Password Management For Law Firms (Questions/Answers)

Password Management

We can’t function without passwords. So much of the internet is built on the concept of a username plus a password that the concept is core to users’ internet experience. It’s a clever but imperfect system that could certainly be improved upon, but until a game-changing replacement comes along, we have to play the game.

Password Management

There’s a lot that doesn’t work very well about this system, and many people have questions about what password management best practices are. To that end, here’s a Q&A about passwords and password management.

What’s the biggest problem with how people use passwords?

The biggest problem with internet passwords is password management. Users have dozens if not hundreds of username/password combinations that they need for personal and business use. The problem with this is that nearly no one can reliably remember one hundred unique passwords. Many users, then, select overly simple (and easy to guess) passwords, or they reuse passwords across many sites.

What’s wrong with reusing passwords?

We live in a world of data breaches. When (not if) someone hacks favorite retailer or hotel chain, it’s embarrassing for those companies, but probably doesn’t affect your life too much. If the culprits gain access to your username and password for those sites, it’s a nuisance, but the amount of damage they can do is limited.

But when your hotel rewards password is the same as your credit card password and your banking password, you could have a mess on your hands. Scammers know that at least 51% of people reuse passwords, and you can bet they’ll try those stolen passwords on other, more valuable sites.

What makes a strong password?

A strong password is one that neither human nor machine can guess easily. Forbes compiles an annual list of the worst passwords being widely used, and it’s topped with gems like password123456, and qwerty. These are terrible because they’re just about the first things a human might guess. Other bad choices on the human front are the names of people, pets, or places that everyone knows are meaningful to you.

On the machine side, the shorter and simpler the password, the easier to hack. Make your password harder to brute-force by adding length, capital letters, numbers, and symbols. A password of 12 to 16 characters that mixes all these character types is generally considered a strong password.

I just keep my passwords on a sticky note. What’s wrong with that?

In short, everything. A sticky note hidden under your keyboard isn’t exactly a state secret. Think about who might have momentary access to see that sticky note. Clients? The cleaning crew? Maintenance personnel? Who else? This is especially disconcerting In the legal world, where those passwords could give a bad actor access to confidential materials that are under attorney/client privilege.

How can I remember passwords like j#%3M82*mRz!+?

Truthfully, you probably can’t. While that’s a tough password to crack, it’s not very useful for you. A better approach is to take a phrase that you can remember (perhaps one that relates in some tangential way to the site you’re on), and then make the phrase longer and more complex.

For example, iloveturtles is an easy phrase to remember, but it’s not that challenging to guess or to crack. Mix up the phrase by adding replacement characters, like <3iL0v3TurtleS<3, and neither your office mate nor a computer will easily guess or break your password.

Admittedly, this method has limits. Your own memory can be an obstacle, and sites vary with which characters they’ll allow in passwords.

I can’t remember 100 unique, complex passwords. What are my options?

Passwords need to be complex, and you shouldn’t reuse them from site to site. This creates a problem: Who can remember them all? One option that’s gaining a lot of traction in both the personal and enterprise markets, including in the law and legal tech fields, is using a password management tool. You’ve likely seen these advertised as “the last password you’ll ever need” or “one password to rule them all”; stuff like that. Password management tools are a reliable, secure way to generate and remember unique, complex passwords for all the sites and accounts you have.

How does a password management tool work?

Password management tools vary a little bit in terms of functionality, but at the core the services are similar.

  1. First, you input or import all your existing credentials to the password management tool.
  2. Next, you turn all your current weak passwords into strong ones. Some password management tools can do this automatically for you on many websites.
  3. Last, you create one strong, secure password for your password management tool account.

After you’ve completed these steps, you’ll have just one password to remember—the password to your password management tool. It will store the rest of your credentials in a secure, encrypted vault and use them to log you into whatever account you need.

Are password management tools secure?

Yes. The companies offering these tools would be sued out of existence if not. Don’t believe us? Check out what a panel of experts has to say on the topic.

Conclusion

If you have additional questions about implementing a password management tool in your law office, contact us today. We’re here to help.

How Much Does Managed IT Services Cost?

Managed Services Pricing Guide

Managed Services Pricing Guide

You have probably seen managed IT services offered from one or more providers in your area. The option of having your IT needs managed by an outside company has obvious appeal—you do not need to maintain a full-time IT staff, or at least as many IT employees, which should save your business some money. However, as a manager or business owner, you know it is important to read between the lines before jumping on just any opportunity that presents itself. How much does it actually cost to use managed IT services?

Managed IT Services Pricing Depends on Multiple Factors

The cost of having your IT needs managed by an outside provider depends on multiple factors. Each business has specific technologies that may be relatively simple or quite complex. The more complex the technology, the more it costs to maintain. And the level of management you can choose from varies as well. Managed IT services range from basic to comprehensive and are priced accordingly.

So What Does it Cost?

If you are looking for a direct answer to the question of what managed IT costs, you can estimate that your business could pay anywhere between $75 per user to $300 per user. The range is broad and maybe not terribly useful at first glance, which is why we encourage you to read on—and ultimately to speak to a reputable service provider to get a quote based on your specific situation and needs. Now let’s delve deeper into how managed IT services are priced so you can get a better idea of what your costs may be.

What Are Managed IT Services?

The biggest challenge with determining the cost of managed IT services—as we are attempting here—is the fact that there are so many services that fall under the umbrella of “IT”. Your business may have drastically different IT needs than another business. That being said, we can look at the basics of managed IT services to get a clearer picture of where your business may fall on the spectrum of technology service needs.

First, let us define what managed IT services means. At the core, managed IT means your IT needs, whatever those may be, are managed by an outside company. A team of experts offers to manage your IT needs, or at least a portion of those needs, for a fee. There is a huge range of services that fall into the IT category, though, which means managing a company’s IT could mean managing 10, 20, or 1,000 different things.

Network Support For Small Businesses

Managed IT services are presented as a way to save money because outsourcing IT management is typically more efficient for most businesses than employing a team of IT professionals. IT is a deep, complex subject, requiring extensive training in specific technologies and practices. Employing a team with the skillset to manage all your IT needs is costly, which is why only large corporations tend to do it. For small and mid-sized businesses, it often makes more sense to outsource IT management. With outsourcing, you only pay for the services you need, much like you would for legal services or other specialized, potentially high-cost services.

The Two Basic Approaches to Managed IT

Managed IT services fall under two broad categories—fully managed IT and partially managed IT.

Partially Managed IT Services

Some businesses have one or more employees that are tasked with managing IT. You may have specific IT needs that require a dedicated IT team to handle in-house. Even if you do not have an absolute need for an in-house IT person or group, you may just feel more comfortable having someone or a team there, in-person, every day to deal with certain IT tasks.

For businesses with existing IT personnel, IT service providers offer partially managed IT services. You can choose what they manage and when. Partial management can range from providing support for tasks that are exceptionally complex—possibly beyond the skill or workload of the in-house IT team—to providing support for routine tasks like security or backup administration.

Fully Managed IT Services

For many small to mid-sized businesses, the most economical and efficient option is to outsource all IT management. Instead of trying to determine what kind of IT employees you need, how many, etc., you can consult with a service provider who can give you expert insight, advice and the service necessary to keep your business technology running smoothly 24/7. A reputable managed IT services provider will be capable of collaborating with you and other leaders in your organization and deliver industry-leading services that an in-house team may struggle to match.

How Managed IT Service Pricing Works

The price for managed IT services varies by region, provider and customer. That being said, there are a few basic concepts that can help you understand how pricing works. These include:

Per User Pricing

Many service plans will be based on the number of users that are being monitored and cared for. You can calculate your users fairly easily—whoever is using the technology in your company can be considered a user. In today’s technology-driven workplaces, you can usually expect every employee to be a “user.” Anyone in your business that uses a PC, Mac, laptop, mobile device, tablet or anything else that requires IT support is someone you should count towards your total users.

Per Device Pricing

While per-user pricing is probably the most common, per device pricing is also a possibility. Instead of pricing services based on how many people are using the technology, the provider may offer to charge based on how many devices your business uses. You would include all the devices you want to be covered—which really should be every device that sees any use in your company—including PCs, Macs, laptops, tablets, mobile devices, etc.

Pricing Should Be Clear and Easy to Understand

Any reputable IT services company will be very clear about what your services will cost and what will be covered by the fees you pay. It will all be documented in your contract, so you can verify what you agree to before you sign anything or hand over any money. Clarity is beneficial for both you as a customer and for the IT company as they can justify their actions—or inaction—based on the contract that you both agreed to.

Managed Services Pricing

The Managed IT Service Options Available

IT management services are further broken down into service levels. The names that different providers use may vary, but you can expect services to fall into three general tiers:

1. Basic IT Services—Lowest Price Initially, But Variable Costs Are High

The entry-level IT management services are offered at the lowest recurring price. They involve basic monitoring of your systems and can cost around $70-150 a month. The services you get at this level are akin to having a security team keep track of your server. The organization pays close attention to what is going on and lets you know if anything seems off.

There are obvious benefits to having this kind of security and oversight, but the benefits are limited and the cost can go up quickly if you need any additional assistance. This is especially true if you do not have an IT team to address things when they do go wrong. If you need the IT service provider to do anything beyond monitor and notify, you can expect to pay between $50 and $300 per hour for assistance—depending on the complexity of the problem that needs to be solved.

It may be possible to purchase a block of time from the service provider at a discounted rate. If you can negotiate a contract for a block of time, you can have the IT provider work on issues until that block of time is used up. Of course, you will need to decide which issues are worth using the block for, and which may need to wait until next month when you have another block of time—or pay for a full-priced solution right now when you need it.

2. Mid-Range IT Services—Considered the Best Value for Most Businesses

As with so many things, the lowest priced option is often more expensive in the long run. IT services are no different. A mid-range managed IT service is more expensive up front, but can often save money over time as your service provider is able to help you avoid issues before they become major—and read to address issues immediately when they are easiest to solve.

Once you get into mid-range services, you are hiring more than just a monitoring service. You are hiring a team to serve as your IT provider in most if not all ways. The team will definitely keep track of your systems and notify you when something of concern pops up. But they will also take the initiative to solve those problems without the need for you to make unnecessary decisions—like whether you want to pay extra for the help. You have already hired the team at a rate that allows them to go into action now instead of later.

The services you can get, for a flat fee, may include:

  • IT planning
  • IT strategy
  • IT design
  • System backups
  • 24/7 IT support (possibly unlimited)
  • On-site support
  • Remote support
  • Disaster recovery

Mid-range IT management services are usually priced based on the number of users you have, or the number of devices you need support for.

Typical charges per user range from $50-$200 per user.

For per device services, pricing will be based on the type of device. For servers, you could pay between $120-500 per server. Workstations may cost between $30-120 per station. Firewalls can cost between $25-100, while switches may cost between $10-50 per switch.

3. High-End IT Services—Only Necessary in Certain Circumstances

The high-end of managed IT services is only necessary for certain types of businesses—specifically those that need full hosted or cloud systems. If the IT service provider needs to provide your business with the majority, or your entire infrastructure, then your fee will include the cost of providing that infrastructure. You get the full scope of services for the increased cost of the high-end pricing, including the use of the system and the support services you need with that system—as well as all the services offered in mid-range plans. A fully hosted service may cost $300 or more per user, per month, depending on the complexity of what is provided.

Managed Services Provider

Some Factors to Consider With Pricing Managed IT Services

IT service providers are in business, just like you, so they need to price their services in a way that keeps them in business. As with most, if not all, businesses, IT service providers base their pricing on how much time and resources they will need to devote to the customer to get the job done. The harder the job, the more they need to charge. And the more unpredictable the job, the more pricing needs to account for possible spikes in time and resources required for the customer.

When an IT company is deciding how much to charge you, they will consider the following factors:

How Complex is Your Technology Matrix?

Your technology matrix includes all of your technological devices and the ways that they need to interact with one another. The more devices, the more variety, the more connectivity that must be maintained, the higher the workload the service provider will expect. Your system or systems may include:

  • Laptops
  • Smartphones
  • Tablets
  • Desktops
  • PCs
  • Macs
  • Servers
  • Workstations
  • Antivirus software
  • Wi-Fi for internal use
  • Wi-Fi for guests
  • Web filtering
  • Personal devices
  • Cloud applications
  • Unique connectivity issues—like warehouse use or outdoor use
  • Business software

This is a very small list of potential devices, software and circumstances. You can see how the complexity of a system can increase rapidly, even if you are not what is considered a technology-oriented company.

Do You Have an Existing IT Team?

At first glance, it is easy to assume that having your own IT team would make the job of the outsourced team easier—but this is not always true. Integrating with an existing team presents its own challenges. If you are just hiring the outside team for a specialized task it may be economical, but the price of individualized services is not necessarily the best deal. The more control the outsourced team has the better they can predict their workload, which can make for a better deal with pricing.

Do You Need Individual Services or Comprehensive Services?

When an IT management company is monitoring your system and tells you of a problem, you have the option of hiring that company to address the issue. The actual monitoring work is relatively low demand, which is why it is inexpensive. But actually addressing the issue requires bringing in an IT professional to examine the problem, identify a solution and implement that solution. The IT company only has so many employees, which means taking care of your problem may mean pulling a team member off of a current project to deal with the problem.

The cost of having your service provider address issues on a per case basis reflects the challenge of dealing with problems as they arise. But when you pay for comprehensive services, like with a mid-range plan, you are compensating the company to keep an employee on-hand for your issues. There may still be some juggling of resources to meet unexpected needs, but much of the workload of handling your systems has been accounted for.

What Will My Managed IT Services Cost?

You cannot get an accurate quote for your specific situation from an article, but you can use the information provided here to identify where your needs lie on the spectrum of potential services. Take a close look at your business and IT needs and consider the following:

  • Do you have your own IT staff, or do you want to have one or more staff members devoted to IT?
  • What is the complexity of your technology? (Answering this question with real accuracy may be difficult to do without the assistance of an IT professional. Even so, it is worth considering to get a ballpark idea of what you will be asking the IT service provider to do for your business.)
  • Will you be satisfied with remote services, or do you want to have someone on-site at least part of the time?
  • Do you need a full network provided for you, or do you have a network on-site?
  • Are you interested in a low initial price point for basic monitoring services—with the potentially high cost of individual services as needed? Or do you that a flat fee for everything would be more appropriate for your needs?

Things to Consider if you Do Have Internal IT Staff

When you have your own IT staff, there is an additional layer of questions you need to ask yourself. Having an “IT” team can mean a lot of different things. You could have one or more serious IT professionals on staff that have the credentials and training to handle a wide variety of tasks. Or, you could have an employee that does basic technology support—that may or may not even specialize in IT. Maybe you have something in between these two scenarios? As you can see, your situation may be entirely different than that of another business.

If you have a serious IT team, you can decide if maintaining that team makes sense for your business. If it does, you can consult with that team to determine what kind of outsourced services you need. If it does not make sense to keep the team, you could consult with different IT providers about how they might take over the role of your team.

If you do not have a serious IT team, it may make more sense to outsource and move your existing IT people—if you have any—to roles that they are better suited for.

Are There Other Options Besides Managed IT Services?

While managed IT services are the recommended choice for most businesses based on cost and efficiency, there are other options available. These include:

On-Demand IT Services

There are a lot of different names for this kind of service, including pay-as-you-go, break-fix, hourly and time & materials. They all refer to the concept of paying for IT services only when you need them. The term break-fix sums the idea up perfectly. If your team breaks something, the IT provider will fix it. Given the unpredictability involved, the cost for these services tends to be high. It may cost anywhere between $50-300 an hour depending on the job, along with the cost of any materials needed.

Block Time

This is a lot like on-demand, as you still get the help you need on demand, but because you pay early you get a discount. You can arrange a deal where you pay for a block of time. When something breaks, you contact the IT provider and let them know you need help. They work for as long as the amount of time you have paid for. If you need more time, they will generally charge you at the hourly rate.

Support from Your Software Vendor

Some software vendors will provide support for their specific products. The support may be included in the price of the software. Usually, you will need to pay extra for support, which may cost thousands or tens of thousands depending on the software.

Get an Accurate Quote—Contact Your Preferred IT Services Provider

As you know, technology can be confusing and frustrating when things start to go wrong. The idea behind managed IT services is that you can keep confusion and frustration to a minimum by outsourcing the management of your technology systems.

If you would like to know precisely what managed IT services will cost for your business, please contact us. We are standing by to give you a quote based on your unique needs.

Canadian Healthcare Organization Breaks Trail In Health IT

Canadian Healthcare

This innovative Canadian health care organization is making waves in the industry when it comes to health IT. At Humber River Hospital in Toronto, Ontario, IT is being integrated into just about everything the organization does, and it is being done with great enthusiasm. This is wonderful news for health care organizations around the country and the world, as Humber River is providing a road map as to what other organizations can do to make things better in every way for employees and patients alike.

Bringing Hospitals into the 21st Century

Traditionally, hospitals have not been known as organizations that change quickly or dramatically. Until recently, Humber River was no exception. However, things changed when they hired their current CIO, Peter Bak. Peter has a commitment to defining a culture of innovation at Humber, and he entered his current position with this goal. Since he arrived, things at Humber River have changed in a variety of ways, and all for the better.

Some of the IT innovations that Bak has spearheaded at Humber River Hospital include:

  • Having all of its information available in electronic form
  • Increasing and improving digital patient engagement
  • Robotic appliances that travel around the hospital to deliver supplies
  • Automating whatever can be automated, in order to create safer and more efficient workflows
  • Linking people to assets in the hospital, such as using IT to help employees find available wheelchairs or other necessary supplies

Improving Employee Communication at Work

The connectivity that Bak supports and promotes is not just limited to inanimate objects, either. He encourages the same type of connectivity among employees. This includes connecting the various care teams of the hospital, which often have significant communication gaps between them. With Bak’s innovations, this is no longer an issue, which creates a better experience for employees as well as patients.

Interpersonal connectivity between care teams is encouraged through the use of telecommunications tools. The hospital uses the highest quality telecommunications tools to allow employees to more easily talk to each other, as well as allowing them to communicate more easily with the IT in the building. The tools also ensure that the right alerts and alarms go off to the correct clinicians in the building, which improves patient safety and outcomes, and makes for a better patient experience, while allowing clinicians to do their jobs to the best of their ability with greater ease.

Using Analytics to Improve Outcomes and Communication Efficiency

Another thing Bak has emphasized since taking on his role at Humber River is analytics. The goal was to leverage electronic data in a way that provided the hospital and its various care teams with good analytics in a simple and easily accessible way. With the correct analytics in hand, care teams can see exactly how they are doing, what they need to do to improve, and how to get patients what they need in a more timely and efficient manner. The hospital is currently experimenting with the use of analytics to eliminate never events there.

Humber River Hospital’s ultimate goal with all of these IT innovations is to provide their patients with the highest quality of care, while giving them the best possible outcomes every single time. Leveraging the use of IT in this goal is helping them be among the best in the industry. What they are doing shows other hospitals how to do the same thing to improve their own employee experience and standard of care for their patients.

Providing an Innovation Map for Others

In any industry, someone has to be an innovator and lead the way into the next level way of doing things. Among Toronto’s hospitals, that entity is Humber River Hospital. It is serving as an inspiration and a guide for others to do the same.

The lack of good use of IT in the health care field is something Bak definitely noticed. The consumer world had already mastered the use of IT in efficient communication. However, the health care industry was languishing in the Dark Ages by not using those available technologies. He saw how using old-fashioned methods of communication was resulting in poorer outcomes for patients, and determined to do something about it. He pushed Humber River Hospital into the 21st century in terms of using technology for improving communications. Today, his efforts have tangible successes. Other health care organizations would do well to follow the map this one innovative place has created for them.

What Exactly Does A Managed IT Services Company Provide?

Managed IT Services Company

Managed IT Services Company

Running a business requires a great deal of focused attention. Unfortunately, when your technology team is spending a great deal of time dealing with login problems, software licensing, cybersecurity and more, it doesn’t leave a lot of time for growth activities and strategic thinking. As businesses grow, many organizations find that it makes sense to work with an IT managed services company to maintain a high level of security and staff productivity that would be nearly impossible using only internal assets. These technology partners provide best-in-class tools and support that can scale with your business as you expand. Here’s an overview of the type of services that many of these technology partners provide.

Day-to-Day Operations

Technology teams often refer to “death by a thousand cuts” — which is what happens when you have dozens of people relying on you to provide technical support for your organization. Everything from computers that refuse to reboot to conference rooms where the projection isn’t working all come into your help desk. This can overwhelm the individuals in IT and also cause a productivity loss for the staff members who are waiting on a response or support. IT managed services providers are able to step into this gap and solve a variety of simple challenges, including:

  • Retrieving lost files or folders
  • Resetting passwords
  • Issuing software licenses (based on pre-set business parameters)
  • Troubleshooting network connectivity
  • Rebooting servers

These are only a few of the “Help me now!” requests that technology professionals receive on a daily basis, and all of these options can be resolved remotely by a friendly technician from your IT managed services provider.

Creating or Refining Cybersecurity

Ensuring that your business information stays safe is a primary directive for today’s organizations. With many companies storing personal financial and health information for clients or staff, cybercriminals are enjoying access to data from organizations of all sizes — especially those businesses without a robust security posture. Staying current with the latest threats takes time and attention, and can be challenging for technology staff members to juggle with other priorities. When you work with a managed services provider, you have easy and immediate access to cybersecurity professionals who are able to review your current processes, make recommendations for improvement and then even help with the implementation of those suggestions.

Long-Term Technology Strategies and Budgeting

Even things that you might think of as integral to your business can be supported through a trusted IT managed services provider. A good technology partner may have access to dozens of business models and be able to make recommendations for your business based on a broader scope of understanding. Your external IT team can help with research on new vendor partners, negotiating better pricing on software due to shared buying power and even help create budgets based on the unique needs of your business.

Advanced Backup and Disaster Recovery

Should the unthinkable happen, it definitely pays to be prepared. There are any number of reasons you might have to restore operations from a backup, but without a proactive backup and disaster recovery process in place this can be a big challenge for businesses. Massive fires, flooding or other natural disasters claim thousands of businesses every year, as those businesses are unable to restart operations after a disaster. Cyberthreats or data loss could also spell doom for your business, especially if the loss leads to an extended period of time without access to your business data. With an IT managed services partner, you’re gaining access to advanced backup and disaster recovery software and protocols that will help protect your business in the event of an emergency — and help you restart operations quickly. More than 96% of businesses with a disaster recovery solution in place continue operations, but the same cannot be said of those without the forethought to create a comprehensive plan.

There are hundreds of scenarios where an IT managed services provider can help support your business. The bottom line is that you are gaining access to a deep bench of qualified professionals who are solely focused on helping make your business successful. Whether you need immediate assistance with help desk support or longer-term strategic advice, IT managed services providers serve a vital role in today’s business world.

Is Your IT Company Offering vCIO Services?

vCIO

vCIO

If your IT department is like many in the U.S., you are struggling with day-to-day operations — leaving very little time for strategic thinking about your business. Even if the time was available, would your team have the expertise and skillsets necessary to create a fully-featured technology plan, budget and business plans for the future? Organizations often hire all-purpose employees, people who are able to wear multiple hats. These generalists are excellent at keeping the business running and creating a great deal of value, but may not have the depth of knowledge required to survey the technology landscape and make recommendations that will guide the future of your business. As organizations turn to IT managed services partners to outsource more of their technology needs, there’s still a gap in terms of strategic thinking. A virtual CIO can help step into that gap and provide your business with the long-term strategic insight that will help you optimize your operations and crush the competition.

What is a vCIO?

Chief Information Officers, or CIOs, are rarely found in small to mid-size businesses as this can be an extremely expensive skillset. You may not need someone employed at this level full-time, but there are several times throughout the year when their guidance would come in handy. Budgeting, competitive analysis, operational efficiency planning and cybersecurity are a few of the topics that a CIO would address in an enterprise, and smaller businesses have the same concerns with a greatly reduced annual budget. A virtual CIO is a high-level executive who is able to step into your organization, understand your business needs and model, and make solid recommendations that will help your business be competitive in the future.

How Can a vCIO Help My Business?

You can see how a vCIO could help with budgeting, and longer-term strategic planning, but are there other ways that these individuals could add value to your business? Planning for the next several years requires a solid understanding of your business model, employees and competitive landscape. Your vCIO will also need to a great deal of research to understand your current software and hardware platforms and other options that are on the market. Your vCIO can also:

  • Provide crossover business knowledge as a subject matter expert on a variety of topics
  • Define IT infrastructure lifecycle recommendations, feeding into your multi-year technology budget
  • Target inefficient operations, proposing changes that will save time and boost productivity
  • Align technology strategies with business objectives to facilitate business process improvement throughout the organization
  • Review vendor contracts and relationships, looking for economies of scale and reducing overlap
  • Make suggestions for new business technologies that have recently entered the market
  • Review overall disaster preparedness, including backup and recovery procedures and cybersecurity posture
  • Determine operational readiness to deliver key product offerings
  • Competitive analysis with an eye towards consolidation and information business technology solutions in the future

As you can see, these services are best delivered by an individual with over a decade of experience in business and technology, with the insight needed to recommend solutions that will meet core business requirements.

Getting Started with Your vCIO

Before your virtual CIO makes any recommendations for your business, they will be doing a great deal of listening and learning from your internal teams and may even request to interview vendors. They will review the competitive landscape, see what type of technology your partners and competitors are using and make lists of the current technology being used in your business. Your vCIO should ask a lot of questions, trying to determine where there are logical breakdowns in operations that could be addressed by advanced technology solutions. Finally, they will need to understand the budgetary landscape — is your business going to be able to make significant investments in technology in the near future, or are you looking for ways to reduce overall expenses? All of this information will go into their overarching analysis, as they attempt to plot a workable technology roadmap for your business.

Understanding the Technology Landscape

The technology landscape is complex and ever-changing, and your vCIO needs to have a solid understanding of the technology that will impact your business — as well as any future functionality for core software and hardware. Understanding your services delivery model and staffing requirements allows your vCIO to appropriately scale software and hardware rollouts, determining whether it’s time to move critical functions to the cloud, for instance. A firm understanding of the value proposition for cloud-based storage and applications versus the value of on-premise solutions is crucial, as technology and business teams become more mobile and look for flexible work solutions that are less dependent on their physical locations. Physical security as well as cybersecurity are hot topics for Chief Information Officers, as the threat landscape continues to morph and cybercriminals become more aggressive.

Having access to a vCIO provides your organization with a broad-spectrum talent, someone who can look not only at the problems of today — but at the solutions that will drive your business in the future. Your IT managed services provider may be able to provide this type of support, with the added value that they are already familiar with your business model and needs.

What Is Windows Lite?

Is Windows Lite Microsoft’s Answer to Google’s Chrome OS?

Microsoft is working on a new operating system — Lite — with a different look that’s designed for the casual computer user while targeting Google’s Chrome OS  

Windows Lite

Windows Lite is the oft-rumored, highly anticipated stripped-down operating system that Microsoft is reportedly working and could be unveiled sometime in the spring of 2019. What exactly is Windows Lite and why is Microsoft investing in it?

What Is Windows Lite?

Rumors began to surface in late 2018 that Microsoft was working on a new version of its Windows 10 operating system. While details have spotty at best, it appears that Windows Lite is intended to be Microsoft’s latest attempt to compete with Google’s Chrome OS, the driver of its popular Chromebook product line.

Windows Lite reportedly will be faster and leaner than other Windows operating systems. In fact, some reports indicate that the new operating system will be so different from other Windows products that Microsoft may remove the “Windows” name from it altogether.

How Will Windows Lite Work?

The new operating system reportedly will only run apps from the Universal Windows Platform (UWP) downloaded from the Microsoft store. It will also allow progressive web apps, which are applications that are run through an online service but operate like an offline app. Microsoft is exploring whether Lite will eventually be able to support Win32 apps as well.

Windows Lite will also be instantly on and always connected. It will be designed to work with multiple CPUs, providing flexible options for device manufacturers and consumers.

The focus is on building a product that emphasizes simple interactions and maintenance.

It’s expected that Windows Lite will not be available directly to consumers but rather to OEMs as a way to offer an alternative to the increasingly popular Chromebook. Instead, it will come pre-installed on laptops marketed to the home user and students.

The product is designed for users who only need “light” computing without the power, complexity and strength of traditional Windows operating systems. For users who need to write an essay, chat with friends or listen to music, Windows 10 is a bit of overkill.

Will It Look Like Windows?

The Lite OS will likely look very little like Windows. The interface is expected to be cleaner and more modern. The Start button is in the middle of the screen, for example. The search box is reminiscent of Chrome OS, with suggested and pinned applications listed prominently.

That said, there are some familiar components. File Explorer is still there and foundational components like Settings are present at this time.

The divergence from Windows is why some believe that Microsoft will remove the Windows branding entirely from the new product. Why would Microsoft intentionally move away from the established, decades-long Windows brand?

For one, ‘Windows’ carries with it certain expectations about functionality and capabilities. Microsoft may well want to begin reshaping how people think about what an operating system is, what it looks like and its user interface. It could be the beginning of a new direction for the company.

It could also be a way to circumvent the notion that Windows is too complex, complicated or fully featured, attracting those who have sworn off Windows operating systems in the past.

When Will Windows Lite Be Available?

There has been no official announcement or scheduled release date published. Given that hints about the new operating system are beginning to appear in Windows Insider builds, it’s likely that Microsoft is quite far along in its development. One possible target for an unveiling would be at the Microsoft Build 2019 conference in May 2019. Wider testing could begin this summer.

Cybersecurity Basics For Small Businesses

Small Business Cyber Security

Small Business Cyber Security

Small businesses are at considerable risk of cyberattack. With fewer staff resources available to maintain and monitor networks and fewer defenses in place, small businesses are an attractive target for hackers and other criminals.

The risks of a cyberattack are considerable. Companies could spend tens of thousands of dollars just to recover from an attack. There’s also the reputational and regulatory downsides if businesses allow data to be compromised, stolen or accessed by unauthorized parties.

To help businesses better understand the risks and solutions, this guide serves as a comprehensive introduction to cyberattacks and how to prevent them.

Defining Cybersecurity and Cyberattacks

Cybersecurity is a collection of preventative measures designed to defend computers, data, mobile devices, servers, networks and users from malicious attacks. Cybersecurity generally focuses on issues that arise from internet-connected devices and systems.

Cyberattacks are criminal activities designed to disrupt networks, prevent access to data, websites and systems, or extract valuable information. Some cybercrime is done solely to wreak havoc on websites and computer systems. Other activities are intentional attacks designed to steal and sell personal information, company secrets or intellectual property. Other cyberattacks are done for geopolitical reasons to disrupt governments, elections or economies.

Business Computer Security

What Are the Types of Cyberthreats?

Each day, there are new techniques, threats, codes, programs and approaches used to commit cybercrime. Businesses need a firm understanding of what these threat types are in order to choose the right defenses. Below are definitions of the most common threat types.

  • Malware. Malware is a portmanteau of “malicious” and “software.” It is an umbrella term that covers programs designed to cause harm once installed on a targeted computer or server. Malware includes:
    • Trojans – Programs that hide a virus or other malicious program. Many “free software” offers trick unsuspecting users into downloading and installing other apps that are actually Trojans.
    • Adware or Spyware – These programs can take over web browsers and redirect activity to other sites, usually e-commerce pages. These can be difficult to remove and frustrating, as they often use pop-up windows or pages that appear behind another. More nefarious adware can monitor which websites you visit or track keystrokes.
    • Viruses – Often spread by using removable devices on otherwise clean machines, visiting malicious pages or clicking on email attachments, viruses are designed to damage or destroy files stored on a network.
    • Worms – A kind of virus that replicates and propagates itself from computer to computer connected to a network. Typically, worms consume computing resources, slowing or stalling your machine.
  • Advanced Persistent Threats. Most hackers do not break into systems in one fell swoop. Instead, they stage their attack in phases. These advanced persistent threats (APTs), one embedded in a computer, may lie dormant for a period before they are activated. The program may also embed itself differently in different parts of the system, so if one threat is detected and eliminated, others can continue to cause harm.
  • DDoS. A distributed denial of service happens when outside players overload a server with requests for access or connection. Quickly a DDoS can shut down a target’s networks or websites.
  • Rootkits. Rootkits are a small piece of software that’s installed by another, larger software program or attacker that’s gained access. While rootkits may not be malicious, they can harbor malicious operations. Using rootkits, an attacker may be able to monitor activity, access information, change programs or use your computer to complete other actions.
  • Botnets. Botnets are networked, automated programs that can be controlled by one or many outside persons. Botnets are used to spread spam or viruses or to facilitate a DDoS.
  • Ransomware. A form of malware, ransomware infects your computer system and disables access or functionality, usually to your website. The cybercriminals usually demand a ransom in the form of bitcoin or other difficult-to-trace cyber currency in order to release control of your systems. If the ransom goes unpaid, the hackers usually threaten to release or sell information about your company, customers or employers.
  • Phishing. Phishing is a common way hackers steal personal information, logins and credit card information. Phishing attacks usually begin with an email urging a user to visit a known website. Once there, a user can unwittingly reveal information that compromises their identity or finances.
  • Fake Anti-Virus. An unsuspecting user may see an email from their anti-virus provider and install a fake update or upgrade. Instead, the installed software begins to make system modifications (including issuing false threat alerts) that make it difficult to eradicate the program.
  • Corrupted Files. Even common file types, such as those used for word processing, spreadsheets, images, videos and presentations, can be corrupted by malicious code that’s embedded in a seemingly legitimate file. These programs can execute malicious scripts that consume memory or bandwidth, add or delete files, allow attackers access to your computer or use your computer to attack other machines.
  • Zero-Day Attacks. When attackers unearth a security flaw or vulnerability in a piece of software before the developers do, it’s an incredible opportunity. Hackers exploit the vulnerability that can extract information or cause damage. The scope of a zero-day attack can be staggering as it can take months or years before the flaw is detected and a corrective patch is built and deployed.
  • Password Attacks. The more characters and choices your company requires of users when creating passwords, the less likely you’ll be to fall victim to a password attack. A brute-force attack occurs when a hacker uses programs or guesses until they are successful in gaining access. Other attacks include the use of dictionaries to find common words used as passwords and keylogging, which captures keystrokes to steal login IDs and passwords.
  • Email Spoofing. It is far too easy for hackers to create an email that looks to be from someone, even a known colleague or leader. However, these programs instead are imposters, looking to steal passwords or financial information. A recent series of spoofing emails asked employees at colleges and universities to purchase gift cards for their “colleague,” scratch off the protective coating and send the card authorization codes. If spoofing is used to contact your customers or partners, you may find them leaving to do business with someone else.
  • Insiders. There’s a good reason to limit the number of employees who have administrative privileges. Inside attacks are often conducted by employees with administrative rights. They use credentials to get access to confidential information and use it for their own benefit or sell it to the highest bidder. Other inside threats manifest themselves when companies fail to remove access rights or user accounts of employees who leave the organization.

Cyberattacks can take many forms: targeting your users, your networks, your devices, your software or your websites. That’s one of the critical reasons why you need cybersecurity solutions that can address all of the potential threats.

Cyber Security Small Business

Who Commits Cybercrime?

Many people imagine cyberattackers as hoodie-wearing, sunglasses-toting bad guys in their basement inflicting harm for personal gain or “fun.” While there is an element of truth in that stereotype, there are other players in the cyberattack realm. The criminals may be:

  • Single actors or groups looking to disrupt or steal
  • Political operatives looking to steal information for nefarious means
  • Nation-states authorizing attacks that cripple electronic systems and defenses, disrupt communications or infrastructure, or corrupt or steal data
  • Corporate actors or individuals looking to steal information that allows for an economic, strategic or military advantage

While there may be many players involved in cybercrime, the common theme is that your business needs to be protected.

Are These Threats Overblown?

No. Consider some of these statistics from the Ponemon Institute’s global 2018 Cost of a Data Breach study:

  • The average data breach costs $3.86 million, a 6.4 percent increase from the previous year
  • The cost per stolen record is $146
  • The mean time it takes to identify a data breach is 197 days
  • The mean time to contain a data breach is 59 days

When looking at the impact of cyberattacks on small businesses, the 2018 HISCOX Small Business Cyber Risk Report notes:

  • 47 percent of small businesses had at least one cyberattack in the last year
  • 44 percent had two to four attacks
  • 67 percent of business owners and executives indicated they were concerned or very concerned about cyberthreats
  • The average cost to a small business for a cyberattack is $34,600
  • Small businesses incur indirect costs from a cyberattack, including customer loss, difficulty in attracting new customers, brand damage, distraction and productivity loss and staff hours committed to a resolution

Small businesses have other characteristics that contribute to their vulnerability, such as the lack of available budget and qualified personnel to manage the protective measures necessary.

What Kinds of Cybersecurity Tools Are Available?

The number and type of threats are constantly changing. That’s why small businesses need to be vigilant about how to address the potential attacks.

The National Institute of Standards and Technology (NIST) recently released a helpful and clear framework that can help companies understand the layers and purposes of different cybersecurity solutions.

The NIST framework lays out five cybersecurity functions:

  1. Identify – Asset management, business environment, governance, risk assessment and risk management strategy
  2. Protect – Access control, awareness and training, data security, security processes and procedures, maintenance and protective technology
  3. Detect – Anomaly and event detection, continuous monitoring and detection processes
  4. Respond – Response planning, communication, analysis, mitigation and response improvements
  5. Recover – Recovery planning, improvements and communication

Another way to look at the scope of solutions is to group them into categories based on the type of security they provide. These broad security categories of protective measures collectively provide your business with a comprehensive cybersecurity solution.

The categories and the protections that fall within those groupings are outlined below.

Operational Security. Processes and procedures for handling, storing and securing data, including user permissions, data locations and sharing guidelines.

Cyberthreat Assessment. Companies looking to provide blanketed cybersecurity protection should first conduct a thorough assessment of their existing IT infrastructure. Managed IT providers usually begin their engagements with new customers with this deep dive, which provides a baseline understanding of the data, processes and protection in place and the vulnerabilities that need to be corrected.

Security Policies and Practices. There needs to be a collection of well-defined and articulated policies and procedures that address what data is available, what its business function is, how and where it is stored and who can access it. These cybersecurity policies, and the consequences of not following them need to be spelled out for employees, taught and reinforced. Policies should also include the use of personal devices, peripheral devices, home computers, public WiFi and corporate credit cards or purchasing cards.

Access Control. Small businesses should have clear guidelines in place for who determines access to files and servers. Administrative rights should be limited as noted above. Access should be requested and approved using a clearly delineated process that presents clear business reasons for allowing permission. Access should be provided on a need-to-know or need-to-use basis. Access policies should also consider physical access to servers, data centers, data closets, physical media and off-site locations.

Regulatory Mandates. Many industries are subject to government agency or sector-based requirements for the storage and usage of data. These mandates are especially critical to those companies that collect or use personal health information, collect payment information, manage legal documents or do business with certain federal or state entities. Knowing these mandates is critical, as they inform the decisions about what solutions are used and what reporting is required to demonstrate or maintain compliance.

Insurance. Purchasing cyberattack insurance helps to reduce the financial risk of a potential assault. Like with other insurance products, demonstrating the existence of protective measures may result in lower premiums.

Information Security. Ensures data integrity and privacy when information is in transit or at rest.

Data Backup. Backing up your data (and applications and operating systems) is essential to making sure it’s protected and accessible in the event of an attack or natural disaster. Data backups should be done for information stored in the cloud or physical servers. Backup services should use most advanced security measures and best practices, including backing up data in out-of-region locations, automating backup functions and scheduling backups at regular intervals.

Encryption. Encrypting your data while it’s being backed up and when it is stored in the cloud or on-premises makes it that much more difficult for hackers to use the information, even if they can access it.

Network Security. Secures your computer network from intruders, attackers and malware.

Wireless Network Security. Protecting your wireless network is an absolute must. Next-generation firewalls secure your network’s perimeter, detecting, containing and destroying unwanted activity before it can cause significant harm. Network security should also include continuous monitoring with automated alerts if suspicious or unusual activity is detected. Wireless network segmentation and segregation can also prevent the co-mingling of use by employees, visitors and web visitors.

Passwords and Authentication. Your small business needs password creation guidelines, multifactor authentication procedures, guest access policies that make it difficult for hackers to break in and access systems.

Website Security. Maintain your website’s security with limited privileges to the web server and content management tools, multifactor authentication, aggressive password changes, application whitelisting, adequate resource availability, web firewalls and dynamic security scans.

Application Security. Protects your software applications and the devices that use those apps.

Hardware and Software Updating. Providers regularly distribute updates and patches that address important security issues, fix bugs and remove emergent vulnerabilities. The challenge for small businesses is making sure each connected computer, mobile device and server has the required updates installed. Automated updating is much easier with managed IT services and cloud-based applications and servers.

Mobile Device Security. Mobile devices enable employees to access information and networks from anywhere and at any time. However, mobile devices are especially vulnerable, especially when employees are required to provide their own equipment. For example, employees may not install the necessary updates, access information on unsecured public WiFi networks, or have devices stolen or lost.

Business Continuity and Disaster Recovery. Plans and policies to recover from a cyberattack and ensure business operations are up and running with little to no downtime.

Business continuity is the overarching guidance, policies, methods and protocols that ensure that a business can continue operations during and after a natural or manmade event. Disaster recovery is a subset of business continuity, focused on the procedures used to restore systems, access data backups and deal with the incident at hand.

End-User Education. Training and awareness programs for employees and other users.

In many ways, education and awareness are the first lines of cyberdefense. Employees need to understand the scope of cyberthreats, how those threats appear and what they can do to defend themselves and the organization.

Cybersecurity is an absolute must for small businesses today. Knowing the types of attacks and the available solutions is the best defense against criminals looking to do harm.

Microsoft Excel Training [Free Online Course]

Microsoft Excel Training

Microsoft Excel Training

 

Microsoft Excel Training

Excel is one of the most versatile and most useful programs in the Microsoft Office suite. It’s also one of the trickiest to master without a little help from someone who understands the ins and outs of Excel.

Join us for a special three-part online Microsoft Excel training session, available on-demand.  Tune in from the comfort of your office, learn about Excel over your lunch hour or just check it at home. Our Microsoft Excel training is available, FREE of charge and around the clock.

  • Session 1 – Introduction To Microsoft Excel
  • Session 2 – Intermediate Microsoft Excel
  • Session 3 – Advanced Microsoft Excel

Register online by clicking here.

Microsoft’s spreadsheet program has a wide array of features that make it a handy tool for just about any project, and a host of functions you might not even realize have been there the whole time.

Learning how to use this amazing program to its full advantage and put it to use for your business starts with getting an up-close look at how Excel’s features work.

Have questions? Send me an email by emailing {email} or phone me at {phone}.

Set Reminders to Stay on Track with Important Tasks

Productivity Tip

 

Raise your hand if you’re one of the millions of Americans who are overworked and don’t have enough hours in the day — isn’t that everyone? When you do manage to get into the groove of getting something done, it’s easy to forget everything else in the work or play. You may not even realize exactly how long you’ve been spending on a particular task, and perhaps spend more time than you can afford. This leads to a spiral of stress that can be damaging to your productivity. Productivity experts recommend a simple hack that will keep you on track. Leverage the tools that you already have at hand to stay on track with these time-sensitive tasks.

Use All the Tools You Have

When you’re in the thick of a project, you don’t want to completely stop and think about using several mouse clicks or taps to set a reminder to do another task in the future. Fortunately, today’s smart speakers have everything that you need to set a timer or a reminder for a later date and time. Simply let your smart devices do the work for you! Be sure that you’re using a task reminder or timer that will work across all of your devices. That will save you from setting a reminder on your desktop that doesn’t sync to your phone after you’ve left the office for the day.

Be Specific When Setting Reminders

Jotting a quick note is great, but do you always understand what it was you needed to do at a later time? If you’re viewing a reminder that is out of context with the project, it might take you a few minutes to get back up to speed. Reduce that problem by being very specific when you’re setting your reminders. At a minimum, each reminder should include:

  • Specific time and date for the reminder
  • Projects your reminder relates to
  • Tag any individuals you need to consult

You’ll find that your reminders are most helpful if you quickly state the specific actions that you need to take and why they’re important.

Keeping your life organized doesn’t have to be difficult. When you’re using the tools that are around you and reminding your future self about specific tasks, you’re already taking several steps in the right direction. Microsoft Office 365 productivity suite includes everything that you need to keep your projects rolling smoothly regardless of whether you’re in the office or on the road.

 

Productivity Tip

Are You Prepared For The End Of Windows 7?

Windows 7 End Of Support

Windows 7 End Of Support

Living in a technology era that sees device upgrades and new products on what seems like an almost weekly basis, it’s difficult to imagine that Windows 7 has remained in play since its release in 2009.

According to Net Market Share’s December 2018 data, 40.86 percent were still using Windows 7 compared to a modest 36.37 percent engaged in Windows 10. Trailing the two leaders, Windows 8.1 saw a mere 5.07 percent and Windows XP stood at 4.08 percent. That means Windows 7 ranked as the most popular platform after a decade on the market.

However, the days of Windows 7 are numbered. Starting on January 14, 2020, extended support for this industry favorite will cease.

The Windows 7 end of life (EOL) is not a surprise for IT companies because Microsoft already cut off mainstream support four years ago. The imminent Windows 7 EOL leaves small and mid-sized companies weighing their options about the best next steps. Fortunately, the IT professionals at {company} are prepared to upgrade small and mid-sized businesses using Windows 7 to a suitable alternative.

Are You Prepared To Upgrade Before Windows 7 EOL?

While the EOL deadline may seem miles away when considering critical day-to-day business operations, conducting a critical systems analysis and reviewing next steps options is something that decision-makers would be wise to implement post haste.

Upgrading a company’s operating system is no small undertaking. The process could take a top-flight IT support team upwards of six months to develop a comprehensive strategy to test, implement and fully deploy the new system. That timeline hinges on prior decisions being made and only reasonably anticipated setbacks. Anyone who runs a business understands that x-factors can cause unexpected and costly delays.

CEOs and decision-makers who fail to make the shift before the Windows 7 EOL date risk losing security features currently protecting systems and data. We live in a world where hackers are persistent in their efforts to find vulnerable business systems that they can pluck like low-hanging fruit.

It’s not difficult to recognize that hackers are fully aware of potential vulnerabilities when the Windows 7 sunsets. They will be up all night identifying and breaching systems with inadequate security. Think of the Windows EOL date like a massive power blackout and hackers are like looters taking advantage of the crisis to break into your business and steal. The best way to avoid disruption and cyber theft is to take proactive measures now.

Positives About Upgrading From Windows 7

For all practical purposes, users are being forced to migrate from Windows 7 to another product. The mainstream support ended in January 2015 and extended support included some minor reductions in support. While it’s true that you can still use Windows 7 and it will function with Internet Explorer and other tools, after the 2020 EOL date, security risks will likely escalate without ongoing support. While business leaders often operate under the “if it’s not broken, don’t fix it” theory, Microsoft reportedly recommending that Windows 7 users upgrade to Windows 10 is not necessarily a bad thing for small and mid-sized companies. These are key reasons why change can prove beneficial.

  • Improved Consistency: In the past, it wasn’t uncommon for operating systems to require significant changes every three to five years. That type of stress is expected to dissipate once users conclude their migration from Windows 7 to Windows 10 or another appropriate option.
  • Ongoing Upgrades: Although Microsoft has offered differing degrees of Windows 7 support for 10 years, organizations that migrate to Windows 10 can anticipate a wealth of helpful upgrades. These upgrades started in 2018 and their lifecycles will reportedly last upwards of 24 months in terms of deploying and validating the newest version. Updates that were previously released about every six months. However, organizations may want to task their IT support team with monitoring emerging upgrades.

Your outfit will enjoy the most up to date functionality, productivity, user interface, and outstanding security measures. Upgrades have the potential to interact with important analytics, machine learning, and other emerging technological advancements.

At {company}, our team of IT professionals understands the inherent benefits that migration to Windows 10 and other options can bring to the table. Migrating to Windows 10 or a suitable alternative is not a nuisance; it’s a business opportunity.

Windows 7 EOL Presents An Opportunity To Develop A Uniform Process

Consider for a moment that your organization has developed protocols and processes that help it maximize productivity and profitability. Those might include anything from a manufacturing assembly line to information sharing to HR policies. Just about everything a successful outfit does helps improve its standing and bottom line. That being said, systems upgrades are no different and the Windows 7 EOL has presented an opportunity to create uniform policies and protocol.

By working with an IT support consultant, your organization can lean on the experience of a team that upgrades and migrates business systems regularly. You also gain the benefit of working with team members that have an expansive knowledge about goals within your industry and others. That information can prove valuable when applied to your niche.

Conducting a full review and documenting real-time process leaves your organization with a blueprint for future upgrades. Windows 7 is effectively going the way of the dinosaur and its replacement will likely go extinct as well. It’s important to seize this opportunity to reduce the six-month or longer process the next time. These are other benefits your organization can gain by creating a regular upgrade process in 2019.

  • Rethinking Windows: It’s all too clear that Windows upgrades are already being planned. Rather than wait and react every time an announcement is made, you can rethink Windows as an ongoing service and not just a product. This means empowering your IT support team to maintain a focus on rollouts, tool management and deployment in a highly streamlined fashion. Having that blueprint means formerly onerous tasks occur seamlessly.
  • IT Support Agility: A significant migration from Windows 7 is likely to be a time-consuming task. Part of the reason is that your outfit is starting from scratch and learning about unique aspects of your system, goals and workforce needs. Creating a blueprint for future upgrades eliminates that start from scratch mentality and allows IT support technicians the flexibility to act decisively.
  • Ongoing Testing: Once your IT team has concluded its testing measures for the Windows 7 EOL migration, it’s essential to craft a post-mortem account of challenges and solutions. This will help inform team members about what to anticipate and improve their ability to adapt and overcome.

One of the expected benefits of moving to Windows 10 is that the product allows IT technicians to implement updates to a variety of devices simultaneously. This is expected to improve efficiency by limiting the time spent on tasks that are not directly related to your business’ profit-earning activities.

Other Windows 7 EOL Options

There’s a good reason that such a low percentage of users work with Windows 8. It was widely considered a disaster. According to The Inquirer, “Users and administrators adamantly demanded to step back to Windows 7 desktops. Not only was the new user interface of Windows 8 unwelcoming, but the removal of simple features such as the Start button sent users into a tizzy.”

The piece goes on to explain that although users freaked out over the Windows 8 product, migrating to a user-friendly Windows 10 option could be favorable.

“Adopting Windows 10 can be as simple as upgrading an existing Windows 7 computer based on your Microsoft licensing agreement, but in many cases, a device refresh may be necessary due to hard drive space, system resources or physical capabilities,” The Inquirer article states. “From a financial perspective, the cost of a new computer — plus IT staff setup time and lost user productivity during the transition — comes at a significant price.”

But there are other options on the market that decision-makers may want to consider. These include the following.

  • Apple Devices: If Macs appear a more suitable product for your evolving business goals, the Windows 7 EOL may offer a logical time to transition.
  • BYOD: Some companies are shifting to “bring your own device” workforces. Again, this may be a time to discuss the possibility with your IT consultant.

Although migrating to Windows 10 is expected to be a reasonably positive transition, there’s little argument that Windows 7 was a solid product. It continues to be a highly regarded operating system and some business leaders may want to consider the possibility of working with the product beyond the 2020 EOL date.

It may come as something of a surprise, but Microsoft reportedly may provide support for some organizations beyond the 2020 EOL date, according to The Inquirer, Computer World, and others.

Called Windows 7 Extended Security Updates (ESU), the after-drop-dead deal will add support through January 2023, according to Microsoft. “While many of you are already well on your way in deploying Windows 10, we understand that everyone is at a different point in the upgrade process,” Computer World reported.

Additional Windows 7 support is expected to be sold on one-year deals and businesses can expect to pay a premium. The move is viewed as a costly stop-gap measure for organizations that are falling behind a reasonable migration timeline.

Organizations that have not already begun the process of migrating from Windows 7 to Windows 10 or another suitable option are strongly advised to contact an IT professional ASAP. Delaying the inevitable could prove expensive one way or another. {company} has a team of knowledgeable migration consultants and specialists with the hands-on experience to see your outfit through this challenging period.