Posts

AI in Google Workspace – Meet

AI in Meet

Google Workspace is a comprehensive and secure platform that empowers organizations to be more productive, collaborative, and creative. This series explores the power of AI built within Google Workspace across each of the workspace apps. In this post, we cover AI in Meet.

AI in Meet

Google Meet offers business-grade video and voice conferencing designed to enhance collaboration. Gemini AI in Meet takes care of the details, enabling you to focus on participating instead of meeting management and logistics. Beyond providing a smarter meeting experience, Gemini in Met can help you look and sound your best.

Here are 4 Gemini features in Meet you should know:

Take Notes
  • In addition to generating a transcript, Gemini in Meet will automatically take notes during a meeting.
  • While a transcript captures every word spoken, notes provide a summary of discussions, highlight key points, and identify action items.
  • Notes offer a great way to share information from meetings with others and to help create minutes. Notes are placed in a Doc and save it to your Drive. Gemini also notifies you on Gmail for quick access to your notes.
Captions with Real-Time Translation
  • Gemini in Meet provides real-time captions and can translate captions into more than 65 languages, breaking down language barriers and helping everyone feel included.
Adaptive Audio
  • You can join hybrid meetings without conferencing hardware or rooms.
  • Attendees can use their laptops in any space. Gemini AI in Meet will synchronize microphones and speakers to avoid echoes, feedback, or distortion.
Show and Tell
  • Gemini in Meet includes tools to enhance your appearance and audio, with lighting and look adjustments and audio filtering/noise cancellation.

After the Meeting …

  • Gemini in Meet can create summaries of key points and identify action items. You can create custom summaries to identify information such as most discussed or “best of” topics.

We Will Help

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you get the most value from the IT and cloud services you need and want, without overspending, to best support your business objectives.

Unsure of where to start? Check out our IT Assessment or schedule a meeting with a Cloud AdvisorWe will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

Why Not Prevent AI Data Breaches?

Data Loss PreventionTo state the obvious, AI data breaches and leaks will damage your business. Even sharing sensitive or protected information internally will cause problems.

Less obvious is the fact that you have already shared information that should not be shared. You should expect that private, sensitive, and protected information in Google Workspace or Microsoft 365 has been shared inappropriately to people within your company, outside your company, and/or publicly.

Not obvious to most is the fact that integrated AI tools, like Google Gemini and Microsoft Copilot, will find, use, and share any information the tool can access.

Just because an employee or a customer has never reported seeing something they shouldn’t have does not mean they have not done so. Nor does it mean they will not see something that should be secure in the future.

The Problem

The problem we face: the myths we believe when it comes to our own information security and the risk of AI data breaches.

Myth 1 – Oversharing Does Not Happen

What do we mean by oversharing?  Oversharing is when somebody gives access to information (files or folders) that unintentionally gives others access to the information, directly or indirectly.  

Most often, this happens when sharing a file or folder by link in an email or chat. You are prompted by the system to grant access. Typically the prompt is to give view access to “Anyone with the link” or “Anyone within your company.” This one-click option is easier than finding the file and editing the permissions.

The risk of course is that “anyone with the link” can be anybody — inside or outside – to whom the message is forwarded or added to a reply.

And “anyone within your company” means just that. They may not see it if they never search for it or for something similar.

Myth 2 – Security Breaches Require a Deliberate Act

We want to believe that our employees would never intentionally breach security or leak sensitive information. When we equate intentional acts with deliberate acts, we forget that many user actions can, and will, intentionally share information beyond what is appropriate.

With email, we diligently warn people that clicking the wrong link is damaging and to remain vigilant. We are not nearly as diligent when it comes to files and folders. Most of us assume that the permissions set on files and folders will keep us safe.

Myth 3 – Google Workspace and Microsoft 365 are Secure

Like most myths, this myth is partially true. Both Google and Microsoft aggressively secure their cloud services and have a “shared responsibility” security architecture.

Microsoft and Google secure the services they provide to ensure only authorized users can access the services. They also provide the infrastructure for you to manage user accounts, access, and permissions. You are responsible for the security of your data within Google Workspace and Microsoft 365.

As an example, both services allow you to block external file sharing. If you choose to allow external file sharing and a file is mistakenly shared externally, this is your issue to resolve.

The Reality

When you use Microsoft Copilot and Gemini AI, the tools have access to data according to the access available to each user. If a user has inappropriate access to confidential information, Copilot or Gemini have access as well. 

Since the AI tools will collect, analyze, and integrate multiple relevant sources, the AI tools are more likely to find and use the information.

The Solution

Ensuring that your information is properly protected as you begin using AI tools is not easy. The solution for preventing AI data breaches, however, does not need to be difficult or expensive. 

Data Loss Prevention

Modern Data Loss Prevention (DLP) services give you the ability to 

  • Set policies and rules for handling sensitive and protected information
  • Analyze the content of files and folders against the policies and rules
  • Notify, report, and automatically mitigate any violations

Mitigation can include redacting sensitive information and/or modifying permissions to bring them into compliance.

More robust DLP solutions offer advanced tools to manage access and permissions, such as conditional access, time-limited access, and managed permission overrides.

DLP Options

Both Microsoft 365 and Google Workspace offer DLP features and capabilities. Most of these features are within the Enterprise tier (more expensive) subscriptions.

For small and midsize businesses using Business tier subscriptions, adding an integrated, third-party DLP service will be less expensive than upgrading. 

Third-party services offer robust management portals that are generally easier to learn and use than the built-in features.

Getting Started

First things first, do not panic. Begin by reviewing your current security and permissions policies, procedures, and top-level settings. Also, consider how you and your team are currently using Copilot, Gemini, and other AI tools, and how you expect or plan to use them in the future.

With a high level assessment, you can explore how you want to use DLP and which services will provide the most effective and affordable solutions for your needs.

Cumulus Global can assist with real-time assessments of your file and folder security to provide a benchmark and a baseline for planning and decisions. From there, we can help implement, configure, and manage your DLP services

Why Cumulus Global?

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you do not overspend on services and to focus your IT dollars on the capabilities and services you need.

Let us know how we can help, or schedule a meeting with a Cloud Advisor.

We will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

AI in Google Workspace – Drive

AI in Workspace: DriveGoogle Workspace is a comprehensive and secure platform that empowers organizations to be more productive, collaborative, and creative. This series explores the power of AI built within Google Workspace across each of the workspace apps. In this post, we cover AI in Drive.

AI in Drive 

Gemini in Drive helps you quickly find answers and insights from across your files. Catch up with summaries of long documents, query project folders, and automatically classify your most sensitive content.

Features you should know when using the Gemini Drive

The Gemini Side Panel is available when you are looking Drive. In general, you can:

  • Specifically direct Gemini to analyze a particular folder by typing “@” followed by the folder name in your prompt (e.g., “Summarize files in @Marketing Reports”).
  • Explicitly select a folder as a source for Gemini to focus on when you ask a question or request a summary.
  • Use Gemini’s ability to understand folder content is currently focused on non-media file types like text documents, PDFs, spreadsheets, and presentations.
  • Use or modify “nudges”, or suggested prompts, which are provided based on your content in Drive.
Q&A for Understanding Folder Content
  • Gemini can analyze the files within a folder (including documents, PDFs, spreadsheets, and presentations) and provide a concise summary of the main points or themes. This allows you to quickly understand the content of a folder without opening each file individually.
  • Gemini can answer specific questions about the information contained within a folder. Gemini can synthesize information from multiple files in the folder to provide an answer. For instance, you could ask, “What are the main risks identified in the documents within the ‘Q3 Planning’ folder?”
  • Find specific pieces of information or quick facts related to a project or topic by analyzing the files within a designated folder.
  • Identify the overarching theme or topic of the content within a folder.
AI Classification
  • Automatically identify, classify, and protect your organization’s sensitive content with precision and scale.
PDF File Support
  • Get the gist of a long document with Gemini’s help, summarizing it, or ask Gemini complex questions about any PDF in your Drive.

File and Folder Management

  • You can instruct it to “Create a new folder” or “Create a new folder named ‘Meeting Minutes’.
  • Use Gemini to create new Google Docs, Sheets, and Slides within your Drive. Specify the name, for example, “Create a new Google Doc titled ‘Project Proposal Draft’.

We Will Help

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you get the most value from the IT and cloud services you need and want, without overspending, to best support your business objectives.

Unsure of where to start? Check out our IT Assessment or schedule a meeting with a Cloud Advisor.

We will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

AI in Google Workspace – Gmail

AI in Workspace: GmailGoogle Workspace is a comprehensive and secure platform that empowers organizations to be more productive, collaborative, and creative. This series explores the power of AI built within Google Workspace across each of the workspace apps. In this post, we cover AI in Gmail.

AI in Gmail

AI in Gmail lives in the Gemini Side Panel.  Gemini in Gmail is your productivity partner that can help draft, reply, sift through, and summarize your emails to save you time at your desk or on the go.

Features you should know when using the Gemini Side Panel in Gmail

The Gemini Side Panel is available when you are looking at your inbox and when you have opened an email or email thread. From the inbox, or at any time, you can:

  • Find specific messages or information in your inbox
  • Identify trends and topics
Draft Emails and Respond
  • Summarize an email thread. You can ask for a more or less detailed summary than the initial response
  • Draft an email based on keywords and the context of your inbox
  • Edit emails to polish your tone or change the length of your message
  • Ask Gemini to suggest a response to the email
Access Calendars and Events
  • Create events using your natural language requests
  • Search for calendar events by dates, participants, or subject
  • Request details about specific upcoming events
Access Files and Drive
  • Search Drive for documents related to the topic of an email thread
  • Use the “@” prompt to search for and add specific documents to your query

The “One-Click” features you should know when working in an email message

  • When viewing, the “Summarize this email” link gets you an instant summary of the message and thread
  • When composing a new email message, the “Write an email for me” link prompts you for information and drafts your message

We Will Help

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you get the most value from the IT and cloud services you need and want, without overspending, to best support your business objectives.

Unsure of where to start? Check out our IT Assessment or schedule a meeting with a Cloud Advisor.

We will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

Service Update: Updated Service Plans and SLA Effective July 1, 2025

Managed Cloud Services by Cumulus Global

Service Plans and SLA Updates take effect July 1, 2025.

Overview of Changes

Effective July 1, 2025, Cumulus Global is updating our Service Plan options and our Service Level Agreement (SLA).  The objectives of these Service Plans and SLA updates are to:

  • Clarify differences between our Service Plans and our Managed Cloud Services
  • Create new Service Plan options that better meet client needs and budgets
  • Update out-of-plan service expectations
Service Plans vs Managed Cloud Services

Our Service Plans remain consistent with traditional IT services.  Through these plans, we offer unlimited, remote, admin of the cloud and IT services we provide. Our focus is on helping your internal or other IT resources best configure, manage, and support these services. Our Service Plans do not include active monitoring and management. They also exclude cyber attack recovery services.

Our Managed Cloud Services add unlimited, remote, co-management of your cloud and, optionally, other IT services bundled with security, admin, and management tools.  Our Managed Cloud Services let you partially or completely hand-off responsibility for monitoring, managing, and supporting your IT services to us.

Service Plan Changes

We now have four Service Plan options, you can select the Service Plan that best meets your needs and budget:

  • Self Service: We include this free Service Plan option with the cloud services we provide. Self Service provides subscription and license administration and assistance with hardware warranty service claims.
  • Limited Service: Our economy plan provides assistance with basic user account management — adds, changes, and deletes — and user-license assignments. We will also help escalate vendor support requests when applicable. This ultra low-cost plan is designed for clients wanting assistance with user account and license management that do not yet need or want our Admin or Premium services.
  • Admin Service: Our most popular plan provides unlimited, remote assistance for the IT resources responsible for administration, management, security, and support of your cloud-based and other IT services.  We bring expertise and experience to help the helpers with back-end and end-user issues.
  • Premium Service: Our top level service adds Tier-2 end user support to our Admin Service offering.

Our current Basic Service plan is discontinued as of July 1, 2025, for new and monthly/flex clients. To remain on a free plan, you may opt-out of moving to our Limited Service plan.

For clients with annual or multi-year commitments, your Basic Service plan ends at your first renewal after July 1, 2025.  We may, at our option, move you to our Limited Service plan at no cost through the end of your current commitment.

Out-of-Plan Services

We have updated the minimum and incremental times on which hourly and prepaid hour services are tracked and billed.

The new SLA clarifies that our Service Plans and Managed Cloud Services do not cover any cyber attack recovery services. The SLA outlines rates and surcharges for these services.

More Information

About Cumulus Global

Managed Cloud Services for Small and Midsize Businesses, Governments, and Schools

Cumulus Global (www.cumulusglobal.com) is an industry-leading managed cloud service provider with a mission to deliver solutions with tangible value.

  • What We Do: We translate your business goals and objectives into solutions and services.
  • How We Do It: We start with your business needs and priorities. Planning and migration includes guidance to help your team adopt and utilize new services. Your team benefits from co-managed services, ongoing support, and client success services that help you adapt as your business changes and grows.
  • What We Offer: Managed cloud solutions featuring Google, Microsoft and over three dozen providers.

For more information, schedule a no-obligation introductory meeting with a Cloud Advisor.

AI in Google Workspace – Gemini App

AI in Google Workspace - Gemini AppGoogle Workspace is a comprehensive and secure platform that empowers organizations to be more productive, collaborative, and creative. This series explores the power of AI built within Google Workspace across each of the workspace apps. We begin with the Gemini App in Google Workspace.

The Gemini App

The Gemini App is a Large Language Model (LMM) service built to help you get more done in less time. It’s great for brainstorming ideas, researching topics, and improving your writing. Use Gemini to pressure-test your work against target personas, with enterprise-grade data protections. 

Choose from multiple versions specifically designed for advanced reasoning, complex tasks, deep research, and everyday queries.

Three features you should know

Deep Research

Explore complex topics and get findings from different sources across the web in a comprehensive, easy-to-read report that brings hours of research to your fingertips in mere minutes. The reports can also be exported into Google Docs to easily share with your teams, allowing you to dive into industry trends, understand the competitive landscape, or even research customers ahead of a sales meeting.

Gems

Gems are customizable versions of Gemini that help with specialized or repetitive tasks. It’s like having an expert to help craft compelling marketing copy, prepare for job interviews, brainstorm new ideas, and so much more. You can even feed Gems your documents and other information, making them smarter and more tailored to your needs.

Integrations

Gemini seamlessly connects to other Google Workspace apps. Pull schedules from Gmail, PDFs from Drive, and content from Docs into the Gemini app without switching tabs or windows, so you can stay focused and get quality work done faster.

We Will Help

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordable managed cloud services. We work to ensure that you get the most value from the IT and cloud services you need and want, without overspending, to best support your business objectives.

Unsure of where to start? Check out our IT Assessment or schedule a meeting with a Cloud Advisor.

We will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Allen Falcon is the co-founder and CEO of Cumulus Global.  Allen co-founded Cumulus Global in 2006 to offer small businesses enterprise-grade email security and compliance using emerging cloud solutions. He has led the company’s growth into a managed cloud service provider with over 1,000 customers throughout North America.

Microsoft or Google Calling? Call Your Trusted Advisors

Ringing PhoneYou work with an IT service provider that learns your business, priorities, and IT needs. They work to address your needs and priorities within your budget and in alignment with your business goals and objectives. When economic conditions shift, the vendors with whom your IT service provider partners – Google, Microsoft, and others – get nervous and begin calling you directly, bypassing your trusted advisors.

Since February, we have seen and received reports that our customers, and those of other Microsoft partners, are receiving unsolicited calls, emails, and calendar invites from “Microsoft” about their accounts, licensing, and renewals. These unsolicited contacts are NOT Microsoft “solutions consultants” or “international suppliers” as they might claim. They are Microsoft telemarketing contractors tasked with convincing you to upgrade and expand your Microsoft licensing.

Why is This a Problem?

The contractors doing the outreach do not know your business, nor do they know the extent of your relationship with us, or your Microsoft partner.

  • Their suggestions are often incorrect.
    • They are not aware of how you are using your Microsoft 365 services and the needs of your business.
    • They are not aware of other services you are using, such as backup/recovery and third party security services.
    • Many of their recommendations will duplicate services and costs.
  • The communications and tactics are often aggressive.
    • They may state that they have reviewed or audited your account and you need to upgrade. They may also claim that you need to do an audit, giving you the impression that you are out of compliance.
    • They may attempt to refer you to specific vendors for assessments and services. These often duplicate services you already have or that can be provided more cost-effectively by us or your current Microsoft partner.
  • Customers and Microsoft partners report that the calls and meetings are often just high-pressure sales pitches to buy more seats – a waste of time.

What To Do

If you receive a call or email that you suspect is from a Microsoft “Solutions Consultant” or “International Suppliers”, verify that this is the case. Ask if they are a Microsoft employee or contractor and where they are based. Note that their email address will start with a “v-”, indicating they are a vendor – even though the domain remains “microsoft.com”.

If you do not want to engage, let them know as much and instruct them to contact Cumulus Global, or your partner. We, or your partner, will be happy to screen the call and advise you if the offer is worth considering.

Do you want to engage? Insist that Cumulus Global, or your Microsoft partner, is invited and participates in the meeting. We can provide context to the “consultant” and guidance to you.

Microsoft is not the only vendor that may bypass your IT service provider and contact you directly. It is always best to loop-in your IT service provider.

Your Next Step

At Cumulus Global, our priority is ensuring that you have productive, secure, and affordably managed cloud services. We work to ensure that you do not overspend on services and to focus your IT dollars on the capabilities and services you need.

If your needs or priorities change, let us know or schedule a meeting with a Cloud Advisor. We will help you adapt while keeping your IT services secure and cost-effective.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

Debunking Cyber Insurance Myths

Cyber Insurance Risk Assessment

Your business faces an ever-increasing array of cyber threats. Beyond protections, cyber insurance is an essential component of a robust risk management strategy. Therefore, understanding cyber insurance realities is necessary for you to make sound security and business decisions. In this post, we focus on debunking common cyber insurance myths.

1MYTH: Cyber Insurance Policies Offer the Same Level of Protection

In reality, policies vary significantly with respect to coverages and services. Opting for bundled policies generally results in coverage gaps, as most general liability policies treat cyber coverage as an add-on.These gaps leave your businesses vulnerable to liabilities and losses.

Standalone cyber insurance policies, provided by financially strong carriers, offer comprehensive protection tailored to the specific needs of your business. They address unique risks associated with cyber threats given your industry, business size, and other risk factors. Standalone policies also often include coverage of forensics, temporary resources, and other recovery needs. Dedicated coverage helps you respond more effectively to a cyber incident.

2MYTH: Your IT Security Measures Dictate Your Premiums.

While robust security practices can positively impact premiums, broader industry trends and company-specific factors play a more significant role in determining pricing.

Industry-wide loss ratios have a substantial impact on insurance costs. Peer group averages impact premiums as well. Insurers assess the risk profile of businesses within sectors. As insurers issue more policies and analyze claims, insurers refine actuarial, incorporating additional factors and risks.

3MYTH: Cyber Insurance Policies do Not Pay Out

Many businesses hesitate to buy standalone cyber insurance policies out of fear that their policy will not pay out in the event of a claim. Reputable cyber insurers with strong financials rarely deny claims with a valid cause..

Inaccurate, or fraudulent, applications are the most frequent reasons for claim denials or reductions. 

Your application must accurately reflect your cyber insurance risk profile. The information you provide on your cyber insurance application should reflect a thorough review process. Cybersecurity tools offer verification of your security profile.

4MYTH: Cyber Insurance is All You Need

Many businesses, including yours, may need additional layers of protection for specific cyber risks. These additional coverages may not be available within a traditional cyberinsurance policy.

Cyber warranties offer additional layers of protection by covering these specific elements of cyber risk. Combining cyber warranties with cyber insurance creates a more comprehensive safety net. This approach bolsters your overall security strategy and ensures appropriate coverage.

5MYTH: Robust Cybersecurity Measures Eliminate the Need for Cyber Insurance

Investing in strong cybersecurity defenses provides crucial protection for your business. No security profile or system, however, will stop every cyber attack, data breach, or data loss incident. Cyber threats continually evolve. Even the most secure systems fall victim to sophisticated attacks.

Cyber insurance serves as your financial safety net. Beyond covering direct financial losses, better policies help you recover from incidents that slip through the cracks of your security measures. These resources include forensics, data recovery, customer relations, legal expenses, and more. Cyber insurance protects you financially if and when a cyber attack gets past your defenses.

6MYTH: Obtaining Cyber Insurance is Complicated and Time-Consuming

The thought of obtaining cyber insurance deters many businesses from seeking the coverage they need. Horror stories of complex applications, surveys, and audits create anxiety and fear of the process. 

Unfortunately, this myth can come true. Businesses that apply through general insurance agents and fail to leverage knowledgeable IT resources often run into issues during the underwriting process.

Cumulus Global partners with cyber insurance specialists that offer streamlined application processes and non-committal quotes. Our partners work with more than two dozen carriers, ensuring you have options to choose the policies that meet your business needs and budget. Non-biased policy reviews help you understand your coverages and make informed decisions.

Your Next Step 

Avoid falling prey to cyber insurance myths. Contact us and let us introduce you to our cyber insurance partners.

We can provide you with a Cyber Insurance Risk Assessment and help you assess your cybersecurity profile.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

Picking the Right Google Workspace Subscription for Your Business

Google Premier PartnerTo meet widely varying customer needs, Google offers five core subscription options spread over two tiers. For larger organizations with frontline and deskless information workers, Google offers additional, specialized license options. If you are looking at a Google Workspace subscription for the first time, considering an upgrade, or looking for Gemini AI features, you’ll want to choose the subscription and licensing that meets your needs without overpaying.

Subscription Tiers

Business Tier

Businesses with fewer than 300 employees typically select one of the Business Tier subscriptions– Workspace Starter, Standard, and Plus. These subscriptions limit the number of users and focus on the features and security most appropriate for smaller organizations.

Enterprise Tier

Larger businesses, as well as those requiring more advanced capabilities and security, often opt for the Enterprise Tier subscriptions– Standard and Plus. The Enterprise Tier also includes specialized license versions for frontline workers and knowledge workers with other email services.

Selection Criteria

When selecting a subscription, most businesses focus on a few key capabilities, such as:

  • Storage capacity and shared drives
  • Vault archiving/e-discovery
  • Google Meet features
  • Select security capabilities

With AI now integrated into all Google Workspace subscriptions, you should take time to understand the Gemini features included in each plan. A deeper review of security features can also help guide your selection.

Here is a deeper look at key selection criteria.

Storage

Since September 2024, all Google Workspace subscriptions use pooled storage.

Vault, the compliant archive/e-discovery service, covers Gmail, Drive, Groups, Chat, and Calendar, is available for all Enterprise Tier subscriptions and Business Plus.

The amount of storage, allocated per user and pooled, is as follows:

Business Tier

  • Starter = 30 GB
  • Standard = 2 TB
  • Plus = 5 TB

Enterprise Tier

  • Essentials = 1 TB
  • Standard = 5 TB
  • Plus = 5 TB

Meet

Google Meet is a robust meeting and collaboration system that generally negates the need for third party solutions.

Google Meet with Business Standard and Plus

Meet Features in Business Standard and Plus Subscriptions

All Google Workspace licenses include a core set of features:

  • External participants
  • Secure meetings
  • Screen sharing
  • Mobile app
  • Dial-in (US & international)
  • Digital whiteboard
  • Hand raising
  • Reaction

At the Business Tier, Meet features scale up  as noted in the table.

The Enterprise Tier includes live streaming and additional security features with all licensees.

Participant limits increment as follows:

  • Essentials: 250
  • Standard: 500
  • Plus: 1000

Gemini AI in Google Workspace

The following matrix summarizes the Gemini AI features in each of the core Google Workspace subscriptions.

Google Workspace Gemini AI Features

Security

Google Workspace provides a comprehensive set of security features and tools. With too many settings and options to list here, we published a Google Workspace Security Feature Matrix as an eBook. 

Review security features against your regulatory, industry, and business requirements.

Selection Process

When evaluating Google Workspace subscriptions, it’s essential to assess the details. Part of your selection process should include determining whether selecting a higher subscription tier or upgrading is more cost-effective than integrating third-party tools to provide the functionality you need.

For example, while Google Workspace’s Standard Data Protection includes email sandboxing, the feature does not offer the same capabilities– such as QR code analysis– as many third-party email threat protection services. 

In many cases, upgrading your Google Workspace subscription provides the needed capabilities at a lower cost than using a third-party tool. This is often true for Google Meet compared to third-party web meeting tools like Zoom.

For other capabilities, however, a third-party integrated solution may still be required.

Your Next Steps

For help assessing your needs and options, please contact us or schedule a brief intro call with a Cloud Advisor.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

PC Continuity Means Business Continuity

PC ContinuityIn today’s fast-paced business world, the ability to maintain continuous PC operations is crucial for your business. With limited resources and manpower, you cannot afford to lose data or prolonged downtime. A crashed laptop can take 4 or more days to repair (or replace) and rebuild. The impact on your ability to serve your clients, manage marketing and sales, and invoice will be operationally and financially disruptive.

Backup Covers the Basics

Backup solutions are foundational to business continuity, particularly for small enterprises. A reliable backup service ensures your critical data is secure and recoverable. Having backups off-premise, or in the cloud, extends your protection to physical hazards that can damage local backup systems.

Backups, while essential, come with challenges.  Before you restore, you need to repair or replace damaged equipment. This takes time. Restoring from the cloud is limited by bandwidth. This takes time.  Repair and restore gets you your data back, but slowly. Meanwhile, you will struggle to run your business.

Unique IT Challenges

As a sole practitioner or other very small business, you face unique IT challenges. With limited devices, a single computer failure can bring your business activities to an abrupt and extended halt.

Unlike larger businesses, you likely don’t have the budget to keep spare equipment on hand or to quickly purchase replacements.

As a small business leader, you want, and need, to strike a balance between risk, protection, and budget.

A Solution Set for Smaller Businesses

Fortunately, you have service options that help minimize your risk for business disruptions due to PC problems. 

PC Continuity

You can overcome the challenges and limitations of backup/recovery solutions without breaking the bank. PC Continuity solutions enable you to keep your business running while your PC is repaired or replaced and restored.

PC Continuity captures full images of your device multiple times per day. When needed, the image loads and runs on a virtual desktop in a cloud data center. You can access your system’s image from any device with a web browser or a thin client agent.

With PC Continuity, you can return to work quickly. For a small incremental fee above your backup/recovery service, your business keeps running.

Monitoring and Management

Ensuring your computers are current with respect to patches and updates helps ensure optimal performance and security.  Monitoring for system performance can also flag hardware issues before they cause damage or fail.

Remote monitoring and management services track the health of your computer and can alert your IT service team to issues and conditions before they become problems. The service allows for managing system and software updates and can provide remote access to your IT support team when needed.

Lifecycle Management

Larger companies use lifecycle management to manage their computer purchasing and upgrade cycles. For small businesses, lifecycle management focuses on extending the lifespan of your devices and understanding when it is best to upgrade or replace aging systems.

Besides tracking age and warranty status, these services can include extended warranty and accidental damage coverage plans.  These coverages provide repair or like-device replacement.  Having extended warranty and accidental damage coverage reduces the risk of maintaining older systems. In the event of an expected failure or accident, you can avoid early replacement costs.

Some lifecycle management services include certified electronics disposal, helping you avoid e-waste compliance issues and disposal fees.

Your Next Steps

Understanding the risks and impact of PC/Laptop problems, you should decide the value of the various levels of protections.  While protection and continuity services come at a cost, a single incident with your PC or Laptop can cost you in days of lost productivity, damaged or lost data, and thousands of dollars.

To assess your risks, protections, and business continuity needs, please contact us or schedule a brief intro call with a Cloud Advisor.  The assessment is free and without obligation.

About the Author

Bill Seybolt bio pictureBill is a Senior Cloud Advisor responsible for helping small and midsize organizations with cloud forward solutions that meet their business needs, priorities, and budgets. Bill works with executives, leaders, and team members to understand workflows, identify strategic goals and tactical requirements, and design solutions and implementation phases. Having helped over 200 organizations successfully adopt cloud solutions, his expertise and working style ensure a comfortable experience effective change management.

library

Nothing Found

Sorry, no posts matched your criteria

Webcasts

Keep IT Simple

(1/25/2022) – Solid IT services are critical to your success, but they consume your time and budget. Using managed services ensures you have effective and affordable services and frees up time and money to focus on your core business activities.

2022 is Here; What’s Next?

(12/14/2021) – COVID-19 triggered fundamental changes in the economy, markets, and society that alter the way we need to operate our businesses and work as individuals. Explore ways small and midsize businesses can better leverage technologies and resources to respond to these challenges.

Four Cornerstones for Cloud Security

(11/16/2021) – Four security cornerstones create a solid foundation for your cloud security. Assess your security footprint; Identify security gaps; Prioritize changes and security services.

Cloud File Services

(10/19/2021) – Moving to a managed cloud file service can improve access, productivity, and resilience without sacrificing security and budget.

Manage Cloud Services Primer

(9/21/2021) – Managed Cloud Services differ from traditional managed and “break-fix” services. Explore how, beyond cost savings, Manage Cloud Services offer strategic security, services, and business advantages.

Your Transition to Google Workspace

Map your transition to Google Workspace: Understand the changes in features/functions and the cost impact for your business.

Small Business Guide to Cyber Threats, Security, and Response

(6/15/2021) – A practical guide to cyber threats and security. We will share data that quantifies the most prevalent types of risks and will outline practical, reasonable, and affordable steps you can take to both protect your business and, should an attack succeed, respond and recover.

Productivity Suites: Google and Microsoft Revisited

(5/18/2021) – Take a fresh look at Google Workspace and Microsoft 365 and how each might best serve your business. Rather than a feature-by-feature comparison, we take a strategic look at positioning, architecture, services, subscription options, and integrations.

Next Normal: WFH and Remote

(4/20/2021) – We explore how Work From Home and remote workers alters your IT service needs. Taking a holistic view, we look beyond using apps and accessing files, discussing factors that protect your business and support productivity

Next Normal: Apps & Servers

(3/16/2021) – COVID-19 and the events of the past 10 months have, and continue, to change the way we run our businesses. Explore how your team accesses the applications, systems, and data they need to succeed, whether in the office or working remotely.