Recent ArticlesIt pays to be the most informed in the room!
You and your employees should expect that returning to the workplace will not be the same as it was prior to COVID-19. The new normal is and will be different for the foreseeable future. Learn how to properly prepare here.
Over-communicate to your staff about returning to the workplace, create a “Return to the Workplace” schedule, and establish an ongoing WFH policy. Learn how to properly prepare for the eventual return to work here.
BYOD refers to “bring your own device” — a business environment where employees of an organization are permitted to use their own laptops, tablets and other mobile devices in lieu of company provided ones.
Why is this done? Aside from saving money, the primary reasons companies allow this are:
- Familiarity: This may be the most obvious reason for workers to bring their own tablet or laptop to work. It may be the operating system, web browser or other apps on their devices that they know and feel comfortable using. They don’t have to live in two electronic worlds at the same time.
- Simplicity: Companies have been providing their employees mobile phones for business use for a few decades. Now those employees carry two phones, since everyone also has a personal phone. This can be a nuisance for your employees. It is hard enough to care for one mobile phone, and now they worry about two of them. The reality is that companies expect employees to be in contact 24/7, so company devices can’t be used only at work. They have to be carried home, out to the store, etc. If the employees have a choice they would much rather carry just one phone, their own, enabling them to be reachable by family and friends anytime. This can also be cheaper for everyone if the company offers to share the cost of using their device.
- Productivity: Convenience can also result in better productivity. Having fewer devices means fewer distractions. Fewer distractions equals less wasted time. Saving time is always good for productivity.
- Employee Relations: It makes employees feel good to be able to use their own devices at work. Higher employee morale is very important for any organization. Happier employees are more likely to work hard. So, if an employer gives its employees the liberty to bring their own devices to work, it may have more satisfied workers.
As a result, most firms have migrated to a BYOD policy. In later blogs, we’ll talk about why a BYOD environment leads to another reason to use an enterprise grade File Sync & Share (FSS) solution.
If you are going to expect your employees to work off the clock, and to do so at home, in the car, in a hotel or the backyard, they are going to be far more effective and willing to do so if you make it as easy as possible. One way to do that is to provide them with a business-grade set of collaboration tools that make document sharing easy. Sending Word documents back and forth for markups among a group is tedious and is a recipe for version control tragedies.
Instead, consider the value of a complete collaboration tool that everyone can access from anywhere using any type of device that makes document access and collaboration easy and secure. Your employees and your bottom line will appreciate the increase in productivity.
Your employees are your greatest priority. Keep in mind that they may be nervous about returning to the workplace. If you prepare properly you’ll alleviate many concerns, enabling them to focus on the work, not COVID. Download the free checklist.
As a vendor or even a customer, have you had the experience of working with a new company and having to learn yet another file sharing platform? Worse, have you found that it wasn’t compatible with your files, or that there were little quirks that slowed down the process as you learned the software? It can be annoying, and it can take a considerable amount of time.
What’s going on in your organization? Have you ever considered that your file sharing environment is a critical client touchpoint? Consider these questions:
- Can they learn the system quickly?
- Is it used across the entire organization, or do individual units use different tools?
- Can a client access via any mobile device whenever it is convenient?
- Is everything accessible via all operating systems?
- Do they feel secure sharing confidential data?
Sharing and collaboration should be easy, intuitive and secure.
Every client touchpoint matters, and if your collaboration tools are perceived to be insecure, clunky, disjointed or inaccessible, you potentially damage a piece of your brand and your client relationships.
When an employee needs to share information, how are they doing it? There is a good chance they are emailing Word docs or PDFs, texting attachments or using any type of file sharing product they are familiar with. Perhaps when they work collaboratively with a client, they use whatever the client is familiar with.
An important factor in corporate security is implementing an FSS solution that provides not only ease of use, but the highest level of security available. A good FSS platform eliminates the need to email files. It also creates optional levels of access that includes password protection, view only and download permissions.
In short, give a serious look at what is happening with file sharing at the individual employee level when you do the next security audit at your company. You may find a significant gap that threatens your data integrity.
Today’s blog is a basic primer on what a complete File, Sync, and Share (FSS) solution includes.
Very simply, FSS is a software service that allows you to share all manner of files, documents, spreadsheets and images within an organization as well as with outside third parties, such as customers and prospects. For the average user, the benefit is the ability to work collaboratively using any device or operating system, without having to figure out how to make that all work. However, there is more to a holistic FSS than ease of use. There are 3 key aspects to any complete FSS platform.
These are features such as:
- Easy access to documents, from anywhere, at any time.
- All changes to any file are immediately synced across all devices and file servers without any active intervention by the customers.
- No size limits.
- Integration with your existing systems, such as Salesforce, Outlook and Microsoft 365.
This is the “behind the scenes” part of a complete FSS solution. File sharing for businesses should be easy and totally transparent. However, it must also be secure. Most importantly, it needs to be meeting industry standards for security. Consumer-grade sharing tools for family photos aren’t appropriate in a business setting. Effective security should include encryption that covers all three points in the content lifecycle: in-session, transit and on-device.
Collaboration isn’t effective until you permit universal mobile access that is simple to use. This is the final key to an enterprise FSS platform. As people are pushing their work to mobile from every location imaginable, the ability to access via iOS and Android is an absolute requirement, along with the entire file sharing process. Features such as automated document QR coding make it easy to quickly find a document from a small screen device.
In summary, a complete FSS solution must address the need for workplace collaboration, security and easy mobile access. Without all three, your FSS solution won’t support the needs of your organization.
Thinking about your business reopening? The problem is, if you just pick up and go, and don’t prepare for having people back in the workplace, you may run into issues that could have been easily avoided. Now is the time to prepare – click here for a free checklist.
The availability of these features is a great starting point for your organization to discuss broader policies for determining access.
When you adopt a File Sync & Share (FSS) solution, it’s a great opportunity to define internal policies about file access (who should see it), content (who can change it) and data integrity (from where can it be accessed). As your enterprise grows, the need for strict policy guidance to control your data will only become more important.
First, what is it? Two-factor authentication requires two different forms of identification to verify an employee. In general, the idea behind it is that the two forms of identification aren’t necessarily closely linked to each other: the possession of one form of ID doesn’t reveal the factor in the other ID.
What does this have to do with File Sync & Share (FSS) platforms? Organizations routinely share very confidential files among employees as well as third parties. All this sharing is occurring on external networks and via a wide variety of non-secure devices. This means the security that is built into an FSS platform is exceptionally important.
Anyone who follows any business news is aware of the severe consequences of a data breach. You should look carefully at the level of security offered by any file sharing tool that your organization is using. One of the security factors you should be using for everyone is a two-factor system. Your business data is too important to not need that extra step.
As countries, states, and cities begin to ease lockdown restrictions, this checklist for reopening businesses can help you jumpstart your return.
Click here for more information.
Did you send out a Word document for a client or colleague to review today?
If you answered yes, here are four reasons to stop doing this:
- Time delays – Edits cannot happen in real time. You write the document, send it, they review and edit it, add comments, then they send it back to you. You receive it and make the changes, then send a revised version back to them. Meanwhile, they’ve moved on to some other task. Now you’re waiting for their second review.
- Version control – Each time you create or edit a Word doc, you save it before you send it. And the recipient who edits it does the same. No matter how careful you may be with naming protocols, the fact remains that there are multiple versions of that document out there, and there is no guarantee that an older version won’t be used or distributed improperly.
- Lack of collaboration – Because reviews can’t take place in real time, there cannot be any real-time, on-screen “conversation” among collaborators, increasing the potential for miscommunication and a poor flow of ideas in the document.
- Impractical for life on the move – When you’re offsite and mobile, it’s frustrating to have to try to make edits to a document that can only be accessed from one machine.
The takeaway? Now is a good time to start using a secure enterprise grade file sharing solution.
Are they collaborating with clients over different platforms?
Sharing files via email, text and consumer-grade File Sync & Share (FSS)?
Aside from the security risks you are taking and the (in)convenience factor, is this really putting the company in the best light?
Think about the impact to your branding when you share files with a client using clunky, hard-to-use tools, methods that risk data security, or unintuitive platforms that require a learning curve for your clients and prospects. You inconvenience them and you put their files at risk. It sends a negative message—one that could harm your brand.
Remember, any customer touch point is a “branding”moment.
This guide illustrates the different phases of needs and planning efforts during the COVID-19 crisis, helping you develop guidelines and ongoing response efforts for your team and your customers. Click here to learn more.
It is most likely your company allows some or all your employees to use their own devices in lieu of work-issued laptops, tablets and mobile devices. There is almost no way to enforce a no-BYOD policy outside office walls. Inevitably, someone will receive a text or email that is work-related on their personal device. Somewhere along the line they will open confidential documents. If that device gets lost or stolen, your data goes with it.
Working from home is about balance. Make sure you take frequent breaks and monitor your working hours as you would if you were commuting.
It’s easy to get distracted when you’re in a video meeting. Turning on your camera (and turning off other notifications) gives you the incentive to be present in the meeting instead of handling other issues during the call.
Constant notifications from messaging tools driving you crazy? Shut your virtual door and block off “Do Not Disturb” time on your calendar each day.
When self-isolating, video conferencing systems will be your best friend. Book 15min using your video conferencing system instead of relying on email or a messaging tool. Read more about collaborating while WFH here.
Social Distancing for the SMB: Explore whether you can establish policies and practices, such as flexible worksites (e.g., telecommuting) and flexible work hours (e.g., staggered shifts), to increase the physical distance. Click here for more info.
When working remotely, connect to your secure, private home network instead of relying on public WiFi. If you send your data through an unsecured public WiFi connection, you lose the power of privacy making it possible for cybercriminals to intercept your data. Learn more here.
When WFH, ensure you have fully patched and updated anti-virus and anti-malware software. It’s important to follow the same best practices you would as if you were in the office, and report any suspicious activity or concerns to internal IT or your MSP. Click here for more information.
When working remotely, it’s crucial to continue your typical cybersecurity best practices and reach out with any questions or concerns. Read more here.
IT pros say there’s a lack of cybersecurity training across businesses worldwide. This is putting your data in jeopardy. Don’t be another statistic. Contact us today and we will train your team and secure your infrastructure. #stopransomware
The average cost of downtime (loss of productivity) from a single #ransomware attack is about $46,800. #stopransomware Learn more here.
Only 1 in 4 #ransomware attacks are reported to authorities. Problem is bigger and growing. What else should you know about ransomware? Find out here.
All it takes is one click by an employee to put your data in jeopardy. Protect your business with a Ransomware Protection and Recovery Solution. Contact us to learn more.
The best way to prepare employees to stop #ransomware attacks is to train them. Train new employees at orientation and all employees bi-annually. We will train your team and follow up with onsite and remote support. Contact us here.
Teach employees about social scams so they know what to expect and how to spot them. Prepare your team here.
5 types of social scams your employees need to know about: phishing, baiting, quid pro quo, pretexting and tailgating. Define each with our helpful guide here.
Do you know some of the common types of #ransomware and what to do in the event you encounter it? We can help you #stopransomware – click here to learn how.
Provide clear instructions on what to do if your employees encounter a potential #ransomware lure. Learn how here.
Now that your team is working from home, it’s more important than ever to protect your business against #ransomware by educating your staff. Find out here. #stopransomware
World-class security means security measures at every point. We use Datto RMM as our Remote Monitoring and Management solution because it has comprehensive security at every point. Learn how we ensure that you’re IT is safe and secure here.
Technology isn’t only an asset. It’s a major investment. Let us arm you with actionable insights, to optimize that investment. We provide detailed reports that are easy to understand and are relevant to your business. Click here to learn more.
We can remotely support any device, from any location, within moments, which means we don’t need to be onsite to fix issues or errors. Learn more here.
Our team’s rapid response means supporting any device, from any location, at any time. Find your peace of mind here.
We’re dedicated to providing premier monitoring and management services of your tech assets, delivering better service and greatly reducing any potential for downtime or disruptions to your operations. Learn more here.
With Datto RMM, we address potential issues before they become a problem because we have the ability to monitor your businesses’ devices, applications, and systems continuously. Learn how you can add peace of mind to your business here.
As a Managed Service Provider, our top priority is effectively managing your network and technology assets to keep them safe and optimized so you stay productive. Learn how we can help you prioritize here.
Proactive support means peace of mind for your technology investment. With Datto RMM we can resolve many common issues before they actually affect your network. Learn more about proactive support here.
In the case of cybersecurity, offense wins and the defense loses. Interested in learning more about cyber resilience or risk assessment? Give us a call.
By documenting cybersecurity best practices for your business, you can negotiate reduced insurance premiums, broader coverage, and higher amounts of coverage. Learn more here.
Insurance premiums range from $10,000 for small organizations to over $100,000 for million-dollar businesses but cyber resiliency can reduce these costs. Learn more about how to save on insurance here.
Cyber resiliency = lower insurance costs. Contact us to learn more about the cybersecurity practices to put in place at your business so you can negotiate better insurance terms.
Being cyber resilient can reduce the economic impact on your business after a cyber attack and instill confidence in your customers who know that you are able to protect their data. Contact us to learn how we can give your technology resiliency.
An incident response plan identifies the necessary steps to take when a data incident occurs. To learn more about these steps, check out this ebook.
Have you completed a risk assessment and incident response plan for your business? If not, your business is at risk. Contact us; we’re here to help.
Cyber resiliency aims to defend against cyber attacks and ensure that the business is able to survive. Learn more about how your business can become cyber resilient.
If your e-commerce system, website, email, or customer data was suddenly inaccessible because of an attack, would you be able to get back up and running within minutes, hours, days, or at all? Check out this ebook to learn more.
Did you know that 60% of businesses that are hacked go out of business within 6 months? Learn how your business can become cyber resilient to prevent this. Click here to learn more.
Get ahead of the Windows 7 End of Life deadline. We’ll make it easy for your organization to migrate. Contact us to learn how.
We can help you choose the right migration path to Windows 10 for your business. Learn more here.
Change can be difficult. When it comes to migrating from Windows 7, we can make it easy. Find out how here.
With Windows 7 End of Life approaching, it’s time to think about your migration plans. We can help. Contact us today for a no-risk assessment.
40% percent of businesses are still running Windows 7. Odds are you and your business are in this group. Contact us and let us help you prepare for Windows 7 End of Life.
We have the expertise to make your organization’s migration to Windows 10 a success. Find out more here.
Hire the professionals to migrate your business to Windows 10 because your Windows 7 problem won’t fix itself. Find out why this matters here.
Find out what Windows 7 End of Life Means for your Business here. According to ComputerWorld, 40% of all PCs are running Windows 7. Odds are there are several Windows 7 machines, many tasked with important things, in your company that need to be upgraded or replaced. January 2020 is coming up, FAST! Contact us today.
Goodbye Windows 7. Hello Windows 10, the “last” Windows. No more difficult upgrades. Let us help you migrate. After migration, let us show you the benefits of a managed services agreement. All your IT, managed, maintained, backed up, and secured. No worries, no fuss, easy to budget. What could be simpler? Contact us today!
Don’t leave your business open to security vulnerabilities. Migrate to Windows 10 with minimum downtime and maximum peace of mind. Protect your business with the latest operating system, we train your team, and watch your KPI’s go off the charts! Let Smart Technology Solutions show you how cost effective and worry-free a managed services agreement can be for your company. Contact us today!
To upgrade or replace devices, that is the question when it comes to Windows 10. Some older machines may have the power to handle an upgrade to Windows 10, others may need to be replaced. How can you know for sure? We’ve prepared a checklist for you here.
It’s time to prepare for Windows 7 End of Life. We can help. Click here for a handy checklist.
Ask the 30% of companies who lost data from SaaS applications according to a recent survey if they backup their SaaS data. Hindsight is always 20/20, but why wait to protect your important data? Learn more here.
Would you rather retain your Office 365 data forever, or for a few months? Depending on your industry, there may be retention regulations that go far beyond Microsoft’s default policy (which is just a few months). Plus, in today’s litigious age, it pays to be safe and not sorry. Learn more here.
Office 365 may host your data in the cloud, but how do they back it up? They aren’t responsible for your data, they only make sure that you can access their service to send and receive email. Find out how you can safeguard your company’s cloud data here.
How to lose cloud data, tip 3: make an employee angry…really really angry. Have you followed Street & Smart’s A Method for finding, recruiting, and retaining employees, and were slow to hire and quick to fire? With a SaaS backup solution in place, your company data is safe from disgruntled employees. Find out more here.
How to lose cloud data, tip 2: over-write data in Office 365, it’s not uncommon. Learn how to avoid this face-palm moment here.
How to lose cloud data, tip #1: accidentally delete your files, it happens all the time! Learn how you can mitigate the risk of accidentally deleting your own cloud data here.
Oops! you just deleted your Office365 data…now what? If you’ve got SaaS backup in place, don’t sweat it! Learn more here.
Think #SaaS products (Office 365, Adobe, Salesforce) back up your data? Think again. Learn why you need business continuity.
IT pros say there’s a lack of cybersecurity training across businesses worldwide. Why put your data in jeopardy? Be a part of the solution, not another statistic. Contact us today, and we’ll show you how a business continuity/disaster recovery solution can fit into your budget.
The average cost of downtime (loss of productivity) from a single ransomware attack is about $46,800. A business continuity/disaster recovery solution from us costs much less. Contact us today to learn more.
All it takes is one click by an employee to put your data in jeopardy. Protect your business with a Ransomware Protection and Recovery Solution. To learn more about these solutions, contact us. You’ll be glad you did – in today’s digital environment, it’s not a matter of IF you and your company are attacked, it’s a matter of WHEN you’re attacked.
The best way to prepare employees to stop ransomware attacks is to train them. Train new employees at orientation and all employees bi-annually. Bet you didn’t know that Smart Technology Solutions will provide cybersecurity documentation and train your team on how to avoid cybersecurity risks, and, the best part is, if you’ve got the support hours available, it may not cost you anything! Contact us to find out more!
5 types of social scams your employees need to know about: phishing, baiting, quid pro quo, pretexting and tailgating. Define each with our helpful guide here.
Provide clear instructions on what to do if your employees encounter a potential #ransomware lure. Learn how here.
Protect your business against #ransomware by educating your staff. Find out where to start here. #stopransomware
#Ransomware stat 8: With BCDR, 90% of IT pros report clients fully recovered from an attack in 24 hours or less.
#Ransomware stat 7: 28% of IT pros report SaaS #ransomware infections in the last year.
#Ransomware stat 6: 57% of IT pros predict ransomware will infect social media accounts.
#Ransomware stat 5: #cryptolocker is still king with 71% of IT pros still battling this giant.
#Ransomware stat 4: 35% of IT pros reported multiple attacks against SMBs in a single day.
#Ransomware stat 3: Only 24% of attacks are reported to authorities, meaning the ransomware epidemic is bigger than we know.
#Ransomware stat 2: Construction/Manufacturing is the top targeted vertical for hackers this year.
#Ransomware stat 1: On average, downtime costs 10X MORE than the ransom.
We take a proactive approach when it comes to the #technical needs of our clients. No matter what the day might bring we’ll ensure that your business continues to run smoothly. #businesscontinuity
When was the last time you thought about your passwords? If you’re a business owner or manager, have you trained your employees how to choose good ones AND how to keep them safe? Even basic cybersecurity needs to be intentional – think about asking a professional for help. That’s what we’re here for.
Read the full article here.
Offload difficult, time-consuming tasks to a team of technology experts. We have the resources, flexibility and experience. Contact us today! #MSP
Are you running a business AND managing your IT? Let’s take some of that responsibility off of your plate. Check out this eBook to learn more.
Allow us to secure your business systems and data from all threats with ongoing technology monitoring and management. Download this eBook to learn more.
Let us take on the IT responsibility of your plate. We’ll ensure that your business continues to run smoothly no matter what the day might bring. #MSP
Feeling stretched thin when it comes to managing day-to-day IT tasks? It might be time to consider moving your IT workload to a managed service provider (that’s us!)
As an IT Service Provider, we are the guardians of your IT. Contact us and reduce your business risk by putting complex tasks into the hands of experts. #ITpro
For your own sanity and the sake of your business, it’s time to consider outsourcing your IT to a tech expert. Download this eBook to learn more about the benefits.
Did you know that outsourced IT is generally more cost effective than hiring in-house IT staff for smaller businesses? Get proactive with your IT. Contact us today!
We know the importance of #billablehours, so here’s another tip to help your firm avoid costly downtime: Perform timely hardware and software updates, maintenance and #backups.
#databackup has become common practice in law firms but are you sure you’re doing enough? Backing up your data once a day is no longer sufficient. Learn how to protect your firm from critical data loss in this eBook.
We know the importance of #billablehours, so here’s a tip to help your firm avoid costly downtime: Don’t sacrifice quality to save money when purchasing hardware. It will benefit you to have strong technology in the long-run.
In an article by @AALMagazine, the cost of network downtime was calculated for a firm operating on #billablehours. If a firm with 25 employees who bill at $200 per hour each lose one hour of uptime per month, that’s $60,000 a year on lost opportunity. Are you protected?
It doesn’t matter if it’s severe weather or #ransomware, if your systems are offline or you’ve lost valuable client data, it could be disastrous for your firm. Learn more about the #legal industry’s unique risks and best practices here.
If your #law firm is one of the many that identifies as a business that doesn’t have the #IT resource to effectively recover from a major outage, contact us today.
No time to manage the tech that supports your business? It might be time to consider outsourcing your #IT. We have the resources, flexibility and experience to manage a law firm’s unique IT needs.
An outage during the last few days before court could be detrimental to the outcome of a case. Learn more about the #legal industry’s unique risks and best practices here.
In the world of #law, time stops for no one. Court dates are appointed, not chosen, contracts have deadlines & client meetings are a must. Therefore, any type of outage is a huge threat to your firm.
Don’t wait for something to break. Let us ensure that your business runs smoothly no matter what the day might bring. #businesscontinuity
Law Firm Tip – Focus On Providing The Best Legal Services By Entrusting Your Technology To Professionals
As an #attorney, you’re committed to providing your clients with the best #legal advice and service possible. As an #IT Service Provider, we want to do the same for your technology.
More law firms are going paperless, investing in practice management software, and moving to the #cloud. With tech on the rise, law firms can be more productive. But when client data is digital, it’s at risk. Learn more here.