
Why Businesses Are Outsourcing Their IT Services

Microsoft Teams has quickly become one of the most popular tools businesses are using as employees have migrated to working from home.
How can your business best use Teams and its features to keep employees connected and productive during the COVID-19 pandemic?
Microsoft Teams is a cloud-based tool that combines multiple features in one cohesive platform. It can be used by businesses and organizations of all sizes, allowing for collaboration and communication among internal employees, freelancers, clients, customers and partners.
The application includes versions of familiar Microsoft programs and integrates easily with Office 365, the cloud version of the company’s popular productivity suite. Within Teams, employees can create, post, share and collaborate on Word, Excel and PowerPoint files. In addition, the platform includes voice over internet protocol (VoIP) phone services, videoconferencing and instant message capabilities.
Here are some of the main capabilities:
Teams allows businesses to work across operating systems (desktop versions are available on Windows, Mac and Linux), a web-based app and a mobile app (for Android and iOS devices).
Teams also supports virtual meetings, presentations and webinars, accessible by internal and external participants.
Teams groups users into channels based on work function, special project, responsibility areas or meeting group. Each channel contains a virtual workspace with threaded chats, shared digital files, and space for real-time collaborating tools.
Teams lets you store files within the Microsoft solutions or other file sharing sites like Dropbox or Google Drive. Ample third-party integrations allow you to connect Teams to other popular tools.
There are multiple plans available:
With the rapid deployment of new tools, many of which employees don’t know very well, cyberattacks have increased. Hackers are taking advantage of vulnerabilities and user fears to launch malware that can attack systems and websites, steal data and disrupt sessions. Here are some tips for keeping your Zoom meetings protected:
Microsoft Teams is a powerful tool to help your organization connect, collaborate and communicate.
Does your business use 2FA? With the prevalence of data breaches today, it’s time to start employing this simple security feature within your business.
As a business owner or manager yourself, you are probably concerned about whether your organization will fall victim to the same fate. What can you do to prevent a cybersecurity attack?
You may be surprised to know that the fate of your business’s security probably lies within a straightforward thing that you and all of your coworkers and employees use every day: passwords.
The fact of the matter is that most people in your business are putting your data and systems at risk every day with the weak login credentials they use. That is, many people use the same password for all of their accounts — both personal and business related. Furthermore, many people use passwords that are way too simple and easy to guess by hackers — the name of the street that they live on, the name of their pet, their date of birth, or their anniversary date.
It’s hard to stop people from doing this because most employees don’t think that their password really matters. They assume that it will never be guessed by anyone (how could it be?), and as long as they don’t share it with anyone, it’s good enough to keep would-be cybercriminals at bay.
Unfortunately, this is not the case.
The only way to indeed keep hackers from guessing passwords or using high-tech trial and error algorithms to uncover passwords is to use two-factor authentication, also known as 2FA.
2FA or two-factor authentication is a security system that forces users to have two proofs of identity before they can log in to a database, program, computer, or network. This is a system that you should be using at home and within your business.
As the name implies, there are two elements of two-factor authentication. First, the user must provide something they know. This could be a password or passcode, a pin number, or the answer to a secret question.
Next, the user must provide proof of something they have. For example, the two-factor authentication prompt may ask that the individual put in their credit card number (because their credit card number is something they possess). Likewise, some organizations will give each individual employee a security token that actually stays in their possession. This might be an RSA security device, a Google Authenticator, or something else. This device will be activated when prompted during login and will provide a passcode or pin that changes frequently. Another option is biometric authentication, such as an iris scan, voiceprint, or fingerprint.
As the owner or manager of your business, it shouldn’t be your responsibility to ensure the security of your sensitive data and network systems. This responsibility falls on the shoulders of your IT services company, and within their security division, one of the pillars of a robust cybersecurity strategy should be two-factor authentication.
If your IT services company has not spoken to you about employing a two-factor authentication system, don’t wait to ask them about it. The foundational necessity of this simple security measure suggests that if they haven’t already employed it, they’re probably not doing their job in other ways.
In that case, it’s time to find a new managed services provider. Give us a call, send us an email, or visit our website today to learn how we can help.
If you’re suddenly working from home due to the coronavirus, maximize productivity with a dedicated workspace, enjoyable breaks, and engagement with colleagues.
For the vast numbers of Americans suddenly barred from their offices due to the coronavirus pandemic, working from home can pose significant challenges. At home, distractions — including undone chores, needy pets and bored kids — abound, and tech troubles like unreliable Wi-Fi can stymie conference calls and online meetings.
What are some steps you can take to maximize productivity as you maintain a balance between the personal and the professional?
For individuals living in small homes, working at the kitchen table may seem natural. However, trying to get work done in a space that has other uses — such as eating — can pose problems. At mealtimes, you’ll need to move your laptop, tablet, papers and other necessary work-related items elsewhere, then move them back later. In addition, working in a central location in your home can expose you to any number of distractions.
Consider setting up a dedicated workspace that’s private and quiet. Even a small desk tucked into a corner of your bedroom can work, and it provides you with a spot for leaving your work items set up at all times. A dedicated workspace also makes it easier to separate the professional and personal portions of your day.
Working from home, you may feel disconnected from colleagues — and, thus, obligated to participate in any calls or virtual meetings to which you’re invited. At the beginning of your workweek, consider reviewing your schedule to make note of any planned meetings.
Once you know when to expect virtual meetings, cordon off some time dedicated to intensive work that requires uninterrupted concentration. Staying connected with co-workers will be more important than ever as you try to get your work done remotely, but you also need periods you can devote to critical projects.
As you hammer out your weekly schedule, take advantage of the flexibility that working from home offers. In the time that you don’t spend commuting, you can take calls or dive into intensive tasks. If you prefer to read or get work done in the early mornings or later in the evenings, you can do so.
As you work remotely, consider scheduling some breaks into your day. Particularly when you work in a confined space, getting some fresh air and a change of scenery can provide a needed boost for both your state of mind and your productivity.
During the few minutes at a stretch you spend away from your screen, try to work in some activities that support health. Whether you prefer a quick walk or enjoying your lunch outside, time outdoors can give you the recharge you need to spend meaningful hours back at the computer.
If your job involves working as part of a team, you’ll want to keep in touch frequently. Along with virtual meetings, a business-oriented chat app can allow you to ask questions and provide feedback quickly and without the formality of email. For groups who work together throughout the day, a dedicated chat room can provide a virtual location for checking in between project work.
When you’re trying to concentrate or you’re on a deadline, you can use “do not disturb” functionality to signal that you are currently unavailable for online chats or calls.
Video calls have their downsides, including using more bandwidth than regular audio calls. However, conducting virtual meetings through video calling also provides an additional level of nuance and interaction that you may not get with the typical conference call. If you participate in frequent calls, consider using a video calling app for at least some of them.
As you adapt to performing your job from home, you’ll discover what works best for you — including creating a dedicated space, scheduling time for concentration, engaging with colleagues, and taking meaningful breaks. Your co-workers may appreciate hearing your tips as they strive to develop their own remote work-life balance.
Ransomware can damage and take a heavy financial toll on your business. What is ransomware and 5 tips you can take to protect your business today?
For businesses and organizations of all types, the Internet represents great promise and risk, with risk in the form of cyberattacks. Of the different kinds of cyber attacks, ransomware, in particular, can be very damaging exacting a heavy financial toll on you and your business.
Ransomware is a type of malicious software designed to block access to your system until a ransom is paid. The reason they are dangerous and damaging is that even if you pay, there is no guarantee that you will get your system back. There are many stories of organizations paying their ransom, receiving nothing in return, and dealing with the loss of their data.
In a ransomware attack, hackers gain access to your system through a malicious link or vulnerability attacking your network and backup files. Their mission is to render your back up files and folders useless so that you cannot gain access to your system files. Once incapacitated, the hackers contact you demanding a ransom, often in the form of cryptocurrency such as Bitcoin, believing that they are protected behind a shield of anonymity.
One would think that the organizations most vulnerable to a ransomware attack are small to medium-sized. The truth is that any organization that is not taking its cybersecurity seriously is at risk of a ransomware attack. Cybersecurity, for many, is often an afterthought until it happens to them. This includes businesses, non-profits, and government agencies of all sizes.
While there are things you can do to minimize the chance that you will be a victim of a ransomware attack, the risk cannot be entirely eliminated. However, there are steps you can take to minimize the risk of an attack. If ever you needed a reason to take action, consider that ransomware prevention is a fraction of the cost to recover from a ransomware attack. Never mind the financial cost. Consider that for most businesses, their IT system is the brains and nerve center of their operation storing customer lists, financial information, and everything else.
Some of the things that you can do to prepare for a ransomware attack include:
Having a business continuity plan
A business continuity plan consists of daily backups of all of your data, both locally, and to the cloud.
Invest in the best tools and equipment
You don’t want to cut corners when it comes to your cybersecurity. For that reason, you want to invest in the best tools and equipment. This includes anti-virus software, anti-malware, DNS filtering, and very strong firewalls.
Never click an unknown without knowing the sender
The average office worker receives 121 emails per day. As a result, it is easy to see how you or an employee can overlook a malicious email. While most people would click a link or download a file without a second thought, never open an attachment or click a link without verifying the authenticity of the sender. If you have any reservations about an email or sender, delete the email.
Keep up on your training
Cybersecurity is evolving quickly. Unfortunately, so are the hackers. As a result, you and your staff need to keep on top of your cybersecurity awareness training to stay ahead of the curve.
Work with a competent IT company
Make sure that your IT services company knows what they are doing. Many companies are marketing themselves as cybersecurity experts. As a result, you need to do your research to assess their cybersecurity skills.
There are more things that you can be doing to protect yourself from ransomware attacks. However, this is a good start for what you can do today. The other thing is to contact us to discuss a personalized ransomware prevention program for your business.
The spread of COVID-19 (coronavirus) has taken root across the country. More and more locations are starting to report cases and this number continues to raise alarm bells throughout the medical profession, and unsurprisingly, across businesses everywhere.
In the video above, We shared with you the importance of making sure your business continuity strategies are in place and ready to go. Many of the largest global enterprises to local small businesses have begun to exercise and test business continuity strategies in the event that their offices and factories are shut down due to the spread of this virus – forcing staff members to work remotely to keep the business functioning.
Are you prepared in the event that your employees need to stay home due to quarantine or a similar occurrence? If not, we urge you to reach out to us to talk about setting up:
Systems MUST be in place for employees working from home as they’re using their own computers to access corporate resources. It’s up to you to make sure those computers are clean from viruses or other security issues.
Our team is more than familiar with creating proven contingency plans for situations like this. You don’t have to handle this difficult situation alone. We can help you get prepared and make sure your employees are accessing corporate information in a safe and secure manner.
Reach out to us right away over the phone, by email or by visiting our website.
Data Privacy Day commemorates the anniversary of the signing of the first international treaty focused on data protection. Here’s how you can get involved.
Visit with your family about online privacy and safety. Discuss what information is private information and consider together the risks associated with sharing confidential information online. Take a look at the online accounts of any children in the home to identify breaches, risky behavior, and connections with strangers. Remedy any problems identified and use the opportunity to share information and teach.
Now is also a good time to go through old papers, files, and devices, and schedule safe destruction to protect your information before it lands in the wrong hands. Remember, never throw away bills, bank statements, check blanks, or devices without destroying them first.
There are a number of ways you can use this opportunity to promote data security at work:
Data Privacy Day provides a great opportunity for community outreach and involvement. Include clients, stakeholders, and community members in your commitment to privacy. Host an open house, where you share materials encouraging safe internet practices at home and sharing what your organization is doing to protect client information. Send out client emails celebrating the occasion and summarizing all of the steps that go into maintaining their protected information (and the results of your hard work). You might even consider launching a survey to learn more about stakeholder satisfaction with your commitment to privacy and data protection program.
Would you fall for this scam that cost a small town $1M? Find out what a BEC scam is, how it works, and what you can do to keep your company from falling victim.
What would you do if you found out your employee just cost you a million dollars? We’ll just guess they probably wouldn’t stay working for you much longer.
The little town of Erie, Colorado, was recently faced with this scenario. Hackers used a Business Email Compromise (BEC) scam to deplete the town’s savings.
Don’t know what a BEC scam is? You should. Here’s what you need to know
BEC scams are targeted and sinister. In this scam, a hacker gains access to the business email someone in C-suite, or of similar power.
Once inside, they monitor the account to determine who among your staff they should target from that account for financial gain. Once they’ve identified the person who holds the purse strings, they send that person an email from your account with instructions to wire money somewhere.
If the person who receives the email is suspicious, hackers don’t want their cover blown. So they may also mess with your email rules so that any emails received with words like “scam”, “is this a joke” or “please verify” in them automatically get deleted.
They may target several people to see who takes the bait. And the scammers use the principle of social engineering to convince people to comply.
In the case of the Erie BEC scam, the criminals were able to find a real account payable and request that the employee change where the payment was sent.
This gave legitimacy to the request that reduced suspicion.
The most common way to hack your email is through a phishing email scam. The fraudster may send an email to you that looks like it’s from your email service provider. They then trick you into giving up your password by having you log into a spoofed website or download malicious key-tracking software.
If your business email is through Microsoft, Google or another company with many product lines that use a single password, they can get it in a roundabout way, further lowering your guard.
If you don’t have a strong password, they may also be able to guess it by following the bread crumb trail all of us leave online.
BEC scams are convincing. You’re dealing with professional con artists, not hacker hobbyists. Because of that, you need a multi-faceted plan, which will include email scam security solutions like:
And above all, stay informed about scams and schemes like these. Criminals constantly adapt their strategies. Don’t fall for it. Follow our blog to stay up-to-date.
Threat actors are targeting companies to obtain personal information about employees to use for tax fraud and filing false returns.
Your company stores all sorts of personally-identifiable data about your employees. Birth dates, social security numbers, health information, and bank account numbers are all on the shopping lists for hackers who can sell the information they steal or use it for malicious acts. One of the most sought-after documents by bad guys is tax records and tax forms.
These threat actors use that information to steal identities and file fake tax returns. Tax identity theft is the biggest type of ID theft reported to the Federal Trade Commission (FTC) each year. The FTC estimates the fraud at more than $5 billion annually.
Often, the victims aren’t aware anything has happened until they go to file their personal tax returns. They may try to file electronically, and have it rejected as a duplicate, or get a notice from the IRS saying there’s a problem. By then, the fraudsters are long gone.
The most common way your employee data is breached is via phishing emails. Nearly a third of all data breaches and 78% of cyber-attacks started with a phishing email.
Hackers use email as a weapon to gain access to your systems. It may be as simple as sending an email asking employees to update their payroll information. Clicking on a malicious link can send that info to the wrong people. That’s exactly what happened to employees at the University of Kansas who soon found the direct deposit of their paychecks had been re-routed.
Other phishing emails may be targeted at individual employees using a variety of schemes to trick employees into giving up login credentials allowing cybercriminals to have access to company records. Other schemes may install malicious code when clicked and set up backdoors for hackers to access company computer networks. HR employees are also being targeted. A forged email may appear to come from a company executive or a third-party payroll processor asking for verification of information.
In an increasingly mobile society, hackers are gaining access to sensitive data when employees are connecting remotely to company servers without using proper security practices. When employees use public Wi-Fi, for example, they are vulnerable to man-in-the-middle attacks where threat actors intercept data as it’s being transmitted back and forth.
Educating your employees about the dangers of phishing emails is a good place to start. One trillion phishing emails are being sent every year. While your company’s spam filters catch many of them, a significant number can slip through. Employees need to recognize the warning signs and everybody within your organization needs to take precautions to safeguard your data:
It’s also important to keep all your software up-to-date. Hackers exploit what’s known as zero-day vulnerabilities in outdated software. These are known security problems that have been patched by the company. If the patches haven’t been applied by those using the software, hackers can exploit this known problem. That’s what happened to credit reporting agency Equifax, which saw hundreds of millions of records stolen when the company had failed to apply patches to known security issues.
Even the best IT teams can be overwhelmed by managing all the various devices and entry points to their networks. They may not have the expertise needed to stay on top of constantly evolving threats and security practices.
A Managed Service Provider (MSP) can actively monitor a company’s servers, exchange servers, active directory servers, firewalls, routers, switches, and platforms remotely. This ensures software is always up-to-date and breaches are identified immediately.
An MSP will monitor your network traffic and incursion points 24/7 in a cost-effective way. In case there is a cyber-attack, an MSP can be your best weapon in identifying the threat, shutting it down, and building additional security walls to prevent future breaches.