Will Your Business Be Impacted by the End of Microsoft Exchange 2010?

End of support Microsoft Exchange 2010

End of support Microsoft Exchange 2010

Will Your Business Be Impacted by the End of Microsoft Exchange 2010?

Exchange 2010 has been a great program for businesses for many years, but its time is now winding down. Find out what this means for your business. 

All good things must come to an end. For Microsoft Exchange 2010, that end will happen at a date in the very near future: January 14, 2020. Migrating away from an integral piece of business software can take some time, so if you’re not already planning this shift for your business it’s time to get started! While Microsoft is encouraging people to shift away from the perpetual license option and go towards Office 365, you can also move to Microsoft Exchange 2016 if you don’t want to move to the cloud. At the end of a product’s lifecycle, the manufacturer determines that the vast majority of individuals and businesses have already moved on to a new platform, and they stop providing new features, security and bug fixes, time zone updates and support. In today’s world, your email server is your first line of defense against malware and ransomware — making the lack of security updates a key reason for taking the time to upgrade before time runs out on your support.

What Does the End of a Software Lifecycle Really Mean?

As with most software companies, there are several stages in the lifecycle of Microsoft Exchange and other Microsoft Office products. They are generally defined as mainstream support, extended support and service pack support. Mainstream support is generally guaranteed for a minimum of five years after product ships and is valid while the vast majority of people are still actively using the platform. Extended support generally lasts another five years, and includes a more limited support infrastructure. There are limitations on the work that the software teams are willing to do on products in this stage of life: non-security hotfixes are not released and there are no new functionalities added to the platform. While the platform is still considered secure and supported, this stage is an indication that it’s time to start your search for what comes next. In the final stage, you only receive critical security updates and little else in terms of support.

Why It’s Time to Move On . . . Quickly

Exchange 2010 doesn’t support an in-place upgrade, meaning you’ll need to find the time and IT staff hours to migrate completely — setting up new servers and mailboxes if you decide to go the route of another perpetual license option. Moving to Office 365 may be a good option for your business, but there is still a bit of setup required before you can make this move. With only a few months left before security updates are no longer provided, many organizations are scrambling to be sure they beat the deadline and maintain a platform that is fully protected and receives regular security patches. Email is a mission-critical application for your business, making it crucial to ensure that you’ve made a decision and have a game plan in place long before January 2020.

Upgrade Options Available

There are a few different ways to get out of the woods if you’re still running Exchange 2010. It may seem intuitive to simply upgrade to Exchange 2013, but that product has already completed Phase I and II of its lifecycle and is no longer receiving cumulative updates. Exchange Server 2016 is a better option if you prefer to stick with perpetual licensing models, but the product is already several years old. Updating to the most recent version of Exchange 2019, which was released in late 2018, seems like the best option — but it’s important to note that you must first upgrade to 2016 before making the jump to 2019 versions. Moving to Exchange Server 365 may provide a range of benefits for your organization such as better integration, improved security and continuous updates but it’s also important to note that there are additional decisions to be made around the other aspects of Office online.

Finding the right solution for your business does take time and analysis, but it’s vital that you take the first steps soon to reduce the risk to your organization. Critical patches for Microsoft products are released on a fairly regular basis, and your business can be opened to cyberattackers if you miss a single update — much less several security updates. Completing your migration will provide your technology team with peace of mind knowing that your most important channel of business communication is fully protected by an up-to-date Exchange server.

How to Protect Your Business from SHTML Phishing

Email Phishing

Email Phishing

Protecting Your Data from SHTML Phishing

Data security is vital to any business. Learn how SHTML phishing works and how to minimize the risk of your data falling into the hands of attackers.

Email phishing has been in the playbook of hackers since, well, email. What’s alarming is the scope in which criminals can conduct these attacks, the amount of data potentially at risk, and how vulnerable many businesses are to phishing attempts. Here’s what you need to know to spot the hook and protect your data from being reeled in.

How Does Email Phishing Work?

A phishing email typically contains an attachment in the form of a server-parsed HTML (SHTML) file. When opened, these shady files redirect the user to a malicious website often disguised as a legitimate product or service provider. The website then requests sensitive information such as the user’s address, date of birth, social security number, bank account number, etc. in exchange for providing said product or service.

Users who comply end up giving their information to a criminal who may then sell it to various illegal organizations. Victims may end up losing money and having their identity connected to criminal activity. The attackers may even offer to sell the information back to the owner for a hefty ransom. For businesses, the damages can be irreparable. Phishing is often the launchpad for large-scale cyber attacks, and businesses that fall victim can lose not only cash and assets, but the trust of current and would-be customers.

Who Does SHTML Phishing Target?

While many individuals fall victim to phishing, the main targets are businesses in the banking and finance sector. The sender may use a seemingly legitimate email address, often posing as a trusted, reputable organization. They may goad users to open attachments by claiming to be the IRS, a wealthy businessman offering a lucrative deal, or, ironically, a security provider offering to scan the user’s computer for vulnerabilities. While many phishing attempts are obvious, some can be convincing, and all it takes is a hasty click to give the phisher what they want.

Types of SHTML Phishing

Depending on the attacker, a phishing attempt can range from simple and generic to detailed and personalized to fit the target. For businesses that conduct large quantities of transactions, a phisher may send a simple email claiming to provide a receipt for their purchase. Others may send invoices. Sophisticated attackers may gather information about the business including its suppliers, partners, and even names of individual employees. They may then create fake accounts disguised as these trusted entities, fooling the target into giving away sensitive data. While most phishing attempts fail, a convincing premise combined with a busy, distracted user can equal success – and disaster.

Potential Signs of SHTML Phishing

Being proactive and training your employees to spot phishing is the best line of defense. Here are some potential red flags that may, but not always, indicate that an email is a phishing attack:

  • Poor spelling and grammar
  • Strange characters and punctuation
  • Email addresses comprised of a seemingly random combination of letters and numbers
  • Emails claiming to offer large sums of money
  • Emails claiming that you owe a large sum of money
  • Emails claiming that your data is at risk and offering protection
  • An overly lengthy or short email body
  • Attachments with file types you don’t recognize

How to Protect Your Business from SHTML Phishing

While there’s no way to guarantee that your business will be 100% safe from phishing attacks, you can take precautions to greatly minimize your risk of becoming a victim. Many email clients have rules that automatically filter out suspicious or spam emails. Savvy IT professionals can create additional rules to identify and block phishing emails.

The greatest defense is training every employee to recognize the red flags, especially the not-so-obvious ones. Make basic data security a part of the onboarding process, and hold presentations and seminars several times a year to keep employees aware and bring to light any new threats they should look for.

Data security is more relevant than ever, and businesses need to stay up to date on the latest cybersecurity threats. Is your business taking the necessary precautions to keep phishers away?

5 Incredible Benefits of Effective Managed IT Services

Business Meeting Talking About Managed IT Services

Business Meeting Talking About Managed IT Services

5 Incredible Benefits of Effective Managed IT Services

Managed IT services are one of the many ways an organization can choose to handle their IT needs. With managed IT services, a third-party handles the entirety of the tasks and responsibilities regarding managing IT and keeping the company running. The difference between this and many traditional third-party services is that it’s provided for a set cost. Instead of having access to an hourly consultant rate, you’ll be paying a flat rate monthly (or annually) in exchange for total coverage.

Every arrangement is slightly different and must be outlined very clearly in the Service Level Agreement (also known as the SLA). This document will arrange not only the cost structure, but also the exact services that are included in the partnership, and the metrics that are used to define success or failure.

There are many reasons that companies elect to go with managed IT services to handle their day-to-day needs. Here are five of the most compelling reasons:

1. Provides Total Alignment Between Both Parties

In a managed services agreement, both parties are aligned for maximum efficiency and performance. Since it’s not an hourly rate, the third-party is incentivized to handle your IT in an efficient and effective manner. Otherwise, they have to spend more time and manpower resolving your issues, which brings down their effective hourly rate.

Additionally, if they don’t live up to the metrics set forth by the SLA, they may be liable for penalties or even complete termination of the contract. In this way, it’s in both companies interest to do the very best job possible.

2. Focuses on Being Proactive versus Reactive

If you’re paying by the hour, the services you’ll receive are going to be reactive. When your company notices an issue, they’ll reach out to the third-party to help fix it. Managed services provide proactive support. Since they’re working for you no matter if there’s a problem or not, much of their time is spent preventing problems in the first place. This results in much smoother daily operations and the avoidance of problems that could potentially hurt your businesses but would be unavoidable with another type of arrangement.

3. Contains Simple Cost Structure

The simple cost structure of managed IT services will be much appreciated by your accounting department and whoever is setting the budget. Instead of seeing costs vary wildly by the amount of support required in a particular month, the amount will be a flat fee. You’ll also likely save a great deal of money versus hiring a fully functional team in-house since you won’t need to pay for things like recruiting, onboarding, benefits, and continued training.

4. Makes Projects Easier to Manage

When you need to roll out a brand-new technology or simply update an existing one, it can take a great deal of time and resources. This is especially true if the third-party isn’t used to the way your business operates each day and has to fit the entire roll out into a small window of time. If you have continuous support, however, it’s a much more manageable process. They can work on the project when they have a spare moment in the day. Since they’re fully integrated into your day-to-day processes, they’ll have a much better idea of how to implement a new system from end-to-end, including training and providing post-launch support.

5. Offers Access to True Experts

Unless you’re a massive organization, it’s unlikely that you can afford to recruit, train, and maintain the very best in the IT field. With an agreement with a top-notch IT firm, you gain access to experience and perspectives that you would be unlikely to otherwise access. These talented professionals will be able to help you with all of your IT needs, from daily maintenance to improving upon your existing systems and processes.

Managed IT services are only one of the many ways that a company can choose to handle its IT needs. However, it offers many advantages over some of the other options, including handling IT in-house and going with an hourly consultant-based fee schedule. If you believe that your business could benefit from controlled costs, improved support, and access to an incredible variety of IT talent, managed IT services might be the best option for your business.

What Is Network Segmentation?

Email User On Segmented Network

What Is Network Segmentation?

Businesses that offer WiFi to their customers or have sensitive data needs should consider network segmentation as a necessary component of their IT solution.

Email User On Segmented Network

With network segmentation, your wireless services are separated into different parts, allowing you to better control access and data flow.

Network segmentation splits your wireless services into different segments or subnetworks. By establishing separate networks, you significantly reduce your company’s security risks.

Instead of putting all your corporate and guest traffic on the same WiFi network, segment the activity to keep sensitive data apart from visitors, reduce risk.

Why?

When devices are connected to the same network, by default they can “talk” to other devices on the same network. That increases the potential for devices to listen to network traffic without any rules or monitoring in place.

The risk is lower if all the devices on your network are trusted and managed by your company. However, you could have a problem when less trustworthy devices are connected, such as guest and visitor smartphones, legacy computers and servers, or employee personal devices.

How Does Network Segmentation Work?

Network segments are designed with their own hardware and only allow credentialed users to access the services. Rules are built into network configurations to determine how devices on subnetworks can connect with each other.

Network segmentation limits the impact if there is a system intrusion by containing the threat within a subnetwork.

What Does a Typical Segmented Network Look Like?

For many small- and medium-sized businesses, there is only a need for a simple, two-subnetwork structure. A corporate subnetwork would be used for company-owned and -managed devices, providing access to the internal company subnetwork and, through a firewall, to the internet.

A guest subnetwork would be built to provide access to the internet only, also through a firewall. It keeps those guest devices disconnected from the corporate subnetwork from the start. Employee-owned devices can also be connected to a guest subnetwork.

Your business, whether it’s a medical practice, retail operation, auto dealership or professional services firm, may want visitors and guests to have WiFi access. It’s an appreciated service for those who need connectivity and do not want to use up their allotted data. If that service is the expectation or norm, you want to make sure it’s done carefully.

What Are the Security Benefits of Network Segmentation?

Security is the primary reason to choose network segmentation. The benefits are considerable

  • Stronger Security Standards. Segmentation allows you to better protect your most sensitive data. With layers of separation among your segmented networks, you’re putting up additional barriers to all users — whether well-intended or not.
  • Slowed Access for Attackers. If there is a breach to one segment of your network, it will be more difficult and take more time for the attacker to reach other parts of your system.
  • Minimized Threat from Outside Devices. Outside devices may have been hacked for the sole purpose of accessing corporate networks when connected. Often hackers install programs that lie dormant until connected to a wireless network. If compromised guest devices are contained within a subnetwork, the impact is minimal.
  • Better Policy Development. Strong network segmentation means your company can better restrict user access. Using a policy of least privilege lets you limit user access to files and systems to only what’s necessary.
  • Limited Damage. Network segmentation lets you reduce any damage inflicted by successful attacks. A breach to a single device within a subnetwork will mean less time and money to repair the damage of a widespread, system-wide assault.
  • Improved Performance. An added benefit of having segmented networks are the performance gains. With fewer devices on each subnetwork, local traffic is minimized and broadcast traffic can be isolated and prioritized.

What’s Needed to Start Network Segmentation?

If your internal IT staff does not have experience with network configuration, it’s a smart move to work with a local managed services provider to complete the project. Your business should do the following in preparation for a segmentation project:

  • Identify your network and data security needs, including the sensitivity of data you use and the business impact of compromised data and system downtime
  • Know where the data you want to keep safe is stored and how they could be separated
  • Determine who needs access to information on your network and limit access to only what is necessary by department or role
  • Identify those who will be responsible for monitoring and maintaining your network. A managed IT services company can do both remotely with net-generation firewall solutions

Network segmentation is a strategic move to keep data protected and accessible only by those who need it.

How to Know When to Outsource IT

Group of people discussing Outsourcing IT

Nearly every company must now rely on technology on a daily basis. For most companies, the role of technology will only grow in the future, making it even more important for all companies to have the tech support they need at all times. Depending on the situation, companies may hire employees to handle IT in-house, or they may outsource IT to a third-party provider.

Group of people discussing Outsourcing IT

The information below will help you determine whether it is time for your business to consider IT outsourcing.

Benefits of Outsourcing IT

Before you can decide whether outsourcing is right for you, you must first understand the reasons you might choose this path. Below are some of the potential benefits of outsourcing IT:

  • Fewer headaches – When you outsource IT, you no longer have to worry about maintenance, upgrades, repairs or any other technological problems.
  • Fewer expenses – Outsourcing IT is cost-effective, as you won’t have to pay for full-time employees to handle IT.
  • Scalability – Outsourced IT services can be scaled up or down to meet your needs as your company evolves.
  • No interruptions – When IT is outsourced, you won’t need to deal with downtime or other workflow interruptions related to IT issues.
  • Better use of in-house resources – Many businesses delegate IT responsibilities to existing employees when they can’t afford to hire full time IT personnel. With outsourcing, you will no longer need to split your employees’ focus in this way.

Downsides of Outsourcing

Although outsourcing IT offers several benefits, there are downsides as well. For example, you won’t have as much control over your operations as you would have if you kept IT in-house. In addition, if your provider is in a different time zone or has a heavy workload, communication can be problematic. Finally, if your business is small, outsourcing may be too expensive.

Should You Outsource?

Deciding whether to outsource IT to a third-party provider can be a challenge for any company, and there are many factors to consider. If you aren’t sure whether outsourcing IT is right for your company, simply compare your options and weigh the pros and cons. Remember to evaluate the potential for cost savings, as well as the impact on your day-to-day operations. It’s also a good idea to learn about the services available to you so you will know what you should expect if you choose to outsource.
If you decide to proceed with outsourcing, it is important to consider multiple providers before making a selection. Choosing the right IT provider can make all the difference in the success of your company. Remember that the cost of outsourced services is not the most important factor. Making sure that you are receiving reliable, high-quality services is essential. Interview each of the providers you are considering and ask them about the services they provide, the fees they charge and the customer support they offer. You should also read reviews from past customers to find out how others have felt about the services they received from the provider in question.

Microsoft Office 365 and Your Business: Boost Productivity with the Right Tech Tools

Modern Workplace

Office Workers In A Modern Workplace

Microsoft Office 365 and Your Business: Boost Productivity with the Right Tech Tools

The workplace is becoming more and more digital every day. New tech tools are developed regularly, and most have the same goal—to make your life easier. While some new developments end up making life harder because they are hard to learn, cumbersome, or have glitches or bugs, most are specifically designed to be easy to understand and use. Getting things done faster and more efficiently is a huge driver for technology generally, but that is especially true today.

Defining the Modern Digital Workplace

The “Modern Digital Workplace” is a phrase used today that describes utilizing the technology that is most useful for your team. It helps your team by:

  • Making collaboration easier
  • Training and educating faster and more efficiently
  • Compiling documents and information in an easy-to-use and access way
  • Automating processes, to the extent possible, in a way that make sense for your industry and your team
  • Improving digital processes not only internally, but also with partners, suppliers, and other third parties

Technology, when used properly, can make the entire workplace run in a much smoother, more efficient way. New tools allow your team to meet the needs of customers, and the business as a whole, better. When goals are easier to accomplish, productivity gets a huge boost.

The Obvious Connection: Technology and Productivity

In general, the new digital workplace focuses on improving three key areas of a company. These include the following:

  • Employee Collaboration. When employees can team up and get work done easier, it makes projects faster and more efficient. Sometimes talking to one another is the best way to come up with new ideas and simply ensure that everyone is getting their job done effectively and promptly. Making sure that information and the ability to connect with one another is all on one platform is one of the best ways to encourage and foster this type of collaboration.
  • Content Collaboration. Many teams work on the same content at similar times. Being able to share documents, files, and even external information at the same time can be a huge time saver within a company.
  • Business Application. Administrative processes, such as workflow, forms, and rules, can often be automated in a way that cuts down significantly on processing time and time spent requesting or obtaining status updates. Even something as simple as creating digital versions of forms and allowing employees or third parties to input the information themselves can be a huge time saver in many industries.

Transparency regarding work product and processes is one of the most effective ways to ensure that your team is getting their work done and creating a final product that is the best version that you can provide.

Certain technologies often focus on a different area of these three overarching ideas. Some attempt to address all of them, while others target just one or two sections of particular concern. When all three can be addressed, you have a powerful system that encourages accountability, efficiency, and, in turn, productivity.

Office 365’s Role in the Modern Digital Workplace

Office 365 has been created with the Modern Digital Workplace in mind. It is specifically designed to address these three major concerns in an easy-to-use way.

While Office is commonly associated with their most popular programs, like Word, Excel, and PowerPoint, they have a whole host of programs that can significantly boost your team’s productivity because they make collaboration and transparency ridiculously easy.

Outlook

Microsoft’s email program, Outlook, has been a staple for many businesses for years. Outlook is more than just email, however. Users can use the calendar to schedule meetings and create task lists. They can also create contact lists and share documents through OneDrive. Outlook’s key focus is employee collaboration.

Microsoft Teams

This relatively new feature allows employees and third parties to chat, share documents, work on documents at the same time, schedule meetings, have audio and visual video calls, create notes, and more. It is also integrated with several very popular apps and services, including OneDrive, SharePoint, Yammer, Dynamics 365, and Skype.

Delve

Microsoft Delve shows what your team is working on, popular documents, and provides insightful information to workers who might be interested in them. Employees develop profiles, and they can find and organize information based on interests. It also allows workers to search for documents that are connected through SharePoint and OneDrive.

Yammer

Yammer is similar to a social networking site, but it is limited to your employees and other workers. It is designed to encourage communication throughout your organization. Its focus is on ensuring that information is accessible and shared at virtually every level.

Microsoft Planner

This tool allows your team to create new plans, assign tasks, share files, and organize projects. You can easily see what people are working on and get updates on progress for various tasks. This type of open communication makes assigning projects and getting status updates easy and more efficient.

SharePoint and OneDrive

OneDrive is a straight-forward means to share files, both internally and externally. SharePoint uses sites and files, team news, lists, libraries, and more to encourage collaboration on documents and files. Both are based on sharing information in the cloud.

Microsoft Flow

This tool is focused on making internal processes easier and more efficient. It helps automate and exchange data. It has built-in alerts and notifications to help address organizational processes like approvals, multi-stage processes, and more.

Using Office 365 to Help Your Business

Every company is different. Office 365 has enough unique tools focused on making your company better that you are bound to find something that fits well for your needs. Encouraging collaboration and automated processing can lead to huge productivity boosts for your business.

Why Is Wi-Fi So Slow on My Phone?

Wifi slow

Wifi slow

Just about nothing is more frustrating when using a smartphone than connecting to a sluggish or broken Wi-Fi network. In most places, mobile data is so effective and speedy these days that we just can’t accept a Wi-Fi network performing worse than our mobile networks can.

If you’re dealing with obnoxiously slow speeds on your mobile phone, here are some tips to try.

1. Isolate the Problem

Your first step is to isolate the problem. First, toggle off Wi-Fi altogether. Does your phone respond quickly with Wi-Fi turned off? If so, you’ve determined that Wi-Fi is the problem. You can skip to step 2.

If your phone is still sluggish with Wi-Fi turned off, it’s time to check whether the problem is your connection or the device itself. Use a speed tester, like the app from speedtest.net, to see how fast or slow your cellular connection is. If you get a bad result, you’re likely in a bad coverage area. If you get a good result, though, then your phone’s sluggishness isn’t related to your internet speed. Chances are there is something wrong with the device itself, or perhaps it’s just too old and needs to be replaced.

2. Check Your Router Location

Next, check your router location. Wireless routers have range limits, too. If you’re far away from your router or if there are thick walls or furniture between you and your router, your speed will be diminished. Try operating right next to the router and see if your speeds improve.

The best location for your wireless router is the center of your home or office, away from any walls or furniture. Of course, this is rarely practical. Get creative and find an inventive way to place your router in a good location.

3. Check Router Strength

All routers have limits, and some have a stronger broadcast strength than others. If improving your router’s location doesn’t do enough, you may need to upgrade to a model with a greater range.

4. Watch Out for Noise and Competing Networks

Certain electronic devices create noise that can weaken your Wi-Fi network’s performance. Anything that emits wireless signals or even electromagnetic radiation can interfere. Cordless landline phones, walkie-talkies, and even microwaves can interfere. Position your router away from devices like these.

You also want to watch out for competing networks. The more wireless networks are competing for the same spectrum space, the worse the performance. In a high-density situation like an apartment complex, you may encounter this kind of network crowding. Your wireless router has the ability to change which portion of the wireless spectrum it uses. Review the documentation that came with your router to learn how to do this. You may want to download a Wi-Fi analyzer app to help determine the best spectrum space for you.

5. Consider Network Congestion

Another reason for slow Wi-Fi is network congestion. Your home or business internet bandwidth has its limits. So does public Wi-Fi.

On a lower speed home network, consider who else is using your connection and what they are doing with it. Gaming and streaming can eat up a lot of bandwidth. Perhaps your Wi-Fi is slow because others are using up all your bandwidth. The same principle is in play with public Wi-Fi networks.

If you’ve tried all these steps and still aren’t getting the performance you need, give us a call. We can help you solve your connection issues!

What Are the Chief Benefits of Cloud Computing?

Cloud Computing

Cloud Computing

Chances are, you already use cloud computing in your personal life with applications such as Facebook, Gmail, and Dropbox. But what about your business?

According to a recent study, 31% of companies still don’t use cloud computing to organize and operate their business. Although some of these companies stated they plan to implement cloud computing at some point in the future, this still leaves a large margin of businesses who are, dare we say, living in the dark ages of information technology.

Numerous misconceptions about cloud computing are usually to blame for this. Ahead, we’ll dismantle these concerns by detailing the most potent benefits of using cloud computing in your business or organization.

Top Benefits of Cloud Computing

1. Access From Anywhere

One of the most useful benefits of the cloud is the ability to access your company’s data, software, applications, and more from anywhere in the world. As long as you have an Internet connection, you’ll be able to access the cloud.

For certain businesses, this provides the ability to hire remote workers. Employees, likewise, generally enjoy the ability to work from home or remotely at their leisure. On business trips, huge amounts of equipment aren’t necessary when all necessary data and services can be accessed via any WiFi connection.

2. Always-Up-to-Date Software

Many programs that your business may require will need occasional (or seemingly daily) software updates to continue to run properly. Instead of having to allow and wait for these updates every time you log on to your computer or an individual program, cloud-based software automatically updates and refreshes (unless you tell it not to).

For employees and your entire business, this means valuable time saved. Furthermore, as a result, fewer IT resources and in-house specialists are required to oversee updates and server maintenance.

3. Loss Prevention & Reliable Backup Protection

With cloud-based storage and computing, much less data will be lost from careless errors, computer glitches, or malicious software (malware). Furthermore, in the event of an emergency, cloud-based storage allows for immediate backups to be procured and implemented.

Formerly, backing up entire collections of data and programs would take an immense amount of time and take up valuable space. As a result, many companies did not perform routine data backups and were thusly in big trouble when problems would inevitably arrive.

4. Added Security

Security is a major issue when it comes to cloud-based storage and cloud computing as many company heads and managers falsely believe that the cloud is more susceptible to security problems than in-house data storage on servers.

Actually, cloud security is extremely effective and robust. That’s because maintaining adequate security is one of the most important responsibilities that a cloud host has. Likely no one is more efficient at security than the leading cloud hosts.

Furthermore, many security issues actually arise from internal theft. In these situations, off-site data storage is much more effective than on-site server storage.

5. Saved IT Costs

While it is true that switching from in-house data storage to a cloud-based data storage system does come with an initial price tag, the long-term cost benefits of this switch will surely be in your favor. In fact, cloud computing comes with a huge return on investment (ROI) across the board.

For example, starting any new project, backing up your data, and implementing new services and programs can all be completed much more easily with the cloud. Of course, in this way, easier means cheaper.

Instead of having to install important programs and applications on all of your employees’ computers, for instance, the cloud enables you to purchase one cloud subscription for everyone. Within reason, no matter the device, no matter the location, your employees (or clients, customers, etc.) will always be able to access the services of that program as well as up-to-date data.

Furthermore, you only have to pay for the cloud storage you actually need. If you’ll simply be backing up files and keeping inventory information on the cloud, for example, you won’t need to pay for the larger amount of space that might be required to store massive amounts of sensitive data. The price tag of your cloud services will always be catered to your unique needs.

If your company or organization hasn’t made the switch from in-house servers to the cloud yet, consider it a must for your 2019 to-do list. As the business world moves further and further toward complete cloud and Internet reliance, your business will certainly go the way of the dinosaur if you’re not on board.

Which Application Rules Supreme: Outlook or GMail

Office 365 or GMail

Office 365 or GMail

Currently, 30% of email addresses change every year. The majority of these changes are business related. No one wants to deal with the problems that come with changing personal contact information. Quite often, personal emails are attached to personal bills and subscriptions as well.

When the big change happens and it is time to make a move, is usually away from a smaller email platform into one of the two behemoths – Microsoft Outlook and Google Gmail. These two email providers have become the blue chip operators in what is now an essential part of everyone’s life.

What is so good about Outlook in Gmail? Are there aspects of one that makes it better than the other? We are here to look at the subtle differences between the two so that you can make an informed decision about which is better for you.

The Basics

The Outlook and Gmail user interfaces couldn’t be more different from each other. Outlook seems more business oriented on the surface, while Gmail’s UI maintains a feel that you might get from last year’s tech startup. In short, Outlook is Baby Boomer; Gmail is Generation Z.

Outlook is all about add on features while Gmail brings a “what you see is what you get” mentality to the forefront. Both services come as part of a larger suite that make a lot of money for their respective companies. If you go Pro with Outlook or Gmail, you will actually be purchasing Microsoft Office 365 or Google G suite. The first requires an annual commitment, and the second is based on a monthly subscription plan.

The Tools

So the cat out of the bag – Outlook and Gmail are actually loss leaders for the business suites that Microsoft and Google hope to sell to you eventually. Microsoft Office 365 has all of the industry standard programs that we are used to – Word, Excel, PowerPoint and all of the newer injuries that have become business staples such as OneDrive, OneNote and Microsoft Teams.

Believe it or not, Google is actually the challenger brand in this arena. Its Calendar and Hangouts tools are definitely name brands, but other aspects of its business suites such as Keep, Sites, Forms, Drive and Currents have not quite hit mainstream acceptance.

The result is the difference between a set of features that you know and love (Outlook) or a possibly wider and more robust feature set with a learning curve (Google).

Organization

If you are actually doing good business, your email is going to be a place of constantly changing activity. This is your mission-critical location, and some of the emails that you receive are essential in making mission-critical decisions. Keeping your emails organized is one of the most important things that you can do for your business. Outlook and Gmail have two entirely different philosophies for this.

Outlook works on a method of organization that predates the Internet. Its traditional system of folders looks and feels like a file cabinet. Anyone who makes use of Gmail can tell you this is definitely not the way that Google organizes things. Gmail uses labels and tags and allows you to customize your experience much more. If you know what you’re doing, you can quickly tier your email system and get to your most important emails more quickly. If not, then your email will probably look like a jumbled mess every time you open it.

The Company

With such powerful companies underwriting the programs, it is difficult to look past the influence of the brand. When you use Outlook, you have the advantages of Microsoft behind you. One of the most important features that Microsoft offers is the ability to completely delete unread emails from existence. This is simply not possible with Google, although Gmail offers many other advantages that are difficult to overlook. Gmail offers extended power of Google search and all of the associated features that Alphabet has now monopolized, meaning that you have an extremely powerful suite of tools behind you every time you open your Gmail.

So who wins the battle of emails between Outlook and Gmail? This is actually a question of your business philosophy. If you like more traditional, old-school methods of thinking and organizing yourself, the outlook is probably the brand for you. If you are a New Age thinker who wants a personalized digital experience, then Gmail will probably suit you better. There is no right and wrong; only good and bad for you.

How Much Does Managed IT Service Cost In Canada?

Managed Services Pricing in Canada

Managed Services Pricing in Canada

Remember when your parents told you that “an ounce of prevention is worth a pound of cure?” Well… they were right – at least when it comes to IT service. If you ask most IT professionals, they’ll tell you the same. Managed IT Services are more cost-effective than using a time-and-materials approach with Break/Fix IT Services. With Break/Fix you’ll ultimately be paying for a “pound of cure” for the problems that you could have prevented with Managed IT Services. In this respect, Managed Services cost much less.

What Do IT Managed Services Cost?

6 Popular Managed Service Pricing Models

When you call IT service companies trying to find out what they charge for Managed Services, you’ll probably discover that pricing isn’t uniform. The answers you receive may vary and can go from confusing to outright frustrating. Quite honestly, there’s no online catalogue to pick and choose from or one-price-fits-all formula. However, there are six popular IT Managed Service Pricing Models that you can use as a guide.

First, let’s talk about the benefits of Managed Services…

The goal of managed services it to lower your IT costs and keep your technology running at peak performance. Managed Service Providers (MSPs) monitor the health of your IT system proactively. This prevents downtime. Plus, they can fix issues remotely and quickly before you even notice there’s an issue.

  • Because your IT system is monitored proactively, your IT professional is familiar with it. If there’s a problem, they can usually get you back up and running quickly.
  • You have a Service Level Agreement with your MSP that includes all the services and support needed to keep your technology running reliably and securely.
  • You can easily budget for IT services because your costs are predictable.
  • With Remote Monitoring & Management, IT interruptions, downtime and breaches are prevented.
  • You’ll have 24/7 service and access to a help desk that’s staffed by experienced IT professionals. This means you’ll always have immediate, expert-level support.
  • With IT solutions that run as they should, your staff will remain productive. Plus, they won’t have to worry about IT problems and can focus on their work.

What Are The Six IT Managed Service Pricing Models?

  1. Monitoring Only
  2. Per Device
  3. Per User
  4. Tiered
  5. All You Can Eat
  6. A La Carte

What Is The Monitoring-Only Model?

The monitoring-only model provides network monitoring and alerting services. Your Managed Service Provider offers this model to companies of all sizes. Midsized or enterprise companies with in-house IT technicians can also use this service and be alerted when something goes amiss. With this model, there are several service levels offered.

What Is The Per-Device Model?

The per-device model is a flat fee for each device that’s supported in your IT environment. For instance, a basic per-device pricing model might designate a flat price: per desktop/per server/per network printer/per managed network.

The pricing is straightforward to quote, and the monthly service fee gets adjusted when you add or delete devices.

What Is The Per-User Model?

The per-user model closely resembles the per-device model. But instead of being billed per device, you’re invoiced per user, per month, which covers support for the hardware used by each user. The support typically covers commonly used equipment:

  • Office Equipment: PC, laptop, tablet, and connectivity
  • Home Equipment: home PC, laptop, tablet, and smartphone
  • Communication Equipment: hotels and kiosks when travelling

What Is The Tiered Model?

The tiered model is designed to provide bundled packages. With each package, “X” amount of services are included. And as a tiered model, there are three or more bundled package levels, with three or more pricing levels. They usually get labelled as “Gold, Silver, and Bronze” or “Basic, Standard, and Premium.” The premise with this model is simple–when you pay more, additional services are available that aren’t offered with a lower-level bundled package.

What Is The All You Can Eat Model?

The all-you-can-eat model gives you flexibility. Budgeting your IT expenses in this manner enables you to gauge what’s taken place over the past year, and then make calculated IT cost forecasts for the coming year. Typically you’ll have access to:

  • Remote support / On-site support
  • Lab or Bench time / 24/7 year-round support
  • Services during specific hours of the day/particular days of the month

The all-you-can-eat model gives you the ability to genuinely budget your IT support costs over a year’s time with no hidden or surprise fees.

What Is The A La Carte Model?

The a la carte model is unique. With this model where you’re getting individual services. Maybe there’s a specific problem that came up and needs addressing. This is when you pay for the services you need. You can also create a customized IT managed services bundled package that’s tailored to your company’s specific needs or requirements. That’s what makes this model different from an all-inclusive, IT Managed Services model or pre-bundled package.

What About Actual Pricing Ranges?

Actual pricing ranges vary from one jurisdiction to another. But to give you a brief overview of what pricing ranges look like, here’s the breakdown. Just remember that these aren’t actual prices, only pricing ranges.

  • Flat-Based Range: Monthly, quarterly, or annual fee depending on needs
  • Per-User Range: 166–399 CAD per month
  • Per Device Range: 6–133 CAD per month

(approximate costs)

NOTE: An important plus is that with Managed IT Services you can predictably budget for your services because they are fixed per month.

What Do Break/Fix IT Services Cost?

You’ll Find That The True Costs Are Very High

Break/Fix services are reactive. Techs only show up when something goes wrong. This means that your technology isn’t monitored for reliability and security. This sets you up for downtime, and just a few days of downtime can cost you in productivity and revenue.

Not only are you paying for hourly service that you can’t control, but you’re also losing money from IT interruptions and downtime. As a result, many companies end up spending the same amount in a few months for break/fix services than they would for an entire year of Managed IT Services.

Break-fix companies make more money when your technology continues to break. And because they charge by the hour, they have no incentive to fix things quickly. A technician comes and charges you by the hour to make repairs. You might think that this is the most affordable way to go, but it’s not.

It can be like putting on a Band-Aid on problems rather than dealing with the cures. We’ve seen Technology Band-Aids when companies use Break/Fix IT Service, and when we do, the typical result is always the same… wasted time and money.

Break Fix IT is when you use an hourly support service without Service Level Agreements that provide guarantees for problem resolution and uptime — And you can end up with Technology Band-Aids that cost you more in the end.

Issues reoccur when they aren’t monitored and prevented. The problem with this type of service is that you can experience the same issue again. And when you do, your Break/Fix company will come back and charge you again. It’s actually in the Break/Fix company’s best interest not to get to the root of the problem and fix it completely because the more often they return, the more money they’ll make.

When IT isn’t monitored, you’re more likely to end up with security issues. While Break/Fix service might solve the immediate issue, they’re bad for your overall security because your system isn’t monitored 24/7 for threats. If you experience a serious data breach, you could end up out of business due to penalties, litigation and lost customers.

What About Pricing For Break/Fix IT Service?

Here in Canada, a Break/Fix Service will charge anywhere from $75 to $100 an hour, plus travel time from their facility to your office. Plus, keep in mind that not all repairs and service can be handled by just one technician.

Depending on what you require, you may need another tech to help or one who is more experienced and specialized in the IT solutions you use. Now you’re looking at closer to $266 an hour for a team and up to $200 an hour for a specialist.

Remember again, these aren’t actual prices, only pricing ranges.

  • One tech: 75-100 CAD an hour plus travel time
  • Two techs: 199-266 CAD an hour plus travel time
  • IT Specialist: 200 CAD an hour plus travel time

(approximate costs)

NOTE: With Break/Fix Service you can’t predict what you’ll have to pay for. Your costs could constantly change according to what needs to be done.

We hope this helps you make your decision about whether Managed or Break/Fix IT Service is best for your business. Remember, “an ounce of prevention is worth a pound of cure.”