Business communications have completely evolved over the last decade or so. Landlines are now becoming obsolete and communicating has gone beyond just phone and email. [Read more…]
How to Stay Safe in the Cloud
Cloud applications have gone from being a productive way to provide anywhere access to becoming a business necessity in a world where remote workers are vital to keeping operations going when business-as-usual is interrupted.
Cloud services like Microsoft 365, G Suite, and others are now where many companies station their business workflows. This means their data is also more often stored in the cloud than in on-premises equipment.
Hackers have taken notice, and the latest Verizon Data Breach Investigations Report shows that they are going after those cloud application passwords with a vengeance.
Password dumpers have now become the #1 form of malware used in data breaches. In phishing attacks, login credentials have become the information most sought after.
How can you use the cloud effectively to keep your business data available to all your workers, no matter location, and ensure it is safe? We have several tips below for good cloud security.
Tips for Cloud Security Best Practices for Chicago Businesses
Safe use of cloud solutions requires a strategic approach. You can’t just rely on the cloud provider to keep your data safe, especially when hackers are trying their hardest to steal legitimate user credentials that will give them an all-access pass to your account.
Here are some good cloud security practices to keep your business data protected.
Require the Use of Strong Passwords
Compromised passwords are responsible for 81% of hacking related data breaches.
Users often adopt bad password habits because of all the different passwords they have to use. These risky habits include:
- Reusing passwords across work and personal accounts
- Using weak passwords
- Storing passwords in unsecure place, like a spreadsheet
- Sharing passwords with vendors and colleagues
It’s important to set up cloud platforms, such as Microsoft 365, to require the use of strong passwords and reject passwords that don’t meet certain criteria. This should include length requirements and the need to use at least one number and one symbol.
Use Multi-Factor Authentication (MFA)
Adding a second factor to your logins using MFA can stop 99.9% of attempted account hacks, greatly increasing the security of your cloud accounts.
MFA simply involves having a secondary step added to login where the user is sent a time-sensitive code to a pre-approved device. That code then has to be entered to complete the login. This step keeps hackers out even if they’ve compromised the password.
Keep Account Access Monitored
Hackers may not make themselves immediately known, stealing data “under the radar” after they’ve managed to get into your cloud account. One way to detect this type of compromise is to monitor cloud account access.
Tools like cloud application security brokers and endpoint device managers can help you keep tabs on access patterns to your cloud solutions. This allows you to catch any suspicious activity, like large file downloads, when they happen.
Turn on Account Alerts
Another way to monitor who is logging into your cloud accounts is to turn on account alerts. Many of the major cloud services will have these available in the security settings.
Account alerts can let you know things like:
- When someone logs in from a new location
- When a file is overwritten
- When a file or folder is deleted
- When a new file sharing link has been created
Close Out Old Employee Accounts Promptly
Some businesses will leave old employee accounts open for a while after the employee has left. They want to make sure they don’t lose any data or may just get busy and keep putting off closing it until “later.”
Leaving old accounts open leaves your account at risk. Here are the steps you should take once an employee leaves to secure your account and data:
- Immediately change the account password
- Transfer ownership of all the data in an account to another user
- Deactivate and delete the account
Use Endpoint Device Protection
Many users stay logged into their cloud accounts because it’s easier than continually logging in and out. They also want to make sure they receive important account alerts.
But when a mobile device that’s logged into your company cloud accounts is lost or stolen, that means a stranger has a free pass to get in and do whatever they like.
Endpoint device protection allows you to manage all your endpoints remotely (mobile devices and computers). One of the important safeguards this provides your accounts, is that you can revoke access remotely at anytime from a device. Devices can also be locked and wiped remotely, reducing the risk that a thief will be able to access your company accounts and information.
Do You Have Proper Cloud Security In Place?
With businesses so reliant on the cloud, it’s vital that you pay attention to cloud security. ProdigyTeks can help your Chicago business put the safeguards in place that you need.
Schedule a free phone consultation today! Call 312-600-8357 or reach us online.
How to Protect Your Business Network When People Work from Home
One of the lasting impacts of the COVID-19 pandemic is going to be more remote workers. Most companies were forced into using remote teams during state lockdowns, and even post-pandemic, they plan to keep more workers telecommuting from home. [Read more…]
Microsoft Teams 101: Stay Connected & Productive
In today’s hybrid environment of both remote and onsite employees, small businesses in Chicago and the rest of the country have had to come up with ways to keep everyone connected and on the same page. [Read more…]
ProdigyTeks Ranked #4 Among World’s Most Elite 501 Managed Service Providers
ProdigyTeks Ranked Among Illinois Most Elite 501 Managed Service Providers
Annual MSP 501 Identifies Best-in-Class Global MSP Businesses & Leading Trends in Managed Services
CHICAGO – August 3, 2020: ProdigyTeks has been named as one of the world’s premier managed service providers and one of the top MSPs in Illinois on the prestigious 2020 annual Channel Futures MSP 501 rankings.
For the 13th year, MSPs from around the globe completed an exhaustive survey and application this spring to self-report product offerings, annual total and recurring revenues, profits, revenue mix, growth opportunities, and company and customer demographic information. Applicants are ranked on a unique methodology that weights revenue figures according to long-term health and viability; commitment to recurring revenue; and operational efficiency.
Channel Futures is pleased to name ProdigyTeks to the 2020 MSP 501.
“It is a true honor to be recognized as one of the top 10 among my peers in the 501 MSP rankings. This designation further demonstrates the devotion of our team, who are committed to continued growth. We look forward to new opportunities to advance and move the digital landscape forward,” said Paco Lebron, CEO, ProdigyTeks.
In the 13 years since its inception, the MSP 501 has evolved from a competitive ranking list into a vibrant group of service providers, vendors, distributors, consultants and industry analysts working together to define the growing managed service opportunity.
“These benchmarks are what local businesses should examine when choosing a managed service provider with the experience, skill set, business knowledge and defined strategy to help them succeed in this fast-changing digital landscape,” says Kris Blackmon, Senior Content Director, Channel Partners and Channel Futures. “In all of the managed service providers that IL has to offer, ProdigyTeks stands as a shining example of excellence.”
Ten MSP 501 special award winners will be recognized at the MSP 501 Awards Gala at Channel Partners Virtual: Digital Events for the Modern Channel on September 8 – 10. Nominations for these special awards, including Digital Innovator of the Year, Executive of the Year and the Newcomer Award, were included in the MSP 501 application, and all candidates were encouraged to submit for them.
The data collected by the annual MSP 501 program drives Channel Partners’s and Channel Futures’s market intelligence insights, creating robust data sets and data-based trend reports that support our editorial coverage, event programming, community and networking strategies and educational offerings. It serves as a lynchpin to dozens of programs and initiatives.
The complete 2020 MSP 501 list is available at Channel Futures.
Background
The 2020 MSP 501 list is based on data collected by Channel Futures and its sister site, Channel Partners. Data was collected online from Mar. 1 through June 30, 2020. The MSP 501 list recognizes top managed service providers based on metrics including recurring revenue, profit margin and other factors.
About ProdigyTeks
Founded in 2013, ProdigyTeks is committed to empowering Chicago’s underserved small businesses by providing quality, convenient and friendly IT support. ProdigyTeks takes pride in their innovative approach and excellent service experience by providing a personal touch with every customer interaction. ProdigyTeks is a Chicago-based Minority Business Enterprise.
MEDIA CONTACT:
Marketing Department
About Informa Tech
Channel Futures, Channel Partners Online, Channel Partners Conference & Expo and Channel Partners Evolution are part of Informa Tech, a market-leading B2B information provider with depth and specialization in the Information and Communications (ICT) Technology sector. We help drive the future by inspiring the Technology community to design, build and run a better digital world through our market-leading research, media, training and event brands. Every year, we welcome 7,400+ subscribers to our research, more than 3.8 million unique visitors a month to our digital communities, 18,200+ students to our training programs and 225,000 delegates to our events.
MEDIA CONTACT:
Allison Francis
Editor, Channel Futures & Channel Partners
Editor, MSP 501
4 Advantages of Consolidating Your Tech
Technology is the lifeblood of business today, and you likely have a lot of it. But you may have accumulated software and hardware as you grew. Now, you have a hodgepodge of technologies never designed to work together. Consolidation can help.
Large corporations can afford an in-house IT team to keep track of all the hardware and software, but small- to medium-sized businesses often need help. Managing computers and mobile devices, and telephony print and fax systems can be overwhelming. Then, there’s all the software you need to secure, not to mention setting up data recovery in case of a disaster or emergency.
Consolidating your technology offers several benefits to companies of all sizes. A managed service provider can help.
#1 Increased Efficiency
If there’s a problem with your printers, phones, or Internet connection, you call your provider. When many vendors offer each of these services, you make several calls, which means waiting on the phone with a printer tech, phone company, or internet service provider (ISP).
When you connect with customer support, they can address only issues in one area of concern. The ISP isn’t going to know anything about your phone service, and the phone company knows zilch about printers. This disjointedness can waste a lot of time.
With an MSP, you need to make one call only. The support person will know and understand your entire system. They offer input based on how different technology interacts.
#2 Cost Savings
Lacking a holistic view of your technology and its interactions, you can end up wasting money. You might invest in a new feature for voice over IP, duplicating a capability you already have online.
Consolidating your technology with a single provider can also streamline costs. The first thing an MSP will do is to map out how your technology works together. Armed with an understanding of business needs and goals, they’ll make recommendations. You may be able to cut back on services in one area with a simple upgrade in another. Perhaps you’re paying for software licenses you no longer need. Plus, the MSP identifies opportunities for cost savings gained from bundling services.
The MSP typically charges a monthly, consolidated fee. Instead of managing several bills for every technology, you pay a single, consistent fee, which also makes budgeting much easier.
#3 Business Agility
If 2020 has taught us anything, it’s that business needs to be nimble. Yet your ability to react can be slower working with many different vendors. Simplifying your processes can streamline your response times.
An MSP will take a proactive approach to oversee your technology needs. They want you to avoid disruptions in the first place. Partner with an MSP to keep technology current, security up to date, and systems upgraded. This frees up what IT staff you have on-site to do more business- and revenue-generating work.
#4 Supportive Partner
Individual vendors focus on selling you their particular services or systems. The overall interplay of your technology isn’t their primary concern. Yet ensuring all your technology interacts effectively and efficiently is what the MSP does best.
Working with an MSP you gain a business partner that cares about your success. The MSP’s job is to determine whether:
- your business could be performing better;
- your team could be collaborating more;
- your processes could be more efficient;
- you have the right answers to cybersecurity risks and issues;
- your business has the best technological tools to meet its needs.
An MSP offers a single point of contact. That contact will understand your entire setup and how it works together. The MSP will help you make better purchasing decisions. Plus, as a true business partner, an MSP supports your agility and success. Find out more about what we can do for you today!
3 Cyberattackers Putting Business at Risk
Cyberattacks and data breaches happen worldwide, and no one is immune. Your business needs to protect its networks and systems, and secure sensitive data. But how much do you know about the types of cybercriminal out there? This roundup discusses the biggest threats and what they’re after.
Cybercrime Gangs
Online crime is a lucrative industry. Cybergangs go online to offer “crime as a service.” Their targets vary and can be spread out globally. In 2019, one international crime gang stole $100 million from more than 40,000 victims. Culprits were found in the US, Bulgaria, Germany, Georgia, Moldova, and Ukraine. Victims included small businesses, law firms, international corporations, and nonprofits.
Many of these bad guys may have started out in the digital environment, but well-established street gangs are turning their attention to cybercrime too.
Typically well-funded and organized, cybergangs work long-term to mount large-scale attacks. They target banks, law firms, healthcare networks, and other big businesses.
Still, small businesses can be targeted by cybercrime gangs. You could be the first domino to compromise a larger, more lucrative target in your supply chain.
State-based Actors
One nation pays an individual or group to target another country. On the digital battlefield this could mean:
- tampering with an election;
- infiltrating another country’s banking system;
- compromising critical infrastructure;
- accessing intelligence;
- creating incidents of international significance;
- engaging in propaganda, disinformation campaigns;
Australia recently announced a “sophisticated state-based cyberattack” on political and private-sector organizations.
State actors also used cyber techniques to damage Iran’s nuclear program. They left an infected thumb drive in the parking lot. A well-meaning staffer found the USB and plugged it into the facility computers. The virus caused Iran’s fast-spinning centrifuges to go into overdrive.
These attackers are often motivated by nationalism, but this doesn’t mean businesses are safe. A politically motivated cyber actor might target a hotel hosting an international convention or gain access to a government vendor to send false communications.
Lone Wolf
Also known as disorganized crime, this is the online equivalent of a petty thief. Many make their income stealing money from low-hanging targets.
Some Lone Wolves are only interested in proof-of-concept: hacking into businesses and governments to see if it’s possible, without doing any damage once they are inside.
Now that you better understand why your business might be targeted, it’s time to take the necessary steps. We can help solidify your cybersecurity stance. Partner with a managed service provider. Our experts can set up email security, remote access management, anti-malware scanning, and more. Contact us today at 312-600-8357!
Keep Your Business Continuity Plans Current
Is there one thing we can count on now with COVID-19? The situation can change in an instant. You may have been confident in your business continuity plans in the past, but the pandemic has shaken us all up. It’s a solid reminder to review our plans to get back to business quickly and seamlessly.
A good business continuity plan ensures maintained operations before and during unexpected disruptions. Generally, decision-makers strategize in advance to ride out:
- natural disasters
- man-made disasters
- national emergencies
- utility failures
- sabotage
- data breaches or cybersecurity attack
- theft
These could impact a system or network or prevent you from accessing your location to get to your computers and important data.
Now, we also know that we should prepare for the effects of an international health pandemic!
Such business-centric planning considers all necessary elements of staying on track. You’ll look at physical premises and staffing, and hardware and software requirements.
Preparing for the Unexpected
A business continuity plan tries to anticipate the worst that could happen. The problem is that we can never know what the next bad thing might be.
You may not ever need to use your plan, but taking a “these things happen to other businesses” point of view could leave you in a serious lurch.
The COVID-19 crisis has also made things real for many businesses. Governments required organizations across industries, regardless of size, to migrate to remote work. Companies with business continuity plans in place responded with greater agility, whereas others were left scrambling.
Now, many countries are beginning to slowly reopen for business. Sure, there are constraints, but the idea is to get the global economy up and running. While you’re adapting, take some time to revise your business continuity plan.
It’s better to get your decision-makers around a table (or in a virtual meeting) now, while things are calmer. Most people think more clearly when not in the midst of a crisis. So, be proactive. Plan now for the worst. You can weigh up options at leisure, pursuing many different what-ifs to determine the best plan of attack.
Look back at what worked and what didn’t during the COVID-19-related disruptions. This review can provide real insight into opportunities, and you’ll be even better prepared in the future.
Planning with an MSP Partner
Business continuity plans lay out how the business will move forward amidst disruption. Work with a managed services provider (MSP) to ensure your planning is comprehensive. Our IT experts can help enable remote work, set up data protection, and develop a backup setup.
Send us a message at help@prodigyteks.com. Put a business continuity plan in place, and be more confident you’re ready for whatever happens next.
Adding Accountability to Remote Work
Today, businesses are embracing digital technology to enable productivity anywhere, at any time. Yet ensuring accountability is a stumbling block to widespread acceptance of remote work.
Recently, COVID-19 has forced many businesses to transition quickly to working from home. Even bosses concerned about lack of control over absent employees had to make the change. Former opponents to remote work may have discovered the benefits of this approach. Employees certainly may have enjoyed the opportunity and want to keep doing it.
The good news is that technology and products are even better today for managing remote teams.
Top Tools for Remote Work Accountability
Overall, employers need to trust their people. This is true whether they’re working on-site or from home. Still, for some supervisors, trust is easier with remote monitoring abilities.
Joint calendars are a common starting point. Microsoft 365, Google’s G Suite, and other tools allow staff to share calendars. People can still schedule personal appointments and keep those private, but the joint professional calendar lets everyone on a team stay in the know. Managers can go online to track sales meetings, client presentations, or team sessions.
Project management software is another way to see what co-workers are doing. Teamwork, Basecamp, and Trello offer a central location to see a project come together. Employees can access secure software from any location to share files and interact. Individuals can set deadlines and create tasks to improve accountability and responsibility-sharing.
Business-based internal messaging software also keeps everyone on the same page. These communication tools typically provide one-on-one messaging and group chat. It’s easy to send a quick note asking someone for a status update, or just check-in. Some tools also allow individual and team audio calls as well as video conferencing. Top contenders are Slack, WhatsApp, Skype for Business, or the Facebook and Google Hangout work chat apps.
Go big enabling collaboration among employees with cloud-based office software. Microsoft 365 and G Suite enable many users to go online and work on the same things at the same time. This solution also lets managers easily view shared documents and verify progress. It’s even possible to invite clients or other external partners to view folders. For security reasons, you may want to limit their access to “view only.”
Securing Remote Work
Security is another point of friction for businesses allowing remote work, but the technology is keeping pace there also. Even so, you’ll want to educate employees about cybersecurity best practices. Requiring antivirus and malware upgrades, limiting external sharing and enabling multifactor access will help make remote work viable, reliable, safe, and secure.
Need help installing or implementing remote work tools? A managed service provider can help. Or, our IT experts can put in place the administrative controls you need to help secure work from home. Let us provide the IT help you need. Contact us today at 312-600-8357!
Returning to Work: Prioritizing Safety with IT Too
Your business has the OK to go ahead and get back to work on-site. You want to return to your office, but you don’t want to risk people’s health by doing so. After all, some say it’s too soon to go back. Plus, others predict a second wave of COVID-19 is likely. These suggestions can help you return to work while prioritizing safety.
Not everyone will welcome the call back to the corporate environment. Some employees may still be in a population vulnerable to the virus. They may want to take leave instead of returning to the work environment. Others may simply not show up.
Have your HR team send out a written notice informing employees of the timeline for returning to the office. Educate them about precautions you’re taking to provide a safe work environment. Ask for a written response of people’s intentions. Then, IT can start establishing procedures for getting everyone back to work.
You may have had great success with remote working during the quarantine. This could position you to allow workers to stay home if they are at risk or oppose the idea of returning “too soon.”
For those coming back, support social distancing by phasing in people’s return. Your business could also use a hybrid IT solution to allow people to come in just three days a week, and they could continue to work two days at home. This allows staggered re-entry and reduces the number of people on-site at the same time.
Back-to-Work Technology
You may be thinking you already have all the tech you need to go back to the office. C’mon, you were already working from there before this whole thing started. Plus, now you have all the new tools you added to support remote-employee productivity.
Still, you may not have invested in a long-term remote-work solution that will now support a hybrid model. Or perhaps the on-site tech you’ve long relied on isn’t meant to handle remote working for the long haul.
To achieve a flexible hybrid model, go with cloud solutions, or expand on-site IT. Do you need to add infrastructure to handle remote employees using virtual private networks (VPNs)? Both on-site staff and off-site workers might need to securely access systems at the same time.
Adopting cloud collaboration software allows co-workers to access network resources simultaneously, regardless of location. Or with virtual desktops, employees can access the same files and business applications on their work machines or on a personal device.
Bringing people back to the office, you’ll want to rethink the physical setup. Support social distancing by spreading employees’ seating arrangements out more. This will require moving around computer hardware, too.
If you were previously sharing technology, you’ll also need to add more desktops. Or you might invest instead in more laptops or portable devices. This could mean securing more software, too.
Added IT Precautions
Finally, cybercriminals are opportunistic. They’re already exploiting people with malware promising vaccines or cheap masks. These bad actors are also looking to exploit the tech demands on businesses. Many businesses adapted to a new way of doing things: they moved files to the cloud, and they allowed employee access from personal devices, but they did so quickly.
Explore any new vulnerabilities from your transitions. This is a good time to double-check permissions. Ensure that accountant Jane can access staff wage data but that receptionist Jenny can’t. Also, confirm that all virus protection and security patches are current.
Active planning is the answer to a smooth return to work. While offering protective coverings and ramping up cleaning in the office is important, make sure that you don’t overlook your technology needs.
Our IT experts can help you adapt nimbly. Contact us today at 312-600-8357 or info@prodigyteks.com!
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- 6
- …
- 9
- Next Page »