the US only

4 Individual YouTube Premium

  • Upgrade your video game with an individual YouTube Premium plan.

And More …

Google AI Ultra for Business also includes higher access and usage limits for:

  • Gemini App
  • Image Generation
  • NotebookLM
  • AI Credits (12,500 credits per month)
  • Storage (30 TB across Photos, Drive, and Gmail

We Will Help

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you get the most value from the IT and cloud services you need and want, without overspending, to best support your business objectives.

Unsure of where to start? Check out our IT Assessment or schedule a meeting with a Cloud AdvisorWe will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

AI in Google Workspace – AppSheet

Gemini AI in AppSheetGoogle Workspace is a comprehensive and secure platform that empowers organizations to be more productive, collaborative, and creative. This series explores the power of AI built within Google Workspace across each of the workspace apps. In this post, we cover AI in AppSheet.

AI in AppSheet

AppSheet is an add-on for Google Workspace and a Google Cloud service that empowers Google Workspace users to create custom apps and automations without writing code.

In addition to simplifying workflow creation and connecting your business data, AppSheet provides controls needed to remain secure and compliant.

Gemini AI in AppSheet helps you create and refine apps and better access and refine your data and information.

Here are 3 Gemini features in AppSheet you should know.

1 Create an App
  • Bring app ideas to life by simply describing them. Gemini AI in AppSheet can transform those concepts
    into a fully functional app for you to edit or publish.
2 Extract Information
  • Currently in preview, Gemini AI in AppSheet lets you populate forms and reports directly from images. Snap a photo of a receipt, invoice or document to capture data and match it to the right fields.
3 Connect External Services
  • Also in preview, AppSheet apps can connect to hundreds of Google Cloud and third-party services without custom code.

And More …

You can also:

  • Embed Gemini-powered AI tasks directly within your AppSheet automations.
  • Extract information from PDF files.
  • Automatically categorize information as it is input.
  • Route and prioritize items based on categorized content to streamline workflows.

We Will Help

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you get the most value from the IT and cloud services you need and want, without overspending, to best support your business objectives.

Unsure of where to start? Check out our IT Assessment or schedule a meeting with a Cloud AdvisorWe will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

Rightsizing IT: Managed Cloud Services for Smaller SMBs – Part 2

Rightsizing IT for Smaller SMBs with Managed Cloud Services

Smaller businesses, like yours, use technology differently than larger organizations. You rely more on commercially available solutions than custom-built or highly-customized solutions. You are held to the same security standards as larger companies, but you lack the expertise and budget of bigger businesses. Rightsizing your IT means carefully matching your IT services to your needs, priorities, and budget. This is key to keeping your services productive, secure, and affordable.

In Part 1, we discussed the unique IT challenges you face as sole practitioners, solopreneurs, or very small business (VSB) owners and leaders. In Part 2, we dive into the process of rightsizing your IT.

1
Pick the Right Productivity Suite

Think beyond just email and calendars; focus on how you communicate and share information with your clients, customers, contractors, and vendors. Do you send and share documents? What CRM and financial apps do you use? Do you rely on and use any industry-specific software locally or in the cloud?

While other platforms exist, some at lower costs, Microsoft 365 and Google Workspace offer the most comprehensive platforms for small business productivity, communications, and collaboration.  Microsoft and Google promote different philosophies:

  • Microsoft 365 works best as a hybrid solution, with full-featured software running locally, slim web versions, and a range of integrated apps, such as planning, bookings, and PowerBI. 
  • Google promotes a cloud-first approach. Focused on core communication and collaboration, Google expects you will select and integrate cloud-based (Software as a Solution / SaaS) business apps to meet your specific needs. Google is designed to serve as your identity manager, providing integrated access to your cloud apps and services.

Consider the business apps and systems you use and how you want them to work with your productivity suite. Your line of business and back-office apps can guide whether Microsoft 365 or Google Workspace is the best fit for your IT ecosystem and your business.

2
Avoid Duplicate Services

Both Google Workspace and Microsoft 365 are robust productivity suites. And yet, we often opt to purchase additional solutions out of convenience even though we already have similar features at our fingertips. The most commonly duplicate services across our smaller business clients are:

  • Meeting services
  • External file sharing
  • Generative AI
  • AI assistant tools (transcription, note taking, etc.)

Learning to use your existing features and capabilities negates the need to spend money on – and manage – additional solutions. You can easily overcome concerns by ensuring you and your team know how to use the features you need. For example, when scheduling a meeting with a client, you might say, “I will send you a Google Meet invite, or if you prefer Zoom, you can send the invite.”

Note that features may vary based on your Microsoft 365 or Google Workspace subscription. You may need to upgrade in order to access certain features you require. This upgrade is likely less expensive than licensing another third-party app.

3
Be Cloud Forward

For smaller businesses, the cloud offers significant advantages over on-premise solutions.

  • Mobility: Securely access your systems, apps, and data, whether you are in the office, a coworking site, at home, or on the road.
  • Security: Leveraging the cloud simplifies your security exposure, lowering your costs while maintaining or increasing your protections.
  • Business Continuity: Cloud-based services protect you from local outages and service disruptions, reduce the number of ‘things’ that can break, and make it easier to recover when things do go wrong.
  • Ease of Access: Get to work without having to jump through VPN hoops. Your access is the same, regardless of where you are working.
  • Affordability: With a simpler, more secure, and integrated IT ecosystem, you pay less for the support and services you need and want.

4
Pick the Right Partner

If you are a sole practitioner, solopreneur, or VSB, most IT service providers do NOT want you as a client. Our research indicates that fewer than 10% of traditional IT and managed service providers want clients with 10 or fewer employees. Their business models require an economy-of-scale that is not viable with very small clients.

Pick an IT partner that wants your business and does not see you as an exception to their normal or preferred type of client. Look for an IT service provider that has:

  • A successful history working with smaller businesses.
  • Services and solutions tailored to your needs and priorities as a smaller business.
  • Gives you options that let you make value-based business decisions about your IT services.
  • Focuses on affordability as much as features, capabilities, and security.

How Will Cumulus Global Help?

At Cumulus Global, we truly value sole practitioners, solopreneurs, and very small businesses. We specialize in tailored solutions designed just for businesses like yours, backed by a proven track record of success.

Our top priority is ensuring that you have productive, secure, and affordable Managed Cloud Services, Cloud Forward IT Service and Support, and Security CPR® Managed Security services. 

We focus on how your IT services can best help your business thrive and grow without overspending.

Schedule a meeting with a Cloud Advisor and take your first step towards better IT for you and your business. 

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

AI in Google Workspace – Vids

Gemini AI in VidsGoogle Workspace is a comprehensive and secure platform that empowers organizations to be more productive, collaborative, and creative. This series explores the power of AI built within Google Workspace across each of the workspace apps. In this post, we cover AI in Vids.

AI in Vids

Vids is a relatively new addition to the Google Workspace family of apps. Google Vids is a cutting-edge video creation platform, powered by AI.

Gemini AI in Vids helps you generate your first draft and land your message with AI voiceovers. You are empowered to create polished videos in less time so you can tell more engaging stories.

Here are 3 Gemini features in Vids you should know.

1 Create Your Story
  • Create your video storyboard with suggested scenes, scripts, stock media, music, and more to jumpstart video storytelling. Start with only a prompt and a file from your Google Drive.
2 AI Voiceovers
  • Use Gemini in Vids to give your videos a fresh voice by choosing from a variety of preset, professional- sounding voiceovers.
3 Read-Along Teleprompter
  • Record your talk track with confidence using the teleprompter embedded directly in Vids’ recording studio, so you can stay on message.

And More …

You can also

Create Clips from Prompts
  • Turn ideas into video clips by providing a descriptive prompt.

We Will Help

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you get the most value from the IT and cloud services you need and want, without overspending, to best support your business objectives.

Unsure of where to start? Check out our IT Assessment or schedule a meeting with a Cloud AdvisorWe will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

AI in Google Workspace – Chat

Gemini AI in ChatGoogle Workspace is a comprehensive and secure platform that empowers organizations to be more productive, collaborative, and creative. This series explores the power of AI built within Google Workspace across each of the workspace apps. In this post, we cover AI in Chat.

AI in Chat

Chat in Google Workspace provides direct messages, group chats, and spaces. Chat makes work collaboration and project management easier.

Gemini AI in Chat is your real-time assistant and partner for team collaboration. Use it to stay on top of active conversations by summarizing recent messages, finding specific details, and capturing action items. With on-demand summaries in the Chat home view, AI in Chat gives you a single place to catch up on every conversation.

Here are 4 Gemini features in Chat you should know.

Chat Summaries
  • Located in the home view for Chat, Gemini AI in Chat provides you on-demand summaries of each active conversation. 
  • You can catch up quickly in one place and focus your attention where it’s needed most.
Action Items
  • Gemini AI in Chat can analyze conversations and automatically identify and list action items. Stay organized and ensure that decisions and tasks are clearly understood and assigned. 
  • You can ask for a general list of action items or ask to see action items specifically for a particular person.
Contextual Question Answering
  • You can ask Gemini AI specific questions about a conversation or a shared file directly within Chat. This gives you quick retrieval of information without manually scrolling back through messages.
  • For example, if someone mentioned a timeline extension or a project decision, you can ask Gemini, “What did [person] say about the timeline extension?” or “What’s the decision on the project discussed?” 
Automatic Language Translation
  • Google Chat, using Gemini, will automatically detect and translate messages in over 120 languages to your preferred language and keep the original message for review. 

And More …

From the side panel, Gemini AI in Chat functions as an AI assistant and content generator. You can use AI in Chat to:

Draft Messages
  • Get AI assistance to compose messages, replies, or even brainstorm ideas directly within the chat interface.
Reference Shared Files
  • Gemini AI in Chat can analyze shared Google Workspace files (like Docs or Slides) linked in a chat and provide summaries or answer questions about their content.
  • You get immediate context about shared documents without needing to open each file separately.

We Will Help

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you get the most value from the IT and cloud services you need and want, without overspending, to best support your business objectives.

Unsure of where to start? Check out our IT Assessment or schedule a meeting with a Cloud AdvisorWe will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

library

Make IT Decisions Like a Pro – 7 Best Practices

eBook | Source: Cumulus Global — IT decision-making often feels overwhelming. With countless new products, services, and a seemingly endless stream of information, it’s easy to hesitate, overanalyze, and doubt your decisions. You want (and need) IT services to drive growth, improve efficiency, and position your organization for long-term success.

Decision Tree: Windows 10 End of Life

eBook | Source: Cumulus Global — Windows 10 End of Life is October 14, 2025. Proactive planning and action are not just recommended, they are critical for your business continuity and security. This eBook provides a decision tree and walks you through your Windows 10 upgrade options.

Cybersecurity Essentials for Smaller Businesses

eBook | Source: Cumulus Global — Cybercriminals target small businesses because we tend to have fewer resources and less robust cybersecurity practices. This eBook provides a strategy, model, & roadmap of affordable, effective cybersecurity essentials for sole practitioners, solopreneurs, & very small businesses.

7 Questions to Ask Your IT Provider

eBook | Source: Cumulus Global — For small and midsize businesses like yours, the information technology and services environment continues to change. Here are seven questions, across a range of topics, to ask your current IT provider to ensure they are actively helping you look forward.

5 Things Your IT Provider Should be Telling You

eBook | Source: Cumulus Global — Beyond Microsoft 365 and Google Workspace, SMBs use cloud services differently than larger organizations. Understanding these differences, we identify strategies to guide your plans and decisions for getting the most value from your current systems and new, managed, cloud services.

2023 OpenText Cybersecurity Email Threat Report

eBook | Source: OpenText Security — Attackers persistently adapted their email-based techniques throughout 2022, introducing more nuances into their methods. This eBook shares current information about Phishing, Business Email Compromise, Cryptocurrency Scams; and the Top Malware Threats. The report provides examples of attacks as a learning tool for understanding attacks, how to prevent them, and how to respond.

Cloud Strategies for Small and Midsize Businesses

eBook | Source: Cumulus Global — Beyond Microsoft 365 and Google Workspace, SMBs use cloud services differently than larger organizations. Understanding these differences, we identify strategies to guide your plans and decisions for getting the most value from your current systems and new, managed, cloud services.

Understanding Third Party Breach Alerts

eBook | Source: Cumulus Global —
Third party breach alerts inform you of third party data breaches that may pose risks to your business. This eBook looks at the information provided in third party breach alerts
and, using examples, discusses how to interpret and use the information provided.

A Cyber Insurance Primer (Slide Deck)

Slide Deck | Source: Cumulus Global —
Cyber Insurance is a tool, not a solution. This deck is from our June 2022 3T@3 Webcast: A Cyber Insurance Primer and discusses the what and why of cyber insurance and how it fits into your cyber security and incident response plans.

Email Security: Good, Better, Best

eBook | Source: Cumulus Global —
Cyber attacks by email have skyrocketed over the last decade. Email and domain impersonation attacks, fueled by successful phishing attacks, bypass account-centric security. This eBook discusses how to protect your business and domain from Business Email Compromises and impersonation attacks.

Webcasts

Don’t Do IT Alone

(10/21/25) – Sole practitioners and solopreneurs make up about 80% of all small businesses. At the same time, fewer than 10% of IT service providers want sole practitioners, solopreneurs, and other very small businesses as clients. Picking the right suite of IT solutions, and finding the right IT service provider is essential for your productivity, security, and budget.

Is Your AI OK?

(09/15/25) – AI is here. Your business is using AI – officially or not. And with AI comes “AI Data Leaks.” AI has the power to do good and to do damage. Managing your AI services, and security, is the best way to ensure your AI is OK.

Make IT Decisions with Confidence

(08/19/25) – As small business owners and leaders, we struggle to make IT decisions. We may trust our advisors, our sources of information and guidance, but is that enough? In order to make IT decisions with confidence, we need to trust ourselves. If not, we struggle with analysis paralysis amid overwhelming information and options.

Better IT for SMBs

(06/17/25) – Most IT firms serving small and midsize businesses target companies with more than 20 employees. As a smaller business, your IT needs differ. You want and deserve secure, productive, and affordable IT. This 3T@3 Series event recording dives into how sole practitioners and very small businesses can and should get the productive, secure, and affordable IT solutions and services you need.

Choose the Right Managed Cloud Services

(10/17/2023) – Business leaders like you understand the need for effective, secure, and affordable IT services. Hiring or contracting for services has likely been unaffordable. Managed Cloud Services, when properly matched to your business, provide the capabilities, security, and services you need at affordable rates. Hear from experts about defining needs and selecting the right services, technologies, and partners.

Deep Dive: Lift-and-Shift and DaaS

(07/18/2023) – As SMBs, we still have on-premise file and application servers that require upgrades, security, backup, monitoring, management, and support. Evaluating your on-premise IT, and moving what you can to the cloud, increases the business value of your IT spending and investments.

Five Things Your IT Provider Should be Telling You

(06/20/2023) – We tend to wait for our IT service providers to raise warning flags, and the periodic review with our IT provider can feel like a subtle sales call. Reacting to IT problems is not enough, and adding more IT services may not be the answer.

The High Cost of Low Adoption

(05/23/2023) – Beyond core features in Google Workspace and Microsoft 365, cloud adoption tends to be fairly low. Better cloud adoption improves productivity, communication, and security. And, it can save you money.

Cloud Cover: Strategies for Small Businesses

(04/18/2023) – As small businesses, we can do more with the cloud then Microsoft 365 and Google Workspace. But if we want to take advantage of the benefits of managed cloud services, we need better cloud strategies.

Cyber Security: 3 Questions and Shared Responsibility

(03/21/2023) – The cloud’s Shared Responsibility Model places most of the security and data protection burden on you. Our webcast explores 3 key questions and the shared responsibility model to help you plan, deploy, and manage effective, and cost-effective, security..