Which Application Rules Supreme: Outlook or GMail

Office 365 or GMail

Office 365 or GMail

Currently, 30% of email addresses change every year. The majority of these changes are business related. No one wants to deal with the problems that come with changing personal contact information. Quite often, personal emails are attached to personal bills and subscriptions as well.

When the big change happens and it is time to make a move, is usually away from a smaller email platform into one of the two behemoths – Microsoft Outlook and Google Gmail. These two email providers have become the blue chip operators in what is now an essential part of everyone’s life.

What is so good about Outlook in Gmail? Are there aspects of one that makes it better than the other? We are here to look at the subtle differences between the two so that you can make an informed decision about which is better for you.

The Basics

The Outlook and Gmail user interfaces couldn’t be more different from each other. Outlook seems more business oriented on the surface, while Gmail’s UI maintains a feel that you might get from last year’s tech startup. In short, Outlook is Baby Boomer; Gmail is Generation Z.

Outlook is all about add on features while Gmail brings a “what you see is what you get” mentality to the forefront. Both services come as part of a larger suite that make a lot of money for their respective companies. If you go Pro with Outlook or Gmail, you will actually be purchasing Microsoft Office 365 or Google G suite. The first requires an annual commitment, and the second is based on a monthly subscription plan.

The Tools

So the cat out of the bag – Outlook and Gmail are actually loss leaders for the business suites that Microsoft and Google hope to sell to you eventually. Microsoft Office 365 has all of the industry standard programs that we are used to – Word, Excel, PowerPoint and all of the newer injuries that have become business staples such as OneDrive, OneNote and Microsoft Teams.

Believe it or not, Google is actually the challenger brand in this arena. Its Calendar and Hangouts tools are definitely name brands, but other aspects of its business suites such as Keep, Sites, Forms, Drive and Currents have not quite hit mainstream acceptance.

The result is the difference between a set of features that you know and love (Outlook) or a possibly wider and more robust feature set with a learning curve (Google).

Organization

If you are actually doing good business, your email is going to be a place of constantly changing activity. This is your mission-critical location, and some of the emails that you receive are essential in making mission-critical decisions. Keeping your emails organized is one of the most important things that you can do for your business. Outlook and Gmail have two entirely different philosophies for this.

Outlook works on a method of organization that predates the Internet. Its traditional system of folders looks and feels like a file cabinet. Anyone who makes use of Gmail can tell you this is definitely not the way that Google organizes things. Gmail uses labels and tags and allows you to customize your experience much more. If you know what you’re doing, you can quickly tier your email system and get to your most important emails more quickly. If not, then your email will probably look like a jumbled mess every time you open it.

The Company

With such powerful companies underwriting the programs, it is difficult to look past the influence of the brand. When you use Outlook, you have the advantages of Microsoft behind you. One of the most important features that Microsoft offers is the ability to completely delete unread emails from existence. This is simply not possible with Google, although Gmail offers many other advantages that are difficult to overlook. Gmail offers extended power of Google search and all of the associated features that Alphabet has now monopolized, meaning that you have an extremely powerful suite of tools behind you every time you open your Gmail.

So who wins the battle of emails between Outlook and Gmail? This is actually a question of your business philosophy. If you like more traditional, old-school methods of thinking and organizing yourself, the outlook is probably the brand for you. If you are a New Age thinker who wants a personalized digital experience, then Gmail will probably suit you better. There is no right and wrong; only good and bad for you.

Outsourcing IT Makes Sense for Small Businesses: 7 Reasons

Woman Outsourcing Technology Support

Woman Outsourcing Technology Support

If you’re a small business owner, you have plenty of things to worry about. IT shouldn’t be one of them. We think it makes complete sense for most small businesses to outsource their IT needs to a managed service provider (MSP). Here are 7 reasons.

1. Focus on What Makes You Unique

This first reason is a big one. Small businesses have limits on how many people they can hire. If you try to keep all your IT in house, you’ll devote a decent number of your hires to IT once you reach a certain size.

Here’s the problem: your business isn’t IT. (If it is, you probably don’t need this guide!) Outsourcing your IT frees up capital and office space that you can instead devote to your core business. Outsource your IT so you can better focus your staff on whatever it is that makes you unique.

2. Access More Skill

With an in-house IT team, you’re limited to whatever number of specialties you can afford to hire. Your IT team will work hard, and its members will stretch their skills and find a way to accomplish things outside their skill set. Their work won’t always be done in the best way, though. By outsourcing your IT, you gain access to a broader range of skills and certifications. You can rest easy knowing that it was done right from the get-go.

3. Do More, Faster

Related to the previous point, your IT needs will be met faster by a dedicated team of experts than by a small but well-intentioned in-house team. All that time the in-house team spends poking around looking for answers to problems that lie outside their specialties is the time you’re paying for. With an MSP you’ll usually get the right answer, right away.

4. Reduce Personnel Costs

When you hire in-house IT staff, you’re on the hook for all the associated personnel costs, like insurance, FICA, and so forth. These costs are often hidden and can be burdensome for small businesses. With an MSP, you pay a fixed monthly rate, and you don’t have to worry about administrative personnel costs. The MSP takes care of those for its employees.

5. Reduce Infrastructure Costs

Outsourcing IT to an MSP isn’t solely about reducing IT headcount and the costs associated with personnel. You can also save IT infrastructure costs by using an MSP. Service agreements vary, but some will include some or all hardware in the monthly fee. You can avoid large spikes in expenses for new equipment by choosing this kind of service agreement.

Your MSP can also move much of your IT infrastructure to the cloud, eliminating the need to house costly servers at your business. The less IT infrastructure you have on site, the less you pay to power and maintain that equipment.

6. Free Your Existing IT Team to Focus

For larger small businesses, outsourcing IT usually isn’t done with the intent of drastically reducing or eliminating IT headcount. It’s more about allowing your existing IT team to focus in and specialize.

If your IT staff has grown beyond just one or two generalists, you likely have some highly capable, highly qualified individuals on your team. Here’s a scary proposition: go ask those people how many hours a week are eaten up doing low-level IT errands like helping John in Accounting with basic computer questions or reminding Sarah from Accounts not to reply-all to emails?

Outsourcing your basic IT functions to an MSP allows your existing IT team to focus on their areas of specialization. You’re also free to assign in-house assets to IT functions that are core to your business or are proprietary.

7. Gain After Hours Support (Without Paying Overtime)

Outsourcing your IT needs to an MSP with a 24/7 service agreement means instant access to support anytime. With an in-house IT staff, you’ll end up paying overtime if a system goes down after hours. You may also have to wait for that IT staffer to physically arrive to fix the problem.

When you outsource, you get near immediate remote support, without the overtime. This is a great benefit to small businesses of all varieties and sizes. You’ll benefit even more from after-hours service if you have virtual team members or even satellite offices in far-flung time zones.

Conclusion

We’ve covered just 7 of the many reasons that outsourcing IT to a managed service provider is the right choice for small businesses. Do you have questions about specific aspects of working with an MSP? Let’s chat. We’re ready to answer.

What Technology Should Small Law Firms Choose

Lawyers Looking At A Computer

It is questionable whether there is any industry today that has not been forced to adopt new technology to remain competitive. But for small law firms, the need to utilize technology appropriately is necessary for more than just competitiveness—it is actually being increasingly pushed by jurisdiction. In just the past few years, the ABA Model Rule 1.1 went through revisions so that the rule now states that attorneys need to maintain a certain level of competence with technology, and 36 states have adopted the revised comment to Rule 1.1.

Lawyers Looking At A Computer

With technology competency becoming a standard for practicing attorneys, it is clear that every law firm needs to do what it can to incorporate technology into their practice. What this adoption will mean may vary somewhat from firm to firm, but the general push should be to meet the standards of the industry in all possible areas. For many firms, that will mean making some changes.

Technology for Small Law Firms—What You Need to Know

Where you and your firm sit on the technology spectrum may be far different from another attorney or another firm. You may have already taken significant steps to incorporate technology tools into your operation. You may have been doing things the same way for decades and only be interested in making the minimal changes to comply with changing professional expectations. Or, you may be somewhere in the middle. The following tips are meant to serve as a starting point on how to identify where changes need to be made and to make those changes as efficiently as possible.

Set aside time for research and the adoption of new technology.

For most lawyers, time is at a premium. Between courting new clients, keeping up with legal changes, researching cases, preparing and filing documents, traveling and doing all the other things required for you to run your firm, you are probably quite pressed for free time. However, you are also adept at measuring the workload of new projects and making time for those projects—which means you have the ability and aptitude to make technical changes to your firm. You just need to remain aware of what you are getting into and set a pace that fits with your circumstances.

If you do not want to do all of the work yourself, you can also delegate or outsource it. Whether you assign duties to employees, hire an IT services company familiar known for servicing law firms, or both, you can accomplish a lot when you share the workload.

Learn what it means to be technically proficient as a law firm.

You may already have clear ideas about the changes you need to make. But if you aren’t, consider doing some research on legal tech today. There are books available that discuss legal tech for small firms and there are plenty of websites that do the same. Educate yourself on what a technologically savvy firm looks like today so you can see where your firm is lacking and where you should aim to be moving forward.

Areas to research include:

  • Document management
  • Time and billing software
  • Legal practice management software
  • Collaboration tools
  • Security technology
  • Mobile technology
  • Potential technology certifications available

Conduct an assessment of the technology your firm uses.

Once you have an idea of what the expectations for legal technology use are in today’s environment, you can conduct an assessment of your firm to see where you are and what changes you need to make. Identify what technology you currently use for various tasks, determine what changes need to be made, if any, and then make a plan to facilitate those changes.

Prioritize technology adoption.

Ideally, you could make all the changes you need to make simultaneously. But if you do not have the time, resources, or assistance to make all those changes possible right now, you will need to prioritize which are most important. Your priorities will be based on the specific goals of your firm. For example, e-filing is becoming an industry standard for law firms. If you are still using mostly paper, moving into an e-filing system will probably be a big priority. That may mean purchasing a scanner to digitize your existing documents, as well as implementing an e-filing system for your firm to use moving forward.

Consider Partnering With A Managed IT Services Company.

Most small firms do not have the resources to employ a dedicated IT department. Managed IT services offer a way to take advantage of technical proficiency and skill sets as you need them—like when you need to do a technology overhaul on your firm. You can get the assistance you need from professionals so you can focus on running your firm.

If you would like more information about managed IT services for your solo practice or small law firm, please contact us.

Critical Update From The NSA

NSA Windows Security Warning

The NSA Is Urging To Patch Remote Desktop Services On Legacy Versions of Windows

The National Security Agency is urging Microsoft Windows administrators and users to ensure they are using a patched and updated system in the face of growing threats. Recent warnings by Microsoft stressed the importance of installing patches to address a vulnerability in older versions of Windows.

NSA Windows Security Warning

Microsoft has warned that this flaw is potentially “wormable,” meaning it could spread without user interaction across the Internet. We have seen devastating computer worms inflict damage on unpatched systems with wide-ranging impact, and are seeking to motivate increased protections against this flaw.

CVE-2019-0708, dubbed “BlueKeep,” is a vulnerability in Remote Desktop Services (RDS) on legacy versions of the Windows® operating system. The following versions of Windows® are affected:

  • Windows® XP
  • Windows® XP
  • Windows Server® 2003
  • Windows® Vista
  • Windows Server® 2008
  • Windows® 7
  • Windows Server® 2008 R2

What Is A Wormable Virus?

This means that the virus can get into your system without you doing anything like clicking a malicious link. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights without your knowledge.

Any future malware that uses this vulnerability could propagate from one vulnerable computer to another. This is how similar malware like WannaCry spread around the world. Experts are worried that this flaw could be used to fuel a fast-moving malware threat like the WannaCry ransomware attacks of 2017.

Another Problem

Although Microsoft has issued a patch, potentially millions of machines are still vulnerable. This is the type of vulnerability that malicious cyber actors frequently exploit through the use of software code that specifically targets the vulnerability.

For example, the vulnerability could be exploited to conduct denial of service attacks. It is likely only a matter of time before remote exploitation tools are widely available for this vulnerability.

NSA is concerned that malicious cyber actors will use the vulnerability in ransomware and exploit kits containing other known exploits, increasing capabilities against other unpatched systems.

What Should You Do?

Microsoft has released a critical update for their Remote Desktop Services that impacts multiple Windows versions. The patches are for devices and systems that are both in and out-of-support, which is rare for Microsoft to do. This shows the importance of these patches.

The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests. To apply the patches, go to the Microsoft Security Update Guide for in-support systems and KB4500705 for out-of-support systems.

Microsoft recommends that customers running one of these operating systems download and install the update as soon as possible.

Does This Mean Even Systems Without Support Can Get The Patch?

Yes, Microsoft is aware that some customers are running versions of Windows that no longer receive mainstream support. This means that you wouldn’t have received any security updates to protect your systems from the CVE-2019-0708 virus.

Given the potential impact to customers and their businesses, Microsoft decided to make security updates available for platforms that are no longer in mainstream support. All Windows updates are available from the Microsoft Update Catalog.

What Should You Do Before We Apply The Update?

It’s recommended that you back up all of your important data first. If you have a reliable backup, and if the patch creates problems, you can still access your data. You should do this before you install any patches.

What If You Can’t Apply The Patches?

If you can’t apply the patch for your system there are other things that you can do:

  • If you don’t need the Remote Desktop Services, you can disable it.
  • Block the TCP port 3389 (this prevents unauthorized requests from the Internet).
  • Enable NLA (Network Level Authentication) for Windows 7 and Windows Server 2008.

Of course, the best thing to do is to contact us. We’ll know exactly what to do.

What Else Should You Know?

If you had updated from Windows 7 to Windows 10 or from Windows servers 2008/2008 R2 to Windows 2016 or 2019, you wouldn’t need to worry. This is why it’s essential to keep your systems up to date.

Soon, on January 14, 2020, support will come to an end for all Windows Server 2008, 2008 R2 equipment and the Windows 7 operating system.

If you’re still using these servers or operating system, it’s crucial to replace them now so that there’s no disruption to your daily operations or loss of data.

Any hardware or software product that reaches its end of life is a potential gateway for hackers to enter through. In addition to the security hazard, there are other reasons why it isn’t a good idea to keep using old equipment such as unresolvable outages.

 

Was Your Photo and License Plate Number Breached?

CBP License Plate Breach

 CBD Reports 100,000 Photo and License Plate Breach

The U.S. Customs and Border Protection (CBP) reported today that nearly 100,000 travelers’ photos and license plate data were breached. If you’ve driven in or out of the country within the six-week period where the data was exposed, you could have been victimized.

CBP License Plate Breach

The department said on June 10th that the breach stemmed from an attack on a federal subcontractor. CBP learned of the breach on May 31st.

CBP report:

“Initial reports indicate that the traveler images involved fewer than 100,000 people; photographs were taken of travelers in vehicles entering and exiting the United States through a few specific lanes at a single land border Port of Entry over a 1.5 month period.”

CBP hasn’t reported when this 6-week period was.

Who Was The Subcontractor That Was Affected By The Breach?

CBP hasn’t said who the subcontractor was either. But the Register reports that the vehicle license plate reader company Perceptics based in Tennessee was hacked. And, these files have been posted online.

Additionally, the Washington Post reports that an emailed statement was delivered to reporters with the title: “CBP Perceptics Public Statement.”

Perceptics’ technology is used for border security, electronic toll collection, and commercial vehicle security. They collect data from images on license plates, including the number, plate type, state, time stamps and driver images.

Where Were The License Plate Readers Installed?

Perceptics license plate readers were installed at 43 U.S. Border Patrol checkpoint lanes in Texas, New Mexico, Arizona, and California.

CBP reports that “No passport or other travel document photographs were compromised and no images of airline passengers from the air entry/exit process were involved.”

CBP uses cameras and video recordings at land border crossings and airports. The images they capture are used as part of a growing agency facial-recognition program designed to track the identity of people entering and exiting the U.S.

Do We Know Whose Data Was Exposed?

No, we don’t. And to date, CBP hasn’t said if this data will be released. If we hear differently, we’ll be sure to report any updates, so keep watching this space.

Is Facial-Recognition A Security Threat?

Facial-recognition is a hot topic right now. The American Civil Liberties Union states:

“This incident further underscores the need to put the brakes on these efforts and for Congress to investigate the agency’s data practices. The best way to avoid breaches of sensitive personal data is not to collect and retain such data in the first place.”

Congressional lawmakers have questioned whether the government’s expanded surveillance with facial recognition could threaten constitutional rights and open millions to identity theft.

Today’s technology can recognize and track us without our knowledge or an option to prevent it. It’s inevitable that a new battle between surveillance and privacy will be taking place as more breaches occur.

What The CMO Needs To Know About Marketing Technology

Marketing Technology

Marketing Technology

Familiarity with marketing technologies is a must for today’s CMO. However, the range of tech knowledge across CMOs varies widely. Even if every CMO can benefit from some technical familiarity, the reality is that some CMOs know very little about technology while others know more than they will ever need to in order to fulfill their responsibilities. Wherever you happen to sit on the tech knowledge spectrum, it can be helpful to have a roadmap on where your level of proficiency and understanding should be headed. With the right approach to marketing technology management fundamentals, you can ensure that you are best equipped to help guide your company towards its objectives.

Marketing Technology for the CMO—What You Need to Know

If you have been a CMO for very long, you have seen how dramatically your responsibilities have changed in recent years. Where you once focused primarily on building your brand, advertising and customer engagement, today you juggle those responsibilities with embracing and leveraging a range of technologies and platforms. The rate of change is only increasing, so it is understandable that many CMOs feel a bit overwhelmed sometimes. Fortunately, there are key areas that you can focus on when it comes to marketing technology. By leaning into the right areas, you can ensure that your expertise and management efforts are focused where they will do the most good for your company.

The marketing technologies your company utilizes come together to form what is referred to as a stack. The way you approach the stack—both the existing tools you are using and the adoption of new tools—is a major part of how you manage the tech side of your role. You can be actively involved in initiatives related to marketing technology by:

  • Determining which technology is a priority
  • Helping with the creation of stack strategy
  • Conducting reviews of how the stack is performing
  • Creating a management structure where your team can fully leverage the available technology
  • Being aware of the company’s data strategy and actively contributing to its development

Key focus areas should include:

Ensuring Stack Strategy is Based on Marketing Objectives

There are a seemingly endless number of marketing technologies now available—all of them promising to transform the way you do business. But most of those tools are not ideal for helping you achieve your concrete marketing objectives. Those objectives, based off of the objectives of your business, should guide how you organize your stack. By making sure that technology serves to achieve specific objectives, and is not just a solution looking for a problem, you can streamline your technology usage.

Regularly Measuring the Performance of the Stack

When you adopt new technology, it is important to determine what metric you will use to determine if it is serving the needs of your company. With metrics in mind, you can set regular review sessions to analyze how each technology is performing. You can determine which products are working as expected, which are not working as expected, and which are working even better than expected. With measurements in hand, it becomes much easier to decide how you will move forward with each technology—and which you will eliminate.

Keep an Eye Out for Bloat in the Stack

A regular performance review will help you avoid the bloat that is so common with marketing technology stacks. You and your team can check to see which programs are being utilized and how well they are being used. You may discover that some tools are not being fully leveraged, while others may actually overlap in functionality with other tools. Your team can determine how to get the most out of what you are already using while also eliminating as much overlap as possible. Ideally, you want to use as few technology tools as possible but use the ones you do have as fully as possible. You can develop a lean stack that gets the job done without creating drag.

Create a Clear Data Strategy

There is plenty of data at your fingertips with today’s technologies. But it is not enough to have data coming at you and your team. You need to have a clear strategy on what data to collect, how to collect it and how to process it. The assistance of the IT department can come in handy here, as they should be able to work with you to develop and implement a strategy based on your marketing objectives.

Define Responsibilities

The way you and your company handle the technology stack will be based on the resources you have available. Some companies have numerous departments that can split up the work, while others only have a few people who need to devote themselves fully to the task. What is important is that you and your team define responsibilities. Once everyone knows what they need to do, it is much easier to ensure that everything that needs to be done is done.

Moving Forward

As a CMO, you can help your company achieve its objectives by utilizing technology. You do not have to be an expert in every technology you use; you simply need to know where to focus your efforts to achieve maximum effectiveness.

Size Doesn’t Matter: 7 Ways Small Businesses Should Think Big

Small Business Tips

Small Business Tips

You may be a small business, but there’s no reason you have to think or act small. Today’s technology innovations offer small businesses all sorts of powerful tools that just a decade ago weren’t available or were only affordable to large firms. Technology can help small businesses think like big ones in all sorts of ways. Here are 7 ways small businesses should start thinking bigger.

1. Embrace the Cloud

There are numerous cloud-based technologies that can help your small business punch above its weight. By embracing the cloud, you can save money, improve your staff’s productivity, and expand or contract IT operations far easier than you could without the cloud.

Entrust things like email and calendar hosting, file storage, and video chat to cloud-based software and infrastructure solutions. Most small businesses will pay less for a cloud solution than they would to purchase and maintain servers and software. This is due to the economy of scale: your cloud provider is operating at a very large scale, so the cost of adding just a bit more server space is negligible. Without cloud services, your small business shoulders all the unique setup and maintenance costs all your own.

2. Improve Your Website

Sometimes the difference between a successful small business and a failing one is as simple as the quality of their website. Your website is your digital storefront, but it’s also your digital billboard, white pages, classified ad, and more. If it looks terrible or doesn’t function well, you’re sending a poor message to your customers and prospective customers.

If revamping your website is more than your business can do well in-house, consider contracting with a vendor for this crucial task. Many managed service providers offer this service or can contract with qualified vendors who do.

3. Leverage Social

Your business needs a social presence, even if it’s small. This is true of all small businesses, but the smaller your business, the more important grassroots tools like social become. Share content regularly (including photos and videos) and encourage your most loyal customers to do the same.

As your brand’s social presence grows, it’s important to keep an eye on your reputation. What are people saying publicly about you? Is there anything you need to intervene on? Social can be a great avenue to see what challenges your customers are facing.

4. Use CRM Software

Customer resource management (CRM) software is the way big businesses keep in contact with customers in an organized fashion. CRM software isn’t limited to large firms, though. Affordable cloud-based options that work well with small business are available.

5. Big Data Isn’t Everything

Big data helps big companies win, right? That’s what we’re always hearing, and there’s truth to it. That said, we’ve all seen plenty of examples of big data leading companies astray, like “targeted ads” that miss completely or hyper-local campaigns that come off as fake or out-of-touch.

As a small business, you have access to something big businesses don’t: real, interpersonal data. Call it “small data” if you like. You likely know your customers much better than large firms do. Write down the things you learn. Better, input that information into your CRM software. You have the ability to send more personal notes than your large, faceless competitors. Capitalize on this.

6. Plan to Plan

You have a business plan in place, but as you grow, does your business plan grow with you? Your small business runs the risk of losing focus as it grows. Employees and leadership get so focused on daily tasks that they don’t keep their eyes on the overall plan. In other cases the overall plan becomes outdated and less applicable. Schedule time each year to review your business plan and goals, just like the big guys do.

7. Don’t Go It Alone

Lastly and most importantly, don’t go it alone as a small business. Your business is unique, set apart by some feature, product, or ethos that your competitors don’t have. Focus as much of your energy as possible on that thing, on your core competencies. As much as possible, divest yourself from other things.

One of those other things, for most businesses, is IT. Partnering with a managed service provider (MSP) to implement and support your IT infrastructure can save you money and increase productivity. You’ll also gain access to a deeper bench of IT professionals than you could afford to keep in house. If you’re ready to explore what we can do as your MSP, contact us today.

How Much Should A Company Invest In Information Technology?

Business IT Budgets

Business IT Budgets

The rapid increase in technology use in businesses has affected every industry. Across all businesses, the need to keep up with the competition means paying attention to what technologies are available and incorporating the right tech tools as they become viable. Whatever your business, you know that you need to invest in information technology to excel in your industry. But how much should you invest, exactly? To determine your IT budget, you need to look carefully at your industry, your business goals and most importantly, what you can reasonably expect information technology to do for you on your path towards those goals.

Putting Technology Investment in Context

Depending on what stats you read, it appears that businesses spend anywhere from 3% to 6% of their budget on IT. The average spend on tech is expected to go up in the coming years, but no one is quite sure how much it will increase. It makes sense to expect an increase, of course, given the drastic increase in tech adoption across all facets of daily life and business. But the amount of increase is hard to be certain of because no one is sure exactly what the future holds.

What is clear is that an IT budget is necessary for building and maintaining a business. However, the size of that budget can vary considerably depending on the business and the industry that business is part of. In a study conducted by Deloitte, it was found that banking and securities spent 7.16% of their budget on IT—the most of any industry—while construction spent the least at 1.51%. Other industries spent somewhere in between. Such a large difference in spending is indicative of a spectrum of need for IT that differs significantly depending on the business. Those differences make it impossible to define a one-size-fits-all budget percentage for IT for all businesses. There are simply too many variables to consider.

How to Determine How Much Your Company Should Spend on IT

Guidelines on how to determine your own IT budget can be much more useful than a blanket statement about how much you should spend. By knowing what questions to ask, you can get the answers you need to form your own ideas about what your company needs as far as IT goes.

Some questions you can ask include:

Do we need an IT budget?

The answer to this is an obvious “YES”, but it is worth coming up with your own reasons for having a budget to begin with. The closer you look at your circumstances, the more apparent it will be that IT is simply a part of doing business and an area that you will always have to navigate as a company. And it is not enough to put off IT decisions until you make a split-second purchasing decision financed by extra cash you have lying around—not if you want IT to generate reliable results. For long-term success, you need a specific budget.

What is the budget for?

IT investments should serve to further your business objectives. Pulling a random number out of the air is not going to achieve optimal outcomes. The budget should be set to ensure that you can use the technology you need to achieve the outcomes you desire. Of course, to answer this question, you may need to clarify your business objectives and your IT needs. The CIO, CMO and other business leaders can work together to set guidelines for what needs to be accomplished and the budget can be built from there.

Are we spending more just because?

Knowing that business spending on IT is increasing in many industries is useful, but just because others are doing it does not mean that you need to do it. Increasing spending on IT is not enough on its own to improve your business. That increased spending needs to have a purpose. Maybe you are upgrading important infrastructure. Or, perhaps you know of a new tech tool that is virtually guaranteed to make you more competitive. Just make sure that an increased budget has a purpose.

Is the budget based on current economic conditions?

Some businesses are still stuck in a recession mindset. They try to avoid any extra spending because they think it is a necessity for survival. But if the economy has picked up, it is vital to take advantage of increased revenue to bolster your technology while you can. The better you equip your company to move into the new age now, while you have the resources, the more capable your company will be of weathering any storms to come.

The reality of IT budgets is that they need to be customized to the business using them. Fortunately, the process of determining the IT budget can greatly improve your company’s understanding of where it is, where it is going and how technology will help it get there.

3 Security Tips For Australian Organisations

Australia Cybersecurity

Australia Cybersecurity

More than ever, cybercrime is a reality all businesses in Australia must face. No matter your industry, company size, or level of technology use, it’s up to you to ensure the security of your data and the strength of your security.

Together with the Cyber Security Working Group (CSWG), the Australian Taxation Office has developed 3 key tips to help businesses throughout the country combat cybersecurity. We’ve summarised these tips below.

3 Tips for Better Cyber Security

1. Ensure your system and individual accounts are constantly monitored.

All accounts owned or operated by your company need to be monitored constantly for unusual activity. This may mean hiring a security company to carry out consistent monitoring, but it will also mean checking your company interactions and transactions in-house. On an individual level, instruct your employees to follow the same self-monitoring protocol.

2. Train your employees in best practices for optimal security.

Evidence shows that phishing scams are at the root of most cybercrime activity. A phishing scam is generally conducted by email, but it can be done over the phone or by mail as well.

Most often, a criminal on the other end of the scam will send an unsolicited email to one or more employees in your company. The email will likely appear from a legitimate source, such as a bank, credit card company, security manager, or higher-up in the company. A key feature of a phishing email is the request to:

  • Reply with more information (usually personal or sensitive information such as a login or account number)
  • Login to an account you possess via a link the provided in the email
  • Click on a link for some other reason (to retrieve a prize you’ve won, for example)

In order to avoid phishing scams from affecting your company, the only truly effective measure is to train your employees in common cyber scam activity. Teach them how to avoid such scams. It’s important to teach your employees to:

  • Never click on links from or reply to suspicious emails.
  • Avoid providing sensitive information (logins, passwords, account numbers, access codes, etc.) when prompted by email. When in doubt, double check with the sender by calling them directly or speaking to them face-to-face to see if the initial message was real.
  • Never open attachments or programs from unknown sources.
  • Never leave their open or logged in computers or terminals unattended.
  • Watch your social media presence carefully. Not everything (meaning, sensitive details) should be shared on public accounts like Facebook, Twitter, and Instagram as hackers may come back to use this information with malicious intent. Make sure whoever is managing your social media accounts is aware of this.

3. Be wary of conducting business on public Wi-Fi connections.

Public Wi-Fi can be a tricky Internet connection to safely use because it’s not always secure from corruption by nearby hackers. This certainly goes for individuals on a personal level as individuals can easily be hacked via their bank account logins or by email, but it always goes for business conducted on company laptops or through company websites or cloud accounts.

This is often an issue “on the road.” Many businesses will send employees on company trips, during which they may want to use public Wi-Fi (at an airport, hotel, or restaurant, for example). In general, this should be avoided whenever possible, or, if it is absolutely necessary, only general, non-sensitive business should be conducted when connected to public Wi-Fi.

Is Cybercrime on the Rise in Australia?

Yes. Top businesses and the Australian government strive to attain optimal cyber defence capabilities. However, even as awareness of cybercrime grows, there are still mounting incidents of cybercriminals getting away with their crimes. This is partly because hackers can commit their misdeeds internationally — and most do. This makes them much harder to track as they often route their hacks through a variety of countries.

The best way to combat this type of criminal activity is to follow the directives listed above. Only thorough and attentive security monitoring and diligent training of employees can stop the threat of cybercrime to your company.

Sign In With Apple

Apple IOS 13

Apple IOS 13

Sign In With Apple…Should You Use It?

Apple recently reported that its new “Sign in with Apple” feature will be part of the iOS 13 release in the fall of 2019. It promises to protect your privacy, and authentication experts say it could have an enormous impact on data privacy.

What Is Sign In With Apple?

With Sign In With Apple, you’ll be able to log into your applications. It offers a single-sign-on functionality, much like other sign-in buttons such as Facebook’s, Google’s and Twitter’s.

What Are The Benefits Of Using Apple’s Sign In?

When you sign onto apps, Apple will mask your personal information and email address. But the application will still be able to contact you.

Unlike with Google, Facebook and Twitter, your email won’t be passed on to the developer. You can opt not to allow this, but you won’t be able to use their sign-in service. If you do choose to let Google, Facebook or Twitter track your email, they will also be able to see the applications you use.

Aaron Peck from Oauth explains:

“The way most “sign in with [blank]” systems work is that the app you’re signing in to will get your username on that service and likely also your email address,” he explained. “These apps can sell your email address to advertisers, or correlate your activity between unrelated applications by matching your username.”

Apple solved this problem with its single-use anonymous email address. You’ll be able to share the information you choose with the application. Apple creates a random, anonymous, single-use email address for each application. Apple then forwards emails sent to that address on to you. You have the option of deactivating the single-use email address whenever you want.

By using Sign in with Apple and the single-use email address, your true email address won’t be tracked. Apple is offering this to provide a more private option for use. And they are offering developers a way to provide a fast one-step login without forwarding their user’s data to another company. Apple’s button will also work on websites.

Can You Use Apple’s Sign In With Any Application?

No… only applications that integrate their systems with Apple’s Sign In button. Some may opt not to because they won’t be about to use your information for marketing purposes.

What Phones Can Use iOS 13 & Sign In with Apple?

These are the devices that will be able to use iOS 13:

  • iPhone XS
  • iPhone XS Max
  • iPhone XR
  • iPhone X
  • iPhone 8
  • iPhone 8 Plus
  • iPhone 7
  • iPhone 7 Plus
  • iPhone 6s
  • iPhone 6s Plus
  • iPhone SE
  • iPod touch (7th generation)

Is There Anything Else To Consider When Using Sign in with Apple?

If you are a developer, there may be. There are some concerns surrounding Apple’s terms and conditions for application developers. If they offer Google, Facebook or Twitter’s sign in, they must also offer Sign in with Apple.

And there’s more. According to Reuters:

Apple will expect developers to place their login button above Google’s or Facebook’s.

Apple Inc will ask developers to position a new “Sign on with Apple” button in iPhone and iPad apps above rival buttons from Alphabet Inc’s Google and Facebook Inc, according to design guidelines released this week.

The move to give Apple prime placement is significant because users often select the default or top option on apps […]

Apple’s suggestion to developers to place its login button above rival buttons is part of its “Human Interface Guidelines,” which are not formal requirements to pass App Store review. But many developers believe that following them is the surest way to gain approval.

This means that some app developers won’t have an incentive to actually add the Sign in with Apple feature. But Apple is getting around this by mandating that if developers what to place their app in the Apple App Store, and they already offer a third-party sign in, they must offer Apple’s.

Apple’s terms and conditions don’t require this for applications with a dedicated login system, and those that don’t use third-party buttons from Google or Facebook.

What’s The Benefit For Apple?

Sign in with Apple will improve users’ privacy and provide a far better experience than others.

Will LaSala, director of security services and security evangelist at OneSpan, tells us more:

Apple is going one step further than traditional single sign-on, they are forcing their users to use stronger authentication, such as Apple’s FaceID and TouchID,” he said, noting that Sign in with Apple will ask mobile app users to use the biometrics functions.

The use of adaptive authentication is what should be celebrated – the ability to prevent login tracking or protect a user’s information is a secondary benefit. Any way that we can get users to move to adaptive authentication that is easy and portable across many sites and platforms is a security win for the internet.

Apple is positioning themselves as the privacy provider. So when we want more privacy, Apple hopes we’ll choose to use their technology. It’s a great marketing strategy…something that Apple excels at. We think many people will want to use Sign in with Apple due to its privacy features.