The 2019 Guide To Securing Microsoft Office 365

Securing Microsoft Office 365

Securing Microsoft Office 365

The importance of fully securing Microsoft Office 365 cannot be overstated. Recent statistics show that a hacker attack occurs every 39 seconds. Government agencies and retail, technology and healthcare industries are among the most popular targets, but the truth is that cybercriminals are more than willing to hack into any vulnerable business to obtain valuable customer information and company data.

Thankfully, Microsoft offers an array of tips and tools to help businesses and individuals keep Microsoft Office 365 fully secure. There are also some practical steps a company can take to maintain a high level of security at all times. Following is a comprehensive overview of steps any business can take to fully secure Microsoft Office 365 in 2019.

Use Multi-Factor Authentication

Microsoft highly recommends setting up multi-factor authentication, and it’s not hard to see why as it is perhaps one of the most natural yet most effective ways to protect a Microsoft Office 365 account from hacks. With multi-factor authentication in place, employees will be required to not only type in a password but also acknowledge a text message on their phone to access the company account. Using multi-factor authentication ensures that valuable company data is not compromised if an employee uses an easy-to-guess password and/or leaves the company password written in a visible location. While it is crucial for employees to understand the importance of using strong passwords, a compromised password on its own would not enable a malicious third party to access your data as one would need an employee’s phone as well to gain entrance into the Office account.

Use Administrative Accounts with Care

An administrative account provides managers and executives with additional options, privileges and security features to keep Microsoft Office 365 safe from unauthorized access. However, it is crucial for administrative accounts to be used with care or they can cause more harm than good. Following are some steps every business should take to protect admin accounts from breaches:

  • Set up regular accounts for each admin user. Admin users should utilize their regular account for non-administrative tasks and reserve the admin account for functions that cannot be completed with a periodic report.
  • Have admin users close all unrelated browser sessions and apps before logging onto an admin account
  • Instruct admin users to record out of the admin account after each session.
  • Provide clear guidelines regarding which data can be viewed and downloaded using an administrative account.
  • Use a Cloud Access Security Broker (CASB) to monitor admin user actions. A CASB can detect high-risk activities involving sensitive data and identify unauthorized admin account access attempts.
  • Immediately shut down admin accounts for administrative users who leave the company.

Secure OneDrive

OneDrive has much to offer any business. It enables users to synchronize data across various devices as well as share files with other users. Unfortunately, OneDrive can also provide hackers with easy access to company files. It is not uncommon for employees to download files from a secure OneDrive account only to save the data on an unsecured cloud account or personal device. To prevent this scenario, companies should clearly mark files that should not be downloaded from the OneDrive account. It is also essential for the IT department to:

  • Know what data is being uploaded to and downloaded from OneDrive
  • Be aware of which users have access to information
  • Know which files or folders have shared links
  • Be able to see which devices are being used to access the company’s OneDrive account and pinpoint the geographical location of the devices in question

Protect Email Communications

Every company should use all the tools that Microsoft Office 365 provides to protect the company from email-based threats. The Office 365 Security & Compliance Center enables admin users to block certain types of file attachments that are commonly used for malware or ransomware. It also allows managers to enable Advanced Threat Protection to check email attachments for malware. This protection extends to files in OneDrive, SharePoint and Microsoft Teams, protecting employees who use cloud-based software from breaches.

Furthermore, Office 365 Security & Compliance Center can be used to create an Advanced Threat Protection plan that will stop email phishing attacks

The Office 365 admin center enables IT, professionals, to set up pop-up warnings for employees who are about to download an email attachment. The warning, which clearly states that employees should not open certain types of files from users they do not know as the files may contain malware, can prevent devastating consequences should an employee click on an attachment without thinking. This handy tool also makes it possible for companies to choose which types of files activate a pop-up warning, thus creating an efficient work environment for employees who can freely access safe files without automatically opening ones that could potentially be harmful.

The Office 365 admin center also has tools that can enable companies to disable auto-forwarding for emails. Many hackers who gain access to one company account use this account to automatically forward emails in an attempt to gain access to other user accounts. The emails can be forwarded without the compromised account user being aware of what is going on, making it impossible for him or her to put a stop to the forwarded emails. By disabling auto-forwarding, companies can limit the damage caused should a malicious third party compromise an Office 365 account.

It’s also wise to enable Office Message Encryption. The program is included with Microsoft Office 365 and can be enabled in Outlook for PC. The encrypted email message program allows users to send encrypted emails both inside and outside the organization and it works not only with Outlook but also common email platforms such as Gmail and Yahoo Mail.

Provide Employee Training

An astonishing 95% of all breaches happen due to human error. Busy employees who are unfamiliar with IT guidelines can make deadly mistakes that will cost companies millions of dollars to rectify. Alternatively, many employees who are familiar with IT security procedures may disregard them because they are time-consuming to comply with or because they do not understand the importance of these guidelines in the first place. It is imperative for every single company to provide its workers with comprehensive, ongoing security training to keep systems secure at all times.

What type of training do employees need to fully secure Microsoft Office 365? Following are some important points that should be emphasized:

  • Never use personal devices for work-related tasks. It is all too easy for company employees to merge work-related and personal matters. Important company files may be downloaded onto an unsecured personal laptop, which is then unknowingly breached. A personal smartphone containing valuable business data may be stolen, compromising the company by exposing vital data. Additionally, employees should never email company files to their own personal email account. Many employees do this to work on holidays or on the weekends; however, this move exposes company data to hackers who may be able to access a personal Gmail or Yahoo email account with a weak or easy to guess password.
  • Work devices should never be used for personal matters such as checking a personal email account or social media site. It is all too easy for employees to compromise a company’s entire network by downloading a malicious attachment from a personal email account or social media site.
  • Employees should be taught the right way to communicate with colleagues and superiors. Internal communications should be secure and follow proper protocol to prevent important data from falling into the wrong hands. Employees should also be taught how to spot fake communications ostensibly from management but actually sent by a hacker attempting to access company data.
  • Knowing how to back up important data is yet another aspect of employee security training. Data should be backed up regularly yet in a secure manner so that unauthorized third parties cannot access files as they are being copied to or from a cloud server.
  • Companies should also create a plan for handling a malware, ransomware, DDoS or any other type of cyberattack. Even the best Microsoft Office 365 security guidelines cannot guarantee that an attack will never occur. Employees should know how to recognize the signs of an attack and what to do to limit the damage.
  • New employees will need industry-specific training on how to handle important data. Healthcare companies, for example, will need to ensure that all employees are aware of current HIPAA guidelines regarding patient data privacy. Government entities will need to train employees to handle sensitive or classified information by existing laws and regulations.

Cybercriminals are always on the job, looking for new ways to access company data from Microsoft Office 365 and then misuse this data by offering it for sale on the dark web or demanding a ransom in exchange for returning company files. Given this fact, it is important for businesses to have a plan in place to keep their Microsoft Office 365 accounts secure at all times. The tips mentioned above are an ideal starting point; at the same time, companies will need to customize their approach to Office security to ensure their files remain safe from unauthorized access. It’s also wise to re-examine security guidelines from time to time to ensure that they are still are effective and efficient as they are meant to be.

What Should Be In Your 2019 Technology Strategic Plan

2019 Strategic Plan

2019 Strategic Plan

Making an Ultimate Technology Plan for the New Year

Times are changing. Apparently, this is the case considering we’re about to head into 2019. How is your current technology holding up at your company? If you feel like there are certain things that you need to change up to stay competitive, it might be time to confront this challenge head-on with an ultimate technology plan.

You may not be familiar with how to implement one, but once you learn the basics, which we are going to show you here today, it’s a smooth process that will have you on the road to an overall improvement in every aspect of your offices’ technological needs.

Let’s get started with how to create a technology plan for your company or small business so that when you head into the new year, you’ll be thoroughly prepared to be on the cutting edge tech-wise.

Step #1: Look Over Your Existing Technology

When you look around your small business or office setting, what do you see? Do you see old computers, old printers, and another dinosaur related tech that you aren’t even using anymore? Part of your plan should be to clear out old and outdated tech stuff that you probably aren’t using anymore.

Now is the time to recycle all of that and remove it for good from your workspace. It’s like a breath of fresh air when you clean out old technology this way. The beginning of the new year is the perfect time to do this. You’ll be pleasantly surprised at how much this can help to improve the overall attitude of an office or another work setting.

Step #2: Create an Ideal Budget

Mention the word budget and it always feels a little bit “heavy.” What can you afford? What can you really really afford? Sometimes what you need and what you can afford are two different things.

Create an ideal budget in mind that fits in with your revenue plan. You don’t want to overspend, but you do want to achieve your ultimate technology plan with the right budget in mind. Do the best you can with this.

It may require some research to figure out how to afford the technology items you need, but with the right focus, you should be able to obtain great technology that fits into your set budget.

Step #3: Plot Out What You Need

Figure out everything you need tech-wise and the cost for each item. Put all of it into your plan so that you can visualize having the full scope of your new tech at your disposal.

Don’t leave anything out to figure out later. Make this ultimate technology plan as detailed as possible so that you know exactly what you will end up with to ultimately suit your needs.

Step #4: Implement a Realistic Timeline (3-6 Months)

Most of the time you are going to want to get your new technology purchased over a few months. If you can afford it all at once, fantastic. If not, it’s okay to set up a realistic timeline to obtain everything you are going to need to have updated gear that works for you.

Many companies look for a timeline that extends around 3-6 months. If you need it to be shorter or longer, according to your individual company’s needs, that’s fine too. It all goes back to your budget and what you can afford to do at any one time. Or over a few months if need be. Your finance department will be able to assist you with this part of the technology plan.

Step #5: Write Your Plan Out in Detail

Your plan is known as your “technology vision statement.” Sounds pretty fancy, right? This is going to help you achieve your mission to be updated entirely going into the new year with your brand new technology in place.

You’ll be amazed at how much fresh tech will energize your team. Don’t underestimate the power of renewed vigor and the new year is the right time to have your technology planning accomplished. Set out and do it right so that you are ahead of the game in your industry.

It just makes everything you need to get done go a lot smoother for you and your team. After all the last thing you want as a cutting edge company is to look like you are lagging behind tech-wise. Your clients will pick up on your overall image and tech that isn’t up-to-date looks like an eyesore.

8 Amazing Tips To Take Awesome Photos With Your iPhone

Smartphone photo

Smartphone technology and the internet have made it possible for us to share ideas—and do business—with people all over the world. Learning to use the powerful tools we have at our fingertips more effectively is one of the most significant challenges of our time. Today’s consumers aren’t just looking for products—they are seeking mutually beneficial long-term connections. No matter what your business is, you can increase your sales by using photos to share information about your products, your company, and most importantly, yourself.

The success of Instagram and Snapchat demonstrate that photos are one of the most preferred methods of sharing information and making human connections. People want to feel personally connected to those they do business with, and social media is a great way to introduce your staff to the world. The right photos can reveal their personalities as well as showcase their talents and abilities in a way that words alone just can’t. You don’t have to be an award-winning professional photographer to create amazing photos, either. The following eight tips can help you transform your iPhone camera into the window through which the world can view your company.

How to Get to the Camera Quickly and Never Miss a Shot

The perfect shot never lasts very long. That’s why there’s more than one way to get to your iPhone camera. The fastest, easiest way is to just swipe left after waking the phone. If you are already in another screen, swipe up to get to the control center where the camera icon is located. If you don’t have a camera icon in your control center, you can add it in three easy steps by going to settings, choosing “customize controls”, then choosing “add camera”.

How to Snap a Photo

You can snap a photo by pressing the home button (aka shutter button) while in the camera app. However, trying to hold the phone still while maneuvering your hands towards a button located near the bottom of the screen can be difficult. Luckily, once you have the perfect shot lined up, you can also use either of your volume buttons located on the side of your iPhone to snap the photo. Being able to use whichever method is easiest to access can mean the difference between a good shot and a great one.

Object Placement, Composition, and Symmetry

Your iPhone camera comes equipped with a grid to help you line up your shots more accurately. The grid is also a useful tool for creating more balanced compositions because it breaks the available space into separate parts. To utilize the grid, go to camera settings, find “grid”, and enable it by swiping the radio button to the right until it turns green.

HDR—High Dynamic Range

The right lighting is often difficult to achieve, but the HDR setting on your iPhone camera can help. This setting allows to you reduce distortion of light and dark in photos taken where there are high-contrast light sources. It also helps reveal more details in both light and dark areas. HDR uses a process of shooting several frames in rapid succession, then merging them together to achieve the best effect. In camera settings, the HDR option will be near the bottom. Make sure the “Keep Normal Photo” option is switched on, so your camera will save both versions of your photo.

Automatic Focus and Exposure

Once you have the shot you want, it’s time to lock your focus. To do that, just tap and hold the focus box. When the yellow AF/AE circle slider appears, press it to lock the focus. If you want to adjust the exposure, drag the yellow exposure slider to the right side of the focus box. You will then be able to slide it upwards to increase exposure, and downwards to decrease it.

Camera Modes

Burst mode allows you to take ten photos per second, ensuring that you get just the right one. To go into burst mode, simply hold down the shutter button for a half a second or longer. Portrait mode is perfect for close-up photos that focus on human subjects and don’t require depth of field. This mode also has several special lighting effects, including studio, contour and stage lighting that you can apply either during the shot or afterwards. While the digital simulation of a shallow depth of field may not yield the professional results that a DSLR (Digital single-lens reflex) camera can, the results can still be amazing.

Lighting Effects

The studio light effect enhances highlights. The contour effect creates a dramatic shadow effect. The stage light effect darkens the background. The stage light mono setting transforms a color photo into a black and white photo. To apply any of these special lighting effects afterwards, just press the edit button.

Live Photos

The Live Photos feature. Available on iPhone 6s and newer, creates shots that are part photo and part video. Like video, it can capture both movement and audio. To activate this feature, just tap the circles icon in the camera app. You can then apply different effects to your live photo shots, such as bounce, loop, or long exposure. To access them, just swipe up while you are in Live Photo. Loop plays, then repeats the video, using a dissolve transition. Bounce plays, then reverses, the video. Long Exposure combines all the frames into one blurred image, which is great for moving water shots.

Smartphone photo

These eight tips can help you take better photos with your iPhone camera. But don’t forget that your iPhone also has a front-facing video camera. While photos can capture beautiful moments, some of the best memories your customers will have of your business are the ones you create together. The video camera is excellent for either FaceTime or Skype, both of which provide almost all the benefits of speaking in person. You’ll be able to look into one another’s eyes, see one another’s emotional reactions, and transform puzzled expressions into “Oh!” moments.

Using photos on Snapchat or Instagram, you can introduce your friendly, highly competent staff as well as new products and services. Video capability provides a way to show your customers not just your finished products, but the processes that created them. Affordable prices, quality products, and superior customer service are all important elements of any successful business. However, all other things being equal, the ability to make and maintain genuine human connections is the one element that can guarantee not just short-term profits, but future returns.

Will Cybercriminals Shutter Your Business In 2019?

Cybersecurity

Cybersecurity

If the frightening headlines about massive data breaches were not warning enough, upwards of 60 percent of all small and mid-sized businesses, reportedly shutter within six months of a systems hack.

The leading causes of nefarious systems incursions are reportedly caused by about 25 percent of valued employees repeating the same username and password across multiple platforms. But what remains even worse is that fact that as many as 95 percent of all small businesses lack adequate protocols to safeguard important company or customer information.

In the coming months and years, cyber threats are expected to continue to pose a grave danger to the health and well-being of small and mid-sized organizations. The question business leaders may want to ask themselves is . . . will you join the 60 percent of companies that did not recover from a data breach?

Strengthen Your Business Defenses

Many of the toppled 60 percent may wish they knew then what many know now. That is, the key to cybersecurity does not solely depend on having the best software protections. According to the National Cybersecurity and Communications Integration Center, and Department of Homeland Security, nefarious email remains a primary trap used by cybercriminals and DHS recommends the following safety procedures.

“Never click on links in emails. If you do think the email is legitimate, whether from a third party retailer or primary retailer, go to the site and log on directly. Whatever notification or service offering was referenced in the email, if valid, will be available via regular log on.”

“Never open the attachments. Typically, retailers will not send emails with attachments. If there is any doubt, contact the retailer directly and ask whether the email with the attachment was sent from them.”

“Do not give out personal information over the phone or in an email unless completely sure. Social engineering is a process of deceiving individuals into providing personal information to seemingly trusted agents who turn out to be malicious actors. If contacted over the phone by someone claiming to be a retailer or collection agency, do not give out your personal information. Ask them to provide you with their name and a call-back number. Just because they may have some of your information does not mean they are legitimate.”

As you can surmise, these cyber safety measures do not necessarily rely on the latest antivirus software or systems protections. Hackers continue to take advantage of human oversight and error to infiltrate organizations and pirate valuable personal data and intellectual property. Homeland Security also recommends that business leaders implement the following employee training and protocols to protect against data breaches via email.

  • Maintain Secure Passwords: Change passwords regularly and never share them or provide co-workers with access.
  • Verify Sources: Make certain that emails originate from people and companies within your network by contacting them directly for verification.
  • Nix Auto-Download: Never use automatic download options for email attachments.
  • Never Click On Links: Embedded links are a primary method used by hackers to trip up team members through ransomware and malicious viruses.

Strengthening a company’s defenses begins with employee training and awareness that data breaches are not reserved for significant organizations and Fortune 500 corporations. Hackers continue to troll for low hanging fruit and unsuspecting employees who make innocent mistakes.

Employee Cyber Security Training is Job One

Although ransomware attacks reportedly declined from 638 million in 2016 to 184 million in 2017, according to Statista, this method has been used to target a tremendous number of small and mid-sized outfits.

The common attitude among cybercriminals is that decision-makers will ultimately weigh the cost of paying the ransom against potential profit losses and do the math. Hackers understand that poorly defended organizations are likely to negotiate and pay up. That’s why valued employees must remain vigilant and be a sort of human firewall if you will.

Proactive industry leaders are tasked with training employees and also determining which team members could be considered at risk. An IT support team can utilize training videos, create a cybersecurity policy and implement it by working with groups and individuals. But once the hands-on work has been completed, it’s imperative that companies conduct ongoing cybersecurity evaluations. These are logical methods to consider.

  • Identify team members who could be best targeted by hackers.
  • Deploy unscheduled mock cyber attacks.
  • Create and release convincing but harmless mock ransomware links via email.
  • Require employees to complete cybersecurity training modules.
  • Require advanced training for those who are tripped up by mock cyber attack drills.

We may be living in a golden age of technology, but our everyday fallibility remains the threshold that cybercriminals use to break into our business systems and rob our valued customers and us of critical data. One of the primary ways to avoid joining the 60 percent who are out of business is to make team members aware of cyber dangers and provide them with the skills to combat cybercriminals.

Here’s How Cybercriminals Con Businesses In 2019

Cybercriminals

Cybercriminals

Is someone out there pretending to represent your business to make money? Don’t laugh. It happens. Business identity theft is a growing concern for many companies across the US. According to a recent study by Dun & Bradstreet, business identity theft, also called commercial or corporate identity theft, was up 46 percent in 2017.

The CEO, Mary Ellen Seale, of The National Cybersecurity Society (NCSS) said, “Small business identity theft – stealing a business’s identity to commit fraud, is big business for identity thieves.” However, too few businesses, especially smaller businesses, are aware of the issue. In 2018, the NCSS published “Business Identity Theft in the US” to help publicize the problem, and to provide guidance on how companies can help protect themselves.

Which Types of Businesses Are Targeted by Business Identity Theft?

Corporate identity theft is not just a problem for large corporations or companies operating in a particular industry. It is a crime which can affect any-sized business from tiny Mom and Pop shops on Main St. USA to multinational companies who are involved in any commerce:

  • Small companies are usually the initial victims of identity theft since these companies tend to have more lax security in place and are less likely to realize their information is at risk. However, that doesn’t mean that larger companies are immune from having a criminal steal their identity. Plenty of larger businesses have their identities stolen each year.
  • Corporate identity thieves use the name and legitimate business information of customers of large vendors’ customers to trick them into fulfilling orders. Busy vendors who fail to put into place procedures to verify whether an order is genuine can end up losing millions of dollars a year to these scams.
  • Criminals masquerading as a legitimate business deceive financial institutions to open credit card accounts, establish lines of credit, send or receive wire transfers, and secure loans.
  • The list of victims of corporate identity theft even extends to the US government when criminals use stolen company credentials to claim tax refundable tax credits or to exploit other government benefits for corporations.

How Do Thieves Steal a Corporation’s Identity?

Criminals who steal the identities of businesses have a wide range of methods ranging from very simplistic to highly sophisticated. Many lower level identity thieves focus on email phishing scams which target employees of the company in an attempt to gain confidential information such as database passwords or HR records. Other simple scams use spoofed email accounts of company executives to trick vendors and clients of a company into believing they are communicating with someone from the company. Slightly more advanced scams can include setting up an unsecured WiFi network in near a company in hopes that employees will use it to conduct business and then stealing the data.

More sophisticated scams can include dozens of people, building fake websites, using shelf companies, social engineering and even renting office space at the same location as the targeted company. The goal of these higher level scams is typically to create a plausible “Proof of Right” which the thieves can then use to secure fraudulent loans, masquerade as the company in a business deal, or even sell company assets.

How Can You Protect Your Company From Identity Theft?

While there is no way to protect your company completely from identity theft, you can make it harder for cybercriminals by maintaining proper data protection procedures.

  • Train your staff. Teach your staff how to recognize phishing scams and how to verify when an email is from a legitimate source. Establish procedures on how to handle data correctly, and have a data loss prevention plan in place including a ‘clean desk’ policy.
  • Secure your network. Add additional security to your networks and ensure that everyone is using secured servers. Avoid using a ‘master account’ which allows access to your entire network to limit data breaches. Require two-factor authentication.
  • Monitor your financial information. Check your company’s credit report regularly to ensure that there aren’t any unexpected changes such as credit applications or new accounts.
  • Consider hiring a company to help prevent corporate identity theft. An outside security company is one of the best ways to protect your corporate identity from scammers.

Terminating Your Internal IT Tech: 6 Things You Need To Know

Terminating an IT Guy

Terminating an IT Guy

No one wants to go through the stress of firing anyone, but sometimes you need to let one of your IT techs go. This can leave your company wide open for data breaches. Before starting the off-boarding process of an employee who has access to your entire computer network, having a proper procedure in place can help protect your data. Use these six tips to create a process you can use to safeguard your company’s private information when severing ties with a member of your IT team.

Tips to Terminate an IT Employee Without Risking Your Company’s Information Security

Eliminate the employee’s company network access. It is perhaps obvious fired employees should no longer have access to company computers, but a recent study found that surprisingly almost 9 out of 10 former employees’ credentials were still active for some time following termination. Your business can prevent potential issues by disabling, but not deleting a person’s business account and passwords before firing. You should pay particular attention to blocking any applications which allowed the employee to access your company data remotely.

Prevent access to third-party applications. Access to third-party software connected with your company can be more difficult to contain than access to in-house computer systems. If your former IT employee had access to third-party applications such as Dropbox, Outlook, Sharepoint, Trello, or Facebook, remove the person’s access immediately. This is where the importance of good record keeping is beneficial. Remember to leave your former employee’s email accounts and cell phone number open for a time, but forward emails and incoming calls to another member of your staff to maintain seamless communication.

Recover company-owned property. Before the former employee leaves your premise, take back the person’s company ID, access cards, keys, fobs, cell phones, laptop computers, and any manuals. Your HR department should always maintain a list of anything you give your employees to make it as easy as possible to verify the person returns everything.

Back up the former employee’s work computer. In the rare event that a former employee misuses your company’s data, it is essential for you to have a record of everything the person had access to while employed. Before reformatting the terminated employee’s computer or company cell phone, make a complete backup of the data and maintain the information for a few years just in case the worst-case scenario occurs.

Inform people that the person no longer works for your company. Make sure that all of your employees know that the person left the company and that their former coworker should not be in the office at any time. Ask your employees not to discuss company information with the person in the future. Contact any vendors which the former employee did business with and give them a heads up in case the person tries to contact your vendors for any reason.

Change access codes and locks for your most sensitive areas. If the terminated employee was able to access highly restricted areas in your company, replace locks and create new PINs and door codes. Look into the possibility of upgrading your security to use biometric or individual passcodes to make the process as easy as possible.

In a survey by Osterman Research, Inc., over 75 percent of former employees who retained credentials admitted to at least logging into company computers. Hopefully, your former employee is the rare exception, but the risk is far too significant to do nothing.

2019 Best Practices For Keeping Your Password Secure

Best Practices Password Security 2019

Best Practices Password Security 2019

Every account you have is protected by a password or a PIN of some kind. A PIN is a personal identification number that is unique to the account it is attached to. In some cases, you are allowed to choose your own PIN. For other accounts, you must use the PIN or password that is provided by the creator of the account. Memorizing PINs and passwords is essential if you want to maintain your privacy and keep your accounts fully protected. It’s also vital that you use a few “best practices” when it comes to managing your passwords.

Avoid the Obvious

Avoid using the most obvious choices like your children’s names or notable dates. Choose passwords that would be difficult to trace back to someone or something that is important to you. Choose random numbers and words that can be easily remembered. Hackers who break into accounts will often look through your information to try and find patterns. Random words and phrases are less likely to be picked up within the pattern.

Two-Factor Authentication

Two-factor authentication can involve the use of a PIN and a password, or a PIN/password and a series of security questions. It can also include the use of a security key ( a card that is coded with personal information) and a PIN. The only way to access the account is to have both pieces of the puzzle to unlock the code. If one of the pieces is wrong, you may be locked out of your account until a system reset can be performed.

Separate Numbers and Symbols

Numbers and symbols that are used together may indicate a date or account number. Separate your numbers and symbols to remove any type of familiar sequencing. Alternate numbers, letters, and symbols so that it is difficult to identify any type of common pattern or series.

Use Your Fingerprint to Secure Mobile Devices

One of the best ways to protect your information is through the use of your fingerprint. iPhones can now identify your eye by scanning your cornea. Both of these methods use body parts that are unique to you. No one can duplicate them or alter them in any way. By using a fingerprint or eye-scan to protect your mobile devices, the information stored on that device is protected. You should still, however, change your passwords frequently.

Don’t Use the Same Password for Multiple Accounts

Avoid using the same password for multiple accounts. Choose a new and unique password for each account you have. While it may be difficult to remember multiple passwords, the alternative could mean devastating financial losses. Choose several password and PIN options that can be used effectively. In some cases, you may be able to rotate them. This must be done randomly and without a pattern to maintain the highest level of security possible.

There are ways to protect your passwords and PINs so that you can maintain your accounts and keep them secure. Using a password manager is just one way to secure your accounts. Determine which type of measures work best for you and use them effectively so that all of your information remains protected from outside predators and hackers.

9 New Game-Changing Additions To Microsoft Office 365

Microsoft Office 365

Microsoft recently announced several new updates to Office 365. These updates and additions will help organizations who want to streamline efficiencies and remain compliant with new regulations across numerous industries. The nine key additions and updates to Office 365 will also help organizations effectively manage their digital presence.

9 New Updates And Additions To Microsoft Office 365

The nine key updates and additions to Office 365, include the following features and benefits.

  1. Embed 3-D animations into Word documents and PowerPoint presentations. — You don’t need to know how to code an animation series to use this new feature. In fact, all you have to do is place the 3-D model into your slide, select a pre-built animation, click apply, and instantaneously watch as the 3-D model comes to life.
  2. PowerPoint can transform written texts into readable messages. — Whether you have the world’s worst handwriting or a five year old can draw better than you, PowerPoint is now here to save you time and inevitably money as you create your business presentations. Simply draw out the presentation by hand using a touchscreen tablet. Next, launch PowerPoint and watch as the slides are automatically transformed with digital design recommendations that include layout, icon, and text suggestions. In minutes your handwritten ink can look like something that was designed by a professional artist in the graphic design department.
  3. Save office supplies with the digital pen. — The Microsoft digital pen has all new features that will allow you to save time and resources when editing important documents. Enjoy the speed of simply using the digital pen to cross out paragraphs, circle text, add words, insert line breaks, split / change words, and leave detailed comments.
  4. Transform Word documents into web-ready publications. — To transform your Word document into a Sway website, simply finalize your document, click File, and then click Transform. This feature can also be used to reduce the time needed to create and publish newsletters, training documents, product pages, and pitch decks.
  5. Use blurred background to regain focus on video calls. — The new blurred background features allows video callers to blur their background so that unwanted distractions remain out of sight. The feature is particularly helpful for organizations that have a large remote workforce.
  6. Avoid time-consuming compatibility issues. — Microsoft’s recently released desktop app allows organizations to easily check app compatibility before they complete a system upgrade. This check can save organizations time and money as they keep their systems operating at the optimal capacities, without suffering from incompatibility issues.
  7. More efficiently complete Office 365 migrations with the SharePoint Migration Tool. — The new and improved SharePoint Migration Tool offers a point and click interface that makes it easier for organizations to complete Office 365 migrations. For example, in a few simple clicks your OneDrive files can be migrated to OneDrive for business.
  8. IT teams can more effectively manage and implement business critical resolutions. — The SharePoint Admin Center now allows IT experts to more easily manage Office 365 group-connected sites and hub sites. The update also includes security and compliance enhancements. For example, admins can now restrict or allow access from known IP-addresses, automatically sign-out idle users, and restrict access from non-compliant devices.
  9. Maintain user data compliance. — Office 365 has a complete list of certifications and attestations to ensure that security and compliance are maintained. In this vein, Office 365 recently achieved its HITRUST CSF Certification, which is specifically designed to help health organizations maintain security, privacy, and regulatory compliance.

Microsoft Office 365

The Bottom Line: Microsoft Office 365 Delivers Powerful New Updates

Whether you want to more effectively manage your digital presence or create dynamic PowerPoint presentations in a click of the button, the new updates to Office 365 are built with the business executive in mind. In short, the new updates and additions to Office 365 will help your organization to more efficiently and effectively complete daily tasks that will lead to heightened levels of business success.

How To Explain The Costs Of Cloud Computing To Healthcare Execs

Healthcare IT Costs

Healthcare IT Costs

How Much is Spent Worldwide on IT Costs?

Worldwide IT costs in 2018 hit an estimated $3.7 trillion, up 4.3 percent over the prior year, according to the Gartner, Inc. With so much at stake, it’s essential for all companies that utilize IT to consider the pros and cons of a traditional IT approach versus moving more and more functionality to the cloud. Finance considerations are one of the top considerations, but control over assets and data security are also vitally important. Therefore, it’s essential that the CIO is prepared to talk about the differences in language other executives can understand.

Why It’s Difficult to Explain Cloud Costs to the C-Suite?

CIOs sometimes have a hard time explaining the difference between cloud services (typically a SaaS with monthly operating expenses) and traditional healthcare IT models that may involve paying cash for software and equipment to own them outright (a capital expenditure). This comparison needs to factor in the monthly cost to run on-premise data centers, as well as the allocation of capital expenditures, such as hardware, licensing, etc. Non-financial factors include company policies that favor ownership versus rental models for IT hardware and software. Unless the cloud expense is much higher, the C-suite should lean toward cloud economics as a more strategic approach. It governance policies may also need to be revisited to support cloud computing trends.

Moving from a Cost Center to Strategic Partnership Model?

Healthcare organizations deliver healthcare services but are also digital companies. Cloud computing is now a critical component that brings the latest technology to the table, perhaps improving outcomes. It’s essential to help the C-suite understand this. One analogy that works is comparing it to another service based on consumption. Just as the utility or electric bill varies based on actual consumption, cloud computing cost varies based on changing usage. Building an accurate forecast prepares the leadership team for the hit to OpEx and the P&L. It may still be a tough sell, and the IT team might need some finance talent to track and adjust usage trends to keep the cloud cost forecast up-to-date.

How Can a Flexible OpEx Model Help Healthcare IT?

If a healthcare company needs to change directions fast to incorporate new diagnostic tools, therapies or IT innovations, an OpEx model is the fastest way to respond. Many times, the CIO is seen as someone holding fast to a traditional CapEx model or as someone rushing change before the organization is ready. Instead of letting the decision point be a source of contention, a mix of CapEx and OpEx could be the best answer. In this hybrid model, the decision to use a cloud-based approach versus a traditional on-premise solution would hinge on individual decisions about risk management and financial requirements, resulting in a variety of local and managed private cloud services as well as public cloud services.

What are Some Convincing Tactics for other Executives?

The difference boils down to buying software and hardware at once or paying a subscription. To show healthcare executives the advantages of the cloud, CIOs must demonstrate the benefits of the OpEx (or hybrid) model in a quantifiable way. For example, consider the CapEx model for buying a piece of hardware. The hardware has to be secured and configured, and the terms and conditions must be approved by the legal team before software can be installed. You put out a lot of hard-earned cash and wait months to actually use the product. The process takes months and ties up precious resources. In the cloud model, new solutions are available quickly without the headache of in-house configuration and maintenance. It also gives organizations the ability to scale down as well as up. This agility is something that’s easy to forget because most people associate cloud migration with scaling usage up.

How Can Cloud Solution Be Included in ROI?

Include the following in the calculation of ROI: increased productivity (concentration on core functions), cost reductions, security, network, data storage, and transfer improvements. In a healthcare organization, access is key to improving patient outcomes. It’s important to show how each of these items translates to the ROI. If you can do this effectively, the rest of the C-suite is likely to fall in line with a cloud model.

What Preparation is Needed Before Talking to the C-Suite?

Before speaking to a C-suite individual, the CIO should prepare a model showing the ROI. The presentation should include technical data on cloud-based models that are clearly understood. Documenting a cloud strategy defines the outcomes sought by the CIO, and it’s the beginning of a road map to get there. The CIO’s roadmap should describe how the cloud model will save cost and add efficiencies while improving security and networking reliability. It also has to conform to HIPAA regulations.

2019 Accountant’s Guide to Preventing Technology Headaches

2019 Accountant’s Guide to Preventing Technology Headaches

2019 Accountant’s Guide to Preventing Technology Headaches

Downtime, compromised data, security breaches, and slow-running technology cause big headaches for today’s accountants. After all, you need your technology, and when it’s not working, every hour that goes by costs your firm money.

You can’t afford to sit idle—when your technology doesn’t work, neither do you. If your competitors use more efficient IT solutions, they’ll blow right past you and take your clients away. Or worse, your reputation will suffer.

Technology helps you carry out essential tasks, exercise professional judgment, engage with clients, provide advice, and settle tax issues. If you view technology as an opportunity rather than a threat, your firm will prosper and reap the rewards of your efforts. If you don’t, you’ll fall behind the competition.

You use technology now more than ever—at least, you should. Today’s technology is invaluable, and with time it will become even more so. In the past, the accounting profession lagged behind others in the adoption of new technology. They relied on paper-based filing and printed accounting forms that were time-consuming to process.

Accounting firms like yours have now embraced new technology. Just like other businesses, you need to streamline your services to save time and process accounting information. With modern technology like cloud-hosted accounting software, you and your clients can access data directly and simultaneously. The days of shuffling papers back and forth are over.

However, along with technology-provided benefits come some challenges.

Failed backups, slow-running email, application problems, and operating-system crashes create headaches that set up barriers to your success.

Downtime is a threat—it results in a significant loss of productivity. You can’t afford to be faced with server failures, poor systems performance, accidental file deletions, or software application crashes. Without access to your data, you and your employees can’t do your jobs. Money goes out the window, and you can’t meet your filing deadlines.

Data security is another issue that can cause significant headaches. Client confidentiality is your most important duty. But with hackers and intruders who want to infiltrate your technology for their own financial gain, your technology landscape is like a minefield unless it’s adequately protected.

As a Chartered Accountant, you are governed by Rules of Professional Conduct that always have and will continue to guarantee the privacy and confidentiality of your clients’ personal information. If their financial data is stolen, you’ll face penalties, fines, and possibly civil prosecution. You can’t take that chance.

THE ANSWER IS TO CONTRACT WITH THE RIGHT IT SERVICES PROVIDER.

To prevent IT headaches, you need service and support from an IT provider who understands the Line of Business (LOB) applications you use including your financial preparation and planning software and billing systems that keep your operations efficient.

The right provider can ensure these seamlessly incorporate with other applications you use like Microsoft Office or Office 365. When you have access to expertise from an IT Service Provider who truly understands your needs, you can effectively leverage these powerful tools.

Look for an IT Service Provider who has been serving the needs of accounting firms and corporate accounting departments for years. The best choice is one who can cover a broad range of technology requirements through both professional services and Managed IT Services and who can grasp the complexities your accounting firm faces.

They should be able to help you avoid IT headaches when automating routine accounting processes, sharing financial files, deploying mobility solutions, and capitalizing on tools like electronic filing.

Your accounting practice requires a complete technology management solution including data protection and proactive monitoring of all critical functions on your network, servers, and workstations. Plus, you should insist upon a fixed-cost solution with predictable budgeting. Just as your accountants are committed to your clients’ success, your IT Service Provider must be dedicated to making you successful and view themselves as an extension of your practice.

Your IT Service Provider should be adept with:

  • Cloud Technologies that improve your productivity, efficiency, and security
    With cloud solutions, you can eliminate the cost of paper and the hassle of sifting through files, store massive amounts of information (Big Data), share important files in real time and secure your clients’ information offsite in high-security data centres.
  • Accounting Practice Management Software that helps you run day-to-day operations including the centralization of client data, tracking due dates, staffing, workflow management, automated billing, and time tracking
  • Tax Preparation and Filing Software designed explicitly for accounting firms, so you can analyze different income tax scenarios and have access to the reporting tools you need for fast, easy reconciliation

THE WORST HEADACHES RESULT FROM IT SECURITY BREACHES.

Data breaches are increasing exponentially. Cyber mafias have set up in towns like yours, operating from legitimate-looking offices. Hackers are no longer kids in their parents’ basements working on a few computers. Cybercrime is an international and sophisticated business with cartels operating around the globe.

Your data is valuable, and your accounting firm is a target. You need the expertise of an IT Service Provider who stays up to date on the latest threats. It’s imperative that you protect client information. But IT security best practices change so rapidly that accounting firms often find themselves falling behind the curve. If you do, your firm is at risk of viruses, network vulnerabilities, and data breaches. This results in more than a headache; now, you’re looking at a migraine.

Criminals have many ways of stealing your data.

Internet Exploits

Your employees use connected devices to interact with, track, monitor, and simplify just about every area of their work and personal lives. However, these technologies also provide access to sensitive, confidential information and present a wide variety of new security issues for attackers to exploit.

Third-Party Attacks

Cybercriminals have learned that contractors and other third-party providers aren’t as secure as large vendors, and lower security provides a pathway into otherwise-secure networks. Examine who can connect to your network and access confidential information, even if you believe appropriate security measures are in place.

Social Media Attacks

Social media presents two main security headaches:

  1. A website you visit or service you use can be infected with malware that spreads until your network is ripe for a data breach. Malicious social media content is expected to grow 400 percent as attackers continue to distribute their malware and steal client data.
  2. A determined hacker or team can scrape social media sites to assemble a surprising amount of personal data very quickly. This data can be used to engineer an attack.

Social Engineering Attacks

Human nature is easily the weakest link in any security chain. Was that really a utility-company employee you held the door for this morning? Are your office painters propping open a secure entrance to make their task more manageable? Did your receptionist just give all your passwords and hers to someone who called claiming to be from tech support on another floor? Will your colleague’s curiosity causes him or her to insert the USB key “found” in the parking lot into a computer connected to your systems?

Mobile Malware Threats

Security experts have been warning us about mobile malware threats for a long time, and users have grown immune to these warnings. Mobile-device use is increasing, as is the sophistication of attacks. At the risk of being the boy who cried, “Wolf,” every year a major mobile malware attack is more likely to occur. Attackers typically select the most significant number of potential victims. So, they will target mobile devices, specifically Android and jailbroken iOS devices.

Sophisticated DDoS Attacks

Distributed Denial-of-Service attacks don’t directly steal your information. Instead, they overwhelm your site or service with so much traffic that it prevents legitimate users from connecting. These attacks have evolved beyond simple flooding of traffic. They probe and then morph, based on the defences in place on your network. Such advanced and sophisticated attacks can seriously impair your accounting firm’s operations.

TO PREVENT THESE SECURITY HEADACHES, YOU NEED A SECURITY PLATFORM WITH REMOTE-ACCESS MONITORING AND RELIABLE BACKUP AND DISASTER-RECOVERY SOLUTIONS.

Be sure your IT Service Provider implements innovative, up-to-date security measures to protect your accounting firm against intruders, malware threats, and disasters. And ensure they can do the following things

Ensure:

  • You comply with accounting and confidentiality requirements when using technology.
  • You use appropriate technical means to minimize the risks of disclosure, discovery, or interception of communications.
  • Data and email are encrypted to protect your sensitive information.
  • You adopt management practices that offer protection against disclosure or discovery of electronically transmitted messages.

Prevent:

  • Unauthorized access to your electronic data
  • Computer viruses from damaging your data
  • Natural or manmade disasters from affecting your IT operations

Confirm:

  • Your files are reliably backed up and recoverable.
  • Both offsite and onsite data backups are maintained.
  • Data is restorable by performing ongoing testing.

Provide:

  • Systems Analysis
  • Mobile Device Management
  • Up-to-Date Security Solutions
  • User Support and Training

Your IT Service Provider should implement a security platform with multiple layers of protection, with 24/7 remote monitoring to detect infections and intrusions, and block them before they get in and steal or hold your data hostage. Many accounting firms are unaware that this goes on. Your IT provider will keep you informed and train your staff to recognize threats, so you know what to do if one comes across your computer screen.

Your very most basic security solution should include barriers with virus and malware detection at the firewall level and DNS (Domain Name Server) controls to ensure your users don’t visit hijacked websites. Your employees should also utilize two-factor authentication access practices to prevent criminals from getting into your network.

Nothing is more important than protecting the information on your network and the peace of mind that comes from knowing you can fully recover if a disaster hits your firm. Your IT provider must ensure your business continuity and disaster recovery solutions will meet your objectives and must implement a robust backup and secure off-site replication solution.

While computer systems can easily be replaced, the intellectual property and sensitive information stored on those systems cannot. Computer hard drives can fail, laptops can be stolen or lost, and data can be erased due to human error or viruses. It’s important for your accounting firm to have a backup system to keep data safe and avoid data loss.

Ask your IT Service Provider if they employ system virtualization and a private cloud with a fully redundant system that can be replicated across multiple data centres. If your data is compromised or damaged, a new clone of your system and data can be spun up with a new, fresh image in a manner of seconds.

Be sure your IT provider uses an Intrusion Detection System. This will catch anything that may have bypassed your firewall. They can either be used to find a break-in attempt in progress or detect one after the fact. In the latter case, it’s too late to prevent any damage, but at least you’ll be aware of the problem.

If an intruder gets into your system, the first thing they typically do is install a “rootkit.” A rootkit is a script or set of scripts that can make changes to your IT system and hide in common system utilities. They function in the background without your knowing they are there. Criminals can easily obtain these on the Internet. This is one reason you must have reliable backups of your entire IT system. If rootkits are discovered, you’ll need to re-install your system and data and start over from scratch.

Your mobile devices also require monitoring and management. If a phone or laptop is stolen, you must be able to remotely wipe your confidential data. Mobile Device Management also prevents disgruntled employees from leaving with your confidential or proprietary data.

Your IT Service Provider should also employ encryption to protect your confidential data. They should encrypt both your emails and data files to ensure the security of information. Encryption can protect your data at rest, such as on laptops or portable servers, as well as data in motion, such as over wireless networks or the Internet.

One of the most overlooked security aspects in accounting firms is their creating and retaining policies regarding email and data. You are accountable for instituting and employing a strategy that details the duration over which your client data and emails will be stored and deleted. Ensure your IT provider can implement automated solutions to handle this.

IN CONCLUSION

You understand the unique challenges and technology demands your accounting firm faces. Whether your IT headaches come from the security risks of handling and storing confidential information or the difficulties of keeping up with new, innovative Line of Business Solutions, you need an IT Service Provider who can ease your struggles and your IT headaches.