The CFO’s Guide to Smart Investing in Information Technology

CFO Technology Guide

CFO Technology Guide

Opportunities to spend on tech are endless these days. But your budget isn’t endless. Your company needs to invest in technology, but you need to do it in a way that’s smart and strategic. Check out our CFO’s guide to smart investing in information technology. We’ll show you how to prioritize your technology investment so that you can make smart decisions and stay on budget.

The Problem

The problem with smart investing in information technology is the sheer number of choices available. Hardly a day goes by without a new B2B information technology product hitting the market. You can’t possibly purchase them all, nor does your business need them all.

As the CFO you may or may not be involved in specific purchasing decisions, depending on the size of your business and the size of the purchase. You do, however, bear ultimate responsibility for setting your purchasing strategy. With so many IT investment options available, you may be overwhelmed trying to cut through the noise and decide what’s best for your organization. The lower your comfort level with technology, the worse the confusion gets.

Understand the Importance

The first step toward solving this problem is to engage with it. Understand that in many real ways technology is the future. You can’t afford to sit on the sidelines or to keep doing business as usual. Your competitors aren’t, and you’ll be left behind.

Simply put, picking the right new tech and integrating it successfully into your business can give you a competitive advantage over competitors. Therefore, in concert with your business’s technology team, you and the financial team must evaluate new IT developments, selecting and implementing the trends that will keep you competitive.

A Framework for Evaluating Emerging IT Innovations

Typically, companies receive far more internal requests for new software or hardware that can be approved within the current budget. To add to the problem, B2B sales efforts come from every direction. These promise to solve one problem or another or to give you that competitive advantage over your competitors. Never mind that the salesperson is trying to sell the exact same solution to those competitors.

What’s needed is a framework for evaluating emerging IT innovations. The questions below can help you decide which internal requests and outside sales pitches are worthy of your attention . . . and your money.

Question 1: How does the tech improve the group requesting it?

Many businesses receive countless technology requests from within. You and the finance team likely can’t approve every one of these, nor should you. The easy questions to ask are “does an employee want this software?” or “Will this software improve the employee’s situation?”, but those aren’t the right questions. Instead, ask “how will this piece of software improve this department or the whole company?”

This strategic question can help you prioritize your technology spend. Software A may very well improve life for that one person in sales, but if Software B realizes far more gains for a 30-person division, it ought to rank higher in the budget.

Question 2: Would this investment disrupt our existing IT deployments?

Sometimes blowing up the status quo is just what you need to succeed. Other times, though, wisdom is to leave well enough alone. If a new technology investment isn’t going to play well with your existing systems, you want to find this out before signing off on the purchase.

Neither internal requests nor external sales pitches are immune from this danger. Work with your technology teams to discover how a new investment will interface with your current system. Don’t spend the money until you’re convinced that the new tech will integrate into your current systems.

Question 3: Would this investment disrupt our workflow?

This is similar to question 2, but it focuses on the human component. A shiny new piece of software may well speed up Step 4 in a complex process in your business. Maybe it even cuts the time in half. Sometimes, though, there are trade-offs. You need to know if it’s going to make Steps 1 through 3 an absolute pain to complete, or whether it will add time to Steps 5 through 8.

Avoid facing an employee mutiny by fully vetting the impact the new technology will have on your current workflow. Be sure it’s a true net step forward before you commit.

Question 4: What are the returns on investment we will see by implementing?

With question 1 you’ve already established how the product will benefit one or more departments. Now, take it a step further and look at your ROI. How greatly will this investment increase sales? What estimate can you place on the productivity or quality-of-life gains? Is the cost worth the advantage you’ll gain over competitors? Answering questions like these gets you to a more specific understanding of the true worth of a proposed investment.

Conclusion

Navigating the new technologies available will always be a challenge for CFOs. By asking these 4 questions, you can prioritize your technology investments smartly.

What Is PII, Non-PII, and Personal Data?

Personal Data

Personal Data

Data security becomes more important with each passing year. It’s important to have a good understanding of the terms that both governments and the information security industry use. Understanding these terms will help you lead your organization to comply with today’s regulations as well as whatever new regulations are coming down the pike. Today we’ll define three major terms: personally identifiable information, non-personally identifiable information, and personal data.

Personally Identifiable Information (PII)

Personally identifiable information, or PII, is information that organizations may hold on individuals that can be tied to the individuals’ identities. The National Institute of Standards and Technology provides a legal definition for the USA:

PII is any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual‘s identity, such as name, social security number, date and place of birth, mother‘s maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.

PII comes in two varieties. Linked information is the more sensitive variety. Anything that can by itself be used as an identifier is considered linked information. Social security numbers, driver’s license numbers, full names, and physical addresses are all examples of linked information.

Linkable information is the second category. Linkable information can’t do much on its own, but it becomes powerful when linked with other pieces of information. ZIP code, race, age range, and job information are all examples of linkable information.

Non-Personally Identifiable Information (Non-PII)

Non-personally identifiable information, or non-PII, is information that doesn’t fall into the above categories. All sorts of information falls into this category. In the digital world, IP addresses, cookies, and device IDs are considered non-PII, since (unlike what you see on TV) these pieces of information can’t be used to identify an individual.

Personal Data

Personal data sounds like a casual way to describe the above, but it’s more than that. Personal data is a term used in Europe that is roughly equivalent to PII. Euro-centric publications won’t tend to use the term PII unless discussing something explicitly American. Many of the same principles of PII apply to personal data, but there are some further ramifications that are important to know.

As the USA does with PII, the EU has a specific definition for personal data, defined in GDPR as this:

Article 4(1): ‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.

A Crucial Difference Between PII and Personal Data

One of the most crucial differences between the NIST’s definition of PII and GPDR’s definition of personal data is this: GPDR concludes that even cookies, IP addresses, and “other identifiers such as radio frequency identification tags” can be personal data, especially when combined with other unique identifiers.

In short, the EU’s GPDR guidelines are more restrictive than their USA equivalents. This is the explanation for the rash of “cookie notices” that’s spread around the web, and it could have implications for your business.

Wrap Up

If you need more information about PII, non-PII, and personal data, don’t hesitate to reach out. We’re here to serve you and meet your IT needs.

Do Businesses Really Need A CHRO?

Business CHRO

Business CHRO

Human capital is one of the most important business assets and also one of the most elusive. Today’s employees are staying only an average of around 4 years, far different than years past when people regularly stayed with the same company for over a decade. Job stability is a serious concern for organizations, who often find that they are losing their highly qualified staff members when a better offer comes along or when opportunities dry up. This can happen because organizations do not have a stable and structured human resources staff that is able to continuously create opportunities for training and advancement within the organization — staying tuned to the needs of the highest-performing staff members while supporting a positive culture throughout the organization. With the focus on swift moves and organizational change, it’s a strategic imperative that you have a top executive focused on the human resources needs of the business.

“Culture Eats Strategy for Breakfast”

Anyone who has been through business school has heard this old adage from management guru Peter Drucker, as related by Mark Fields in 2006. While it may be a bit trite, this statement has never been more applicable as the corporate culture can quickly fester due to poor decisions by business leaders who are not keeping personnel needs in mind. People want to work somewhere that provides personal as well as financial fulfillment and that often means finding a flexible working situation or the ability to advance their careers with hard work and dedication. If the culture of your organization is toxic with poor leadership in place, it may not even be obvious until you begin losing high-potential staff members.

With a Chief Human Resources Officer (CHRO) in place, there is likely to be a greater focus on gathering employee feedback as well as looking into breaches in rules and etiquette by staff. It doesn’t take long for a positive corporate culture to turn into a negative without a continuous focus on employee satisfaction. The perception that “leadership doesn’t care” or a lack of accountability can poison even the most positive working relationships. A CHRO helps actively listen around the organization and has the ability to raise concerns to the highest level while adequately explaining the challenges and offering strategic solutions.

Encouraging Meaningful Diversity and Mutual Respect

Diversity of thought and cultural fit are every bit as important as ethnic diversity in your workforce. It’s easy enough for managers to hire someone who not only looks like them but also thinks like them — something that a CHRO can help guard against. There’s more to a hostile workplace than a single person or small group of individuals who are behaving badly. It starts with the idea that staff members can get away with atrocious behavior and that the perpetrators are being enabled due to their high-performance standards or position within the organization. It can be challenging to discipline individuals who are perceived to be exceptional, but having C-suite representation for all personnel can help lead to accountability and mutual respect. Meaningful diversity occurs when managers and supervisors are encouraged to step outside their comfort zone and work with people who may be a great cultural fit, even if they may not have exactly the right pedigree or high levels of experience. A dedicated and involved CHRO helps hiring managers to see beyond the surface to find the exceptional staff members that will help the organization grow and evolve in the future. It’s never too early to begin encouraging managers to celebrate diversity and inclusion through a variety of different initiatives that can ultimately result in a more balanced workforce.

Attract and Retain the Best

Creating a positive culture also means finding what motivates employees and being able to illustrate the real business benefits of reducing turnover and providing the perks that employees truly want. HR is moving far beyond simply being the “complaint department” or a way to ensure compliance with a variety of rules and regulations. Having a CHRO provides the business with a higher degree of strategy in the hiring and managing of talented staff members. Millennials and Generation X alike appreciate being able to work from home or remote locations when the work permits it, but a CHRO is able to help quantify the savings that can be expected for the business as well as the softer side of employee engagement. Proactive human resources support is quickly becoming a differentiator for businesses that view these roles as more of a strategic position instead of the tactical role that HR has played in the past.

FInding benefits that employees will appreciate is only a portion of what goes into attracting and retaining the best staff members for your organization. A proactive CHRO regularly reviews the competitive landscape to ensure that health and wellness benefits are commensurate with the marketplace. Creating wellness initiatives also falls to HR, with the long-term benefits of these programs helping bring a new focus to the value of encouraging positive health choices throughout the life of each staff member. Having a CHRO included as a deliberate part of corporate strategic decisions creates a more equitable focus on the individual needs of employees as well as the organization’s requirements for long-term growth.

Experience and Training Key for Successful CHROs

Not every CHRO comes up through human resources. It’s not unusual for someone more on the business, marketing or legal side see the value in making the leap in this direction. It is crucial that any CHRO candidate has a deep understanding of the privacy and liability issues that can arise from this sensitive position and department. These individuals thrive when they have a full understanding of people management, legal considerations as well as business operations in order to help managers and leadership identify staff challenges and how to move towards resolution. Few of these issues will be solved overnight, meaning your CHRO must have the ability to stay the course and navigate difficult relationships over time. The role of CHRO even has some aspects of a Chief Security Officer, as they will need to understand and be able to manage in-depth data privacy policies which can be quite complex depending on your business model. Measuring the success of various initiatives is also a data-driven operation that requires analysis and interpretation of diverse datasets.

Organizations may survive without someone from human resources at the executive table, but it is becoming more unlikely that they will thrive without this representation in the C-suite. Chief Human Resource Officers provide a needed counterpoint to the business-focused mantra that you may hear from other executives, providing a different perspective on reaching organizational goals through the introduction of positive culture change, accountability and diversity in hiring practices. This strategic role not only provides organizations with qualified candidates but also helps ensure that high performers stay and continue providing their brain trust to the business.

Church Hit with Business Email Compromise

Email Security

Email Security

There was big business security news out of Brunswick, Ohio (a part of the Cleveland metro area) last month, this time involving a church. According to local reporting, the St. Ambrose Catholic Parish recently announced to parishioners that they had been swindled out of a whopping $1.75 million. The attackers’ methods have real implications for churches and businesses alike. We’ll look into their methods, but first a little more detail on this fascinating story.

A Church with Big Plans

St. Ambrose is in the middle of a fundraising and building campaign. As with many older church buildings, repair and restoration are needed. The parish’s Vision 20/20 campaign was supposed to be the answer. This campaign called for raising $4 million needed for repair and restoration, and the fundraising efforts were well underway.

The church only discovered there was a problem when the construction firm they’d hired, Marous Brothers Construction, started inquiring about unpaid bills totaling $1.75 million. The church leadership had been prompt in paying its bills, so they thought, and even had receipts and confirmations for funds transfers. They didn’t understand how the accusation of nonpayment could be true. The funds had left the account, after all.

An Old-School Hack, Well Executed

After involving the Brunswick police and eventually the FBI, an explanation surfaced. The church had indeed been hacked in a business email compromise attack, or BEC. An unknown attacker gained control over two church staff member email accounts. From there it was mostly social engineering.

The bad actors in control of these email accounts managed to convince (via email, of course) the rest of the relevant staff members that the construction company had changed its account information. The “new” account was, of course, controlled by the criminals. The most likely explanation from this point is that an actual, on-site staff member changed over the payment information, having been duped by very real emails that appeared to come from trusted colleagues.

The criminals kept the ruse going very effectively, apparently sending (bogus) confirmation emails so that the church staff thought they were paying the right people. Only when the construction company came calling was the breach finally discovered.

An Isolated Hack with Devastating Results

The church reported to local media that no other components of their IT infrastructure were compromised, including parishioner databases or stored financial information used for the church’s electronic giving service. The hack was isolated. All the hackers got was access to two email accounts. Yet they leveraged this small hack into a $1.75 million payday.

Strategies to Combat BEC Attacks

Stories like these underscore the importance of strong IT security, even in houses of worship. They also underscore the importance of training staff on recognizing the signs of phishing, social engineering, and other bad behavior.

Most BEC attacks don’t start as brute-force attacks. Rather, they start as phishing expeditions. Hackers lure credentialed people to give up their login information by presenting a sometimes extremely realistic fraudulent login page. The first step to preventing such attacks, then, is to educate your staff about how to spot phishing and other similar tactics. Teach staff not to assume that email is from who it appears to be from, especially emails that seem out of context or that ask for unexpected actions. At the enterprise level, implementing a better email authentication protocol like DMARC is an effective way to combat this kind of fraud.

Need Help?

Does your business need help preparing for BEC, phishing, or social engineering hacks? Contact us today for more information.

Evaluating Digital Transformation Efforts

Digital Transformation

Digital Transformation

Today’s businesses are nearly all in a period of transition. If you aren’t old enough to have lived it, all you need to do is stream a few episodes of just about any ’90s sitcom to realize that business has changed at an overwhelming pace since then. This change continues today. Companies are all at varying points on the journey of digital transformation. Some are on the bleeding edge, while most are taking a cautious or catch-up approach. A few remain blissfully unaware, but these aren’t likely to last much longer.

Doing Digital Transformation Right

Digital transformation sounds great, and I’ve already implied that it’s essential. That’s not quite accurate, though. What’s essential is doing it right. A poorly executed digital transformation can be just about as harmful as burying your head in the sand and hoping things will stay just as they are. (They won’t.)

Digital Transformation as a Journey, Not a Destination

One of the first aspects of a good digital transformation plan is to understand its nature. Digital transformation isn’t a one-and-done initiative. How do we know? For starters, we aren’t using Windows XP (or, shudder, the dreaded Windows ME) anymore. Technology will continue to evolve, and your digital transformation will continue as it does.

It’s better to think of digital transformation as a journey. Where are you right now? Where are your competitors? What do you need to do, procure, or implement to catch up with (or better, pass) your competitors? Once you’ve implemented those steps, start to look at what’s next.

Digital Transformation as Mission Critical

Businesses today must understand that digital transformation is mission critical. It’s not something you spend money on when business is booming and squeeze out of the budget when money is tight. As soon as you stop failing to innovate, you give your competitors an open door to squeeze you out of the marketplace. Keep up with your digital transformation journey and stay competitive.

Digital Transformation as a Monitored Initiative

Many companies that do form a digital transformation plan fail to follow through in some way. It’s important to regularly evaluate the progress of your company’s digital transformation plan (be it quarterly or monthly). If digital transformation is a journey rather than a destination, a company working from a 3-year-old digital roadmap is doing it wrong.

Evaluating Your Company’s Digital Transformation Efforts

Evaluating your company’s digital transformation is a complex process. If your company doesn’t have an evaluation plan in place, you might be wondering where to start. Here’s how to get started evaluating your company’s digital transformation.

Ask Questions

It’s easy to assume that a process or plan that’s not making too much noise is working well, but doing this is a mistake. As you should with any process or plan, ask plenty of questions at regular intervals. What is and isn’t working? What new implementations are causing friction among the staff? Is that friction due to lack of training or because the technology solution is failing to deliver? Is the plan sticking to budget? What new technologies or platforms are developing that should be added to the company’s digital transformation journey? What is the right time to add those technologies? Is a particular technology failing to deliver or costing more than you’d budgeted for?

Asking good questions of the right people can greatly improve your digital transformation efforts. Don’t be afraid to include a wide range of departments and seniority levels in your questioning, either.

Review Business Needs

Just as available technology changes over the years, so do your business needs. A piece of software that was mission critical in Accounting 10 years ago may be peripheral or even obsolete today. Similarly, the business needs of your Data and Analytics department today are likely quite different (and far more evolved) than they were 20 years ago. That’s assuming you even had a data and analytics group 20 years ago!

An important part of reviewing your digital transformation efforts, then, is reviewing each department’s business needs and processes. Providing new solutions to long-solved problems isn’t the best bang for your buck. Be sure you understand the problems and processes of each business unit so you can focus your digital transformation efforts in the areas that matter most.

Get the Right People in the Room

A digital transformation plan that no one really knows about isn’t going to accomplish much. A review of that plan that no one knows about won’t, either. Your digital transformation evaluation efforts should include a pretty decent cross-section of organizational leadership. The CFO and CIO (or their delegates) are key stakeholders, as are the leaders of various business units. The CEO must be informed and on board for this to be effective, though of course the size of your organization will likely guide the CEO’s level of real involvement.

Buy-In Is Key

You need the right people in the room, but you also need buy-in from those people. If digital transformation evaluation is a new concept (or a loathed one), you may need to educate first. Get the key stakeholders in a room and use points like these (not this one, of course) to help them understand the mission-critical importance of this process.

Data Is Everything (Else)

You don’t want your review meetings to be based solely on feeling. If your meetings sound a lot like “Well, Jane in Accounting is frustrated using this new software” and “I believe implementing this new platform will really help!”, you need a heaping helping of data. Task your analytics group with researching the effects of a new software suite, for example, so you have real data to go along with feelings.

Conclusion

The digital transformation journey is never-ending, and your efforts to evaluate that journey are as important as they’ve ever been. If you could use a hand, whether with the journey or its evaluation, let’s start a conversation today.

How Can Microsoft Office 365 Help Real Estate Firms?

Real Estate Office 365

Real Estate Office 365

Unlike many other professionals, real estate brokers are constantly moving and constantly juggling multiple deals and contracts at various stages. With whom a broker conducts regular business will vary drastically from day to day. And no single day is ever like another.

As a result, the role of technology for real estate professionals is crucial. For decades, real estate firms have been on the cutting edge of new organizational tech platforms, all of which surely attempt to make the life and business of brokers easier and more effective.

Nevertheless, it’s one tried and true program that’s risen above the rest: Microsoft Office 365.

How Exactly Does Microsoft Office 365 Improve the Work of Real Estate Brokers?

Microsoft Office 365 came on the global scene in 2011. The goal was to provide cloud-based Microsoft Office software via a subscription service, namely to businesses and professionals. Because Office 365 works through a subscription license, all updates are automatic and free.

For real estate agencies and their brokers, Office 365 has been a blessing from the start. Here’s why:

Office 365 juggles multiple databases on one seamless platform.

The nature of a real estate broker’s job necessitates juggling a multitude of deals and interpersonal connections at once. Moreover, each of these transactions is generally at a different stage and features varying degrees of attention and focus.

Microsoft Office 365 was built for situations like this.

Because brokers can access these databases and programs all on the same platform, each of their daily actions becomes faster, easier, and less stressful. Office 365 stores information remotely in the cloud, so even a glitch in an individual device won’t cost the broker a sale or loss of a contact. Prior to this, such a glitch may have lost an agent a full day of troubleshooting or caused a critical error, such as losing a contact’s phone number forever or completely missing an important showing.

The integrated platform of Microsoft Office 365 means brokers can traverse seamlessly from calendar, to contacts, to email, and more. In fact, all three of these features are the cornerstones of why Microsoft Office 365 works for brokers.

Calendaring is one of the platform’s key useful features, allowing easy access to a broker’s own personal calendar as well as access to co-workers’ calendars. Furthermore, a complete catalog of contacts is always at a broker’s fingertips with Office 365, and email integrates seamlessly with all other features.

Access is available and easy to use on all devices.

It’s not uncommon for a real estate broker to be on-the-go virtually all day. Whether they’re in the office, at home, hosting an open house, or showing homes to individual buyers, they need constant access to their email, calendar, and contacts.

With Office 365, all of these features and more are available on desktops, laptops, smart phones, and tablets — yet another reason it works especially well for real estate professionals.

If you own or operate a real estate firm and are interested in acquiring a Microsoft Office 365 subscription, the upgrade can improve your entire business from the start.

Such a massive transition, however, will take time and adaptation on everyone’s part. An IT management professional can help your business make this enormous shift efficiently and effectively. Speak to a managed service provider in your area today to learn more.

What Is PII Under GDPR?

GDPR PII

GDPR PII

The security of user data is of high importance, and that importance only grew with the implementation of the EU’s General Data Protection Regulation (GDPR). These sweeping new regulations went into effect on May 25, 2018. They are European Union regulations, but they have sweeping effects since they apply to any business that stores personal information of any EU citizen.

It’s important to comply with GDPR. The first step, though, is to understand what exactly GDPR requires for your business.

PII Under GDPR

The short answer to the question of what PII is under GDPR is that it’s not a thing. Personally, identifiable information is an American term. The rough European equivalent is personal data. It’s important to note, though, that the two are not identical. The European standards are more restrictive, and the European category (personal data) is, therefore, more inclusive.

Here’s the bottom line: don’t assume that if you’re PII compliant that you’re automatically GDPR compliant. You need to do more for the latter.

Defining Terms

If you’re asking the question “what is PII under GDPR?” there’s a good chance you know some of the lingo already, but it’s worth reviewing.

Personally Identifiable Information (PII)

This term refers to any number of pieces of information that a company might store that can be used to identify individuals. Bad actors who accumulate enough PII on an individual may be able to compromise the individual’s accounts or even steal the individual’s identity. Examples of PII include (but aren’t limited to) driver’s license numbers, social security numbers, full names, physical addresses, and credit card numbers.

Remember, this is an American term, not a global one.

Non-Personally Identifiable Information (non-PII)

Non-PII is what’s left that’s not PII, in the American way of viewing things. This is the kind of information that can be used in aggregate forms. It’s useful data, but it can’t be used to identify individuals on its own. Examples include IP addresses, device IDs, and cookies left behind on devices while browsing the web.

Personal Data

Personal data is the EU equivalent of PII. It’s the information that businesses store on customers that could be used to identify those customers. The important difference here is the breadth of the definition.

GDPR concludes that even non-PII can be personal data. Cookies and IP addresses, for example, can be used in conjunction with PII to help reconstruct a person’s identity. For this reason, even these forms of information are considered personal data and are protected under GDPR.

The ruling that even cookies can be considered personal data is why you’ve started seeing cookie warning messages all over the internet. Those companies are seeking to comply with GDPR by receiving permission from all visitors to use cookies.

Best Practices for Businesses

Given the changing landscape of privacy regulations, businesses must adapt and stay compliant. Here are a few best practices for complying with GDPR.

Survey What Data You Collect

The first step toward compliance is to know what your business is collecting. Conduct a comprehensive survey of the data that you collect and store through your site.

Keep Only What You Need

Second, ask the hard questions about what personal data your business truly needs. If it’s not providing real value, dump it.

Get Permission to Keep It

Whatever you decide is essential, ask permission to keep it. That’s what the cookie notices are doing, and you need to do the same.

Conclusion

Data privacy regulations are complex. You might not want to go it alone. If not, we’re here to help. Contact us today!

Will LinkedIn Phishing Threats Defeat The Popular Business Social Media Platform?

Linkedin Security Issues

The career-centered social media network LinkedIn is the latest victim of phishing efforts on the part of cybercriminals—demonstrating that no organization, no matter how big, is immune to such threats. The phishing attacks are tailored to what LinkedIn users are most likely to be interested in and seek to obtain valuable information from victims. What makes these attacks most concerning from a business perspective is that many LinkedIn users are logging in with their corporate email accounts. When the cybercriminals succeed in getting the information they want, they can gain access to the information of not just the immediate victim, but the organization they work for as well.

Linkedin Security Issues

Cybercriminals Targeting LinkedIn Users

According to the Security Awareness Training company KnowBe4, a new wave of cybercrime is hitting the LinkedIn community to gain valuable corporate information. Cybercriminals are attempting to get employees to fall for phishing emails—emails that encourage recipients to click a link that leads to a request for confidential information.

The phishing emails are designed to appeal to the personal interests of the recipients, a common tactic with phishing attacks. The goal is to excite the recipient enough that they forget to be cautious. According to KnowBe4, the most popular type of phishing email is one that has LinkedIn in the subject line. Messages from LinkedIn are opened around 50% of the time, so it makes sense for the cybercriminals to use what is most likely to work. They know that around one in two users will open an email that appears to be from LinkedIn, so they tailor their phishing emails accordingly.

Particular Concern for Those with Business Responsibilities

When a phishing attack succeeds against an average person, their personal information and financial information is at risk. But when a phishing attack succeeds against someone who has responsibilities at a business, and therefore security access to protected information of the business, it can lead to damage that harms the business and all of its employees. No one deserves to be the victim of a phishing attack, but there are individuals who, if compromised, can deliver information that will harm more than just one person.

It is predictable that the ones that cybercriminals want most to fall for their LinkedIn phishing attacks are those with higher security clearance in businesses. They know that they could strike a gold mine if they get the right person, with the right information, to fall for one of their phishing emails. That is why they are so devious in the way that they construct their traps. They look closely at the areas of interest of their targets to ensure that they have the highest chance of success.

Areas Where Cybercriminals Focus on LinkedIn

Not just any phishing email will lead to a click from the reader. To get the desired result, cybercriminals must create the kind of emails that recipients are most likely to fall for. KnowBe4 actually conducted tests on LinkedIn to determine which types of emails recipients would click the most often. As mentioned earlier, the most successful phishing emails included LinkedIn in the subject line of the email. According to an article from ChannelFutures, once the recipient looked at the email, they were most likely to click on emails that had the following in the subject line:

  • Profile Views
  • New InMail Message
  • Join my network
  • Add me to your network

It makes sense that these subjects would attract the most clicks. They all indicate an interest in the recipient, specifically the kind of interest that could lead to an excellent networking opportunity. A desired employer or contact might have looked at their profile or sent them a message. Even better, they might have requested that the recipient become part of their network, or that the recipient allow them to become part of their network. All four subjects target those who are using LinkedIn to further their careers, which explains why they were so successful.

What Can LinkedIn and Users do to Fight the Problem?

For LinkedIn, the risk of phishing scams and cybercrime is and has always been present. As the company has grown, they have been well aware of the dangers that cybercrime poses to their business and their users. That is why, as with all other major social media platforms, LinkedIn has a dedicated team to identify cybercrime on their platform and to do what they can to fight it. However, there is a limit to what LinkedIn’s dedicated security team can accomplish on their own. Once a platform has millions of users, there will always be criminals who can slip through the cracks. LinkedIn will not be defeated by cybercriminals as a platform. However, the platform’s users do need to be aware of the risks they face.

For businesses, it is best to avoid relying on LinkedIn to keep them and their employees totally secure. Companies have to accept that from time to time, their employees will be targeted by cybercriminals. That is why employee awareness training is so necessary. Businesses must train employees to be aware of the risks of cybercrime, including phishing emails. If you are worried about your employees falling for a phishing scam, consider training them in the red flags of social engineering.

To learn more about cybercrime risks and how to avoid them, please contact our IT services team. We can help you protect your employees and your business.

What Is PII?

PII Data

PII Data

If you’ve seen the acronym PII in the news or in trade magazines, you may have questions. What is it exactly, and what is the danger surrounding it? Today’s tech blog post answers these questions and more.

What Is PII?

PII stands for personally identifiable information. Personally identifiable information (from here on, we’ll just use PII) is information tied to an individual that can be used to identify that specific individual. The term usually comes up in discussions of internet security and identity theft. Most everyone in the developed world has plenty of PII. Name, race, address, age, physical description, and even photographs can be PII. So can social security numbers, credit card numbers, email addresses, usernames, and passwords.

Is PII a Bad Thing?

No, PII isn’t bad. Some of it (like name, age, and physical description) is directly tied to our core identities. Much of it is the currency by which we live our lives. You need usernames and passwords to exist on the web, and you need social security and bank account numbers to exist in the financial marketplace. These elements aren’t bad, but they can be problematic.

Then What’s the Problem with PII?

The problem with PII is that if a bad actor (like an identity thief) accumulates enough of a person’s PII, the bad actor can compromise accounts or even steal the person’s identity. While PII isn’t a bad thing, people must do what they can to rein in access to their PII.

Is All PII Created Equal?

No, it’s not. Some items are more valuable (or sensitive) than others. If all a bad actor has to work with is your full name or a photograph, he or she isn’t going to be able to do much. Similarly, if someone gets ahold of your credit card number by itself, it’s almost useless. Some PII, like social security numbers, are more valuable even on their own.

The real problem is accumulation. Thieves can do a lot of damage if they manage to match up a name with the correct social security number. The more PII they add, the more damage they can do.

How Accumulated PII Facilitates Identity Theft

The fuller an identity a thief can build, the more serious damage the thief can inflict. Knowing your name and address accomplishes little on its own. Add in a bank account or credit card number and the last four digits of your social, and now the thief may be able to sweet-talk a customer service representative into issuing a new card or approving a transfer.

How Thieves Accumulate PII

Some PII (usually from significant data breaches) is available for purchase on the dark web. Some of it gets stolen using social engineering or phishing. In too many cases, a considerable amount of PII is freely displayed on a victim’s social media account. If “Where did you go to high school?” is one of your bank account security questions and the answer is freely displayed on your Facebook profile, you’re setting yourself up for ID theft.

Keep Your PII Safe

Much of keeping control of your PII is common sense. Limit what you share on social media, and don’t give away account numbers or your social security number when it’s not necessary. These small steps will go a long way to protecting your PII.

Does your organization need additional help managing PII? Contact us today!

Plan The Perfect Microsoft Office 365 Migration

Plan The Perfect Microsoft Office 365 Migration

Plan The Perfect Microsoft Office 365 Migration

If you’re trying to figure whether Microsoft Office 365 is right for you, then migration should be one of your primary concerns.

When it comes to a cloud-based suite like this, migrating to Office 365 from your current IT environment is no small task.

That’s why you have to be sure you know what you’re doing.

Before we get to the 6 steps you should follow for a perfect Office 365 migration, let’s make sure we’re on the same page about what it actually is…

What is Microsoft Office 365?

Microsoft Office 365 is a subscription-based service that enhances Microsoft applications like Word, Outlook, PowerPoint, and Excel with the flexibility and accessibility of the cloud.

There are two primary ways that this platform breaks down – the web-based and premium desktop versions:

Web-Based Microsoft Office 365

The web-based Microsoft Office 365 Business provides users with online (browser-based) access to all their range of favorite Microsoft Office apps:

  • Word (word processing)
  • Excel (spreadsheets)
  • PowerPoint (presentations)
  • Outlook (email)
  • OneNote (note-taking)
  • OneDrive (file hosting and synchronization with 1 TB of storage)
  • Access (database management, for PCs only)

Premium Office 365

The Premium desktop-based alternative gives users a range of enhanced and advanced features:

  • Exchange (mail server and calendaring management)
  • SharePoint (website building tool to share, organize, store and access information)
  • Teams (a tool for collaboration, meetings, chat, and communication)
  • Planner (task and teamwork management)
  • Invoicing, booking and business intelligence tools
  • Customer relationship management functions
  • Yammer, Microsoft’s social media platform that enables users to collaborate and connect with each other

However, that’s really just the beginning as to how the many tiers of Microsoft Office 365 plans break down…

What Microsoft Office 365 plans are there, and what do they cost?

As a flagship offering from Microsoft, Office 365 comes in many shapes and sizes. So many, in fact, that you might not know where to begin.

The following list breaks down the many primary plan types offered for Microsoft Office 365, what they include, and how much they cost.

For each plan, these prices refer to a per-user basis, per month. To figure out what it would cost you, simply count the number of users you need to add from your business, and you’ve got your monthly cost – that’s easy to compare against your IT budget.

Exchange Plan 1 – $4.95 USD per user per month
Essentially just the email client aspect of the much larger Microsoft Office 365 platform, this plan includes:

  • Secure corporate email
  • 50 GB of inbox storage per user
  • Sent messages up to 150MB
  • All inbox management features available – sharing calendar dates and contacts, out of office messages, web-based email support.

SharePoint Online Plan 2 – $8.95 USD per user per month
Primarily designed as a file sharing and storage plan, this plan features SharePoint and OneDrive, as well as:

  • Unlimited personal cloud storage
  • Real-time co-authoring of files in the Microsoft suite of apps
  • Centralizing and indexing of the user’s content in libraries and lists with metadata records management, and retention policies
  • SharePoint mobile capability
  • In-Place Holds that allow users to preserve content from edits or deletion

ProPlus – $12.95 USD per user per month
In addition to Microsoft Outlook, Word, Excel, PowerPoint, Access (PC only), Publisher (PC only) and OneDrive (1TB storage), this plan includes:

  • Web-based and desktop versions of the above Microsoft applications
  • Skype for Business client (service not included)
  • Licenses for an unlimited number of users

Enterprise E3 – $21.95 USD per user per month

Including all the applications, services and features of ProPlus, this plan also provides:

  • File storage and collaboration with OneDrive and SharePoint
  • Additional apps and services listed under the Premium suite above, such as Microsoft Teams, Yammer, and Stream (providing users with the ability to stream video to team members and other contacts)
  • Email hosting with 100GB of inbox storage and custom email domains
  • Unlimited personal cloud storage
  • Online video conferencing for up to 250 attendees
  • Online meetings for up to 10,000 attendees through Skype Meeting Broadcast or Microsoft Teams live

Business Essentials – $7.95 USD per user per month
An even more business-focused plan, this offering includes:

  • Mobile installation of Office apps (up to 5 devices per user)
  • Outlook email (50 GB of inbox storage per user and sent messages up to 150MB)
  • OneDrive for Business (1 TB of cloud storage per user)
  • Microsoft Teams
  • HD video conferencing
  • Yammer collaboration software
  • Office online (browser-based suite of Office apps)
  • Planner (project management platform that allows staff to plan projects, assign tasks, share files and communicate)
  • Microsoft Flow (workflow automation app that allows users to automatically configure notifications, sync files, collect data without having to code the process)
  • PowerApps (app development platform that allows users to build business-specific web and mobile apps)

Business Premium – $14.95 USD per user per month
In addition to the complete desktop and online Office 365 suite of applications (Outlook, Word, Excel, PowerPoint, Teams, OneNote, Access [PC only], Publisher [PC only], Sharepoint, and OneDrive), this plan offer includes:

  • Business management and CRM tools – Outlook Customer Manager, Bookings, Invoicing and MileIQ
  • The range of online services offered in lower-tier plans like ProPlus and Business Essentials

Business – $20.00 USD per user per month

As the most commonly recommended plan for businesses, Microsoft Office 365 Business includes everything Business Premium has to offer, plus:

  • Enhanced security features such as attachment scanning and link checking for email, Information Protection Policies that add controls over how info is accessed, and data backup features that keep your information accessible
  • Device management features, fully integrated with iOS, Android and Windows, that allow for simple deployment and management of Windows on your mobile platforms

So that’s what these plans include – but obviously, that’s not all you need to know to make your decision.

There’s another key question…

What about Microsoft Office 365 migration?

Now that you know more about Microsoft Office 365, you may be interested in seeing what it can do for your business firsthand.

Unfortunately, it’s not that simple.

If you’re not already using Microsoft Office 365, then you have to figure out how to migrate to it. Migrating from one business technology to another isn’t necessarily a simple process.

Before starting on the step by step process, make sure you have these three key aspects of prepared:

List of Users

Keeping careful track of how many users you have and what they need to do will make migration much smoother than it would be otherwise. The last thing you want to do is overlook a user here or there and find they can’t access the system after launch because there weren’t enough licenses or log-ins arranged.

Temporary Passwords

While you sort out the details of your new Microsoft Office 365 environment, it’s smart to work with temporary passwords. That way, it’s easy to test the environment without issuing official credentials and log-in info.

Domain Registrar Information

This is especially important for Microsoft Office 365 migrations – why? Because email is a central facet of Office 365. In order to ensure seamless changeover between your previous email client and Microsoft Outlook, you’ll need complete information on your domain registrar.

The 6 Step Process To Microsoft Office 365 Migration

Planning makes all the difference between a successful migration and a disastrous one.

Follow these steps and take your time to execute an effective migration:

Plan ahead.
When preparing for your migration to Microsoft Office 365, it’s important to plan efficiently and thoroughly.

The best way to achieve this is with an actual meeting with those who are involved in the process. You should talk through a number of key factors both in the migration, such as:

  • Why are we choosing to migrate?
  • What benefits do we expect to gain from migrating?
  • How will our infrastructure change during migration?
  • How will the user experience change after migration?
  • How will we train staff members on using Microsoft Office 365?

This is an especially vital step because, if you don’t have answers to these questions, then you probably aren’t ready to migrate.

Knowing how to answer these questions means that you can avoid common pitfalls and hit the ground running with your new IT environment.

Furthermore, you’ll want to make sure your entire staff understands what migration means for their work. What kind of downtime will they encounter, what are the benefits they will have access to once it’s complete, etc.

Plan for your infrastructure.

The new Microsoft Office 365 environment will be built on the foundation that is your infrastructure, so you better make sure it is up to the task before you start.

Infrastructure-based considerations should include:

  • Bandwidth: You should assess your bandwidth to zero in on exactly how many concurrent client machines are connected to the network at any one point in time.  In theory, your bandwidth should be able to support at least that many concurrent machines running Microsoft Office 365, which dictates that necessary network segments and connections you’ll need.
  • Hardware: Migration is a great opportunity to take stock of your hardware. For example, in your new environment, will you need a server dedicated for Skype for Business? That depends on how heavily you plan to make use of it. This is the type of question you need to answer (and do something about) before you migrate, and not after.
  • Software: As Microsoft Office 365 provides virtually all the software you could possibly use, there isn’t too much to take stock of in your old environment.
  • However, if you and your staff currently use mail-enabled applications that you’re fond of, or that are so specific to your business and industry that you’ll need them post-migration anyway, then you need to make sure they are compatible with Exchange Web Services.

Equip yourself with a deployment tool.

The good news is that you won’t have to handle much of the migration process all on your own. Microsoft offers a Deployment Readiness Tool to help users plan out the many aspects of a successful migration – primarily, environment discovery.

This tool can analyze and gather info on your IT system’s Active Directory and domain settings, helping to take stock of your Exchange, SharePoint, End User environment and Skye for Business settings. In addition to the app-based features, the Deployment Readiness Tool will also log your network configurations and settings so that they are carried over in migration as well.

Furthermore, Microsoft also has an Assessment and Planning Toolkit. While it is not designed specifically for Office 365, it is useful for discovery and inventory of cloud services and applications. If you’re migrating from a cloud-based or hybrid environment, the Assessment and Planning Toolkit will likely be a useful aid in determining what you need to keep track of.

App-specific planning.

While much of Office 365 will migrate seamlessly from one version of Microsoft Word or Excel to the next, there are a couple of Microsoft apps and service that will require further attention when you migrate:

  • Sharepoint: Prior to connecting to Sharepoint, there are a few steps you’ll need to take through the Administration Center. Primarily, you’ll want to double check global site collection settings, Internet, Intranet, and Extranet settings, user profiles, and MySite.  In each of these cases, you’ll want to be sure that their settings match those of your current environment. The default settings in Sharepoint may not match your current ones, so take the time to verify before you start sharing business data.
  • Skype For Business: If you and your staff intend to use Skype For Business, particularly public Instant Messaging, then you’ll need to make sure your staff knows how.  Specifically, Windows Live is supported for public IM in Skype for Business, but Yahoo is not. Furthermore, this is separate from on-premises IM. In both cases, your staff will need to know how it works in order to get the most out of it. If you intend to use public IM, you may need to migrate from Yahoo entirely.

Lay out the end-user experience.

Once you’re done migrating, you’ll want your staff to be able to hit the ground running, right?

Then make sure they can actually do so before you start the migration. This means making sure the browsers they use are supported for web-based office 365, and the operating systems they use are supported for the suite:

  • Supported browsers: Internet Explorer, Mozilla Firefox, Google Chrome
  • Operating systems: Microsoft Office 2010, 2007 SP2, 2008 for Mac, Office Web Apps

It’s time to migrate.

Now that all the groundwork has been done, you’re ready to migrate.

Remember, there’s no rushing this process. If you want it to be effective, and if you want your new Microsoft Office 365 environment to work as planned, then be patient and follow the steps carefully.

Is Microsoft Office 365 right for you?

Depending on what you do for business, how large your organization is, what your budget will allow, Microsoft Office 365 may or may not be the right choice. Only you can decide for sure.

If you do believe that Microsoft Office 365 will have a positive effect for you, then make sure to carefully plan your migration. Regardless of whatever benefits it may bring you, a poorly planned migration is not worth the trouble it causes.