ProdigyTeks Logo
CALL US
(312) 600-8357
  • Home
  • About Us
    • Awards and Publications
  • IT Services
    • Managed IT Support
    • Network Security
    • Network Design and Implementation
    • Backup & Disaster Recovery
    • Email/Spam Protection
    • Cyber Security Services
  • Contact Us

Why 2-Factor Authentication is Important

August 29, 2018 by Paco Lebron Leave a Comment


You hear about hacks all the time. The news covers major websites who have had data leaks containing your email and password. Computers get infected and capture your login details for bank accounts and credit cards. In the worst cases, identity theft occurs because it is an easy crime to commit with a high reward.

In 2018, the passwords you used to trust to keep the bad guys out of your accounts are not enough anymore. Cyber attackers now use methods such as phishing, pharming, and keylogging to steal your password. Some have the power to test billions of password combinations.

If you’re like the majority of people, you use the same password for several websites. That means anybody who has figured out that password has access to everything you’ve logged into with it. In a time when it is extremely easy to look up what a person named their first pet or high school mascot, security questions aren’t much help.

Consider how a jewelry store operates. They don’t simply keep their valuables locked away with one key. There are alarms ready to be triggered, motion detectors, and sometimes even bars on the windows. Your data is valuable, just like jewelry. You need more than one line of defense to protect it.

In the computer world, your second line of defense (after your username and password combination) is called “2-factor authentication.” Sometimes referred to as multiple-step or multi-factor verification, 2-factor authentication is a way to double check a person’s identity. This can be enabled every time a person logs in or just under certain circumstances. For example, signing in from a new device or different country might trigger 2-factor authentication.

Many of the services you may already use, such as Facebook, Gmail, Xero Accounting, and more, have 2-factor authentication options. If your bank has ever sent you a special code through text or email to enter before logging in, you’ve already used a type of 2-factor authentication. They can also be in the form of a smartphone app or a physical electronic dongle.

2-factor authentication is absolutely crucial for online banking, email, and online shopping such as Amazon or PayPal. It’s also a must-have for cloud storage accounts (like Dropbox or Sync), password managers, communications apps, and productivity apps. This is especially true if you frequently use the same passwords for different websites and apps.

Some may consider 2-factor authentication unnecessary for social networks, but these are actually very important to keep safe. For ease, a lot of websites and apps allow you to sign up through your Facebook or Twitter account. You need to keep these networks safe so that somebody with your password can’t suddenly get into every account you have linked.

The point of using 2-factor authentication is to make hackers’ lives harder and prevent them from getting into your accounts. If they have captured your login username and password, they still need a second device to get in, especially when the computer or phone they are using has never logged into your account before. This makes it significantly more difficult for anybody to breach your account.

Plus, if you receive a notification with a special code to enter for logging in, and you weren’t trying to log into that account, you have a good signal that somebody else was trying to get in. That means it’s time to change that password and be grateful you had 2-factor authentication.

It’s unfortunate that there is currently an abundance of skilled hackers ready to take advantage of those unprepared. Luckily, you can still stop them -even if they have your login information at hand. 2-factor authentication is one of the easiest methods to keep your accounts safe.

Give us a call at (312) 600-8357 to help secure your business and accounts.

Filed Under: Security, Small Business

Share:

Should You Let an Amateur Loose on Your Network?

August 16, 2018 by Paco Lebron Leave a Comment


Most of us know a fair amount about computers, even kids are joining circuits and coding programs in schools – but that does that make everyone an IT expert? It’s fair to say almost all workplaces have that employee who can finesse the printer or use shortcuts nobody else knows about. They have skills, absolutely, but they often know just enough to be dangerous to your business.

Hobby IT skills are learned on home computers which are very different from a professional business setup. When something goes wrong on a home computer, there’s no drastic impact if parts need to be replaced, data is lost or it stays down for a week or two. In a business setting, every problem costs time and money, usually creating a domino effect through the entire network. Would you gamble the success of your business with a non-professional who did a quick Google? It’s unlikely you’d let someone be your lawyer purely because they can deliver a stubborn argument, nor would you let someone perform surgery just because it looked easy on TV. Businesses have unique, specialist IT needs that go beyond amateur computer skills and there’s always going to be more at stake.

Designing and implementing a custom backup plan for your business is a particularly interesting area. While most home users skip this part entirely, an IT professional has seen (and recovered) all manner of situations and will use that knowledge to ensure that if the worst happens, your business is covered. This could mean anything from having a complete copy of your drive stored securely in the cloud or drilling down to backup only the most important data. An IT expert is equipped to help you identify the value in each piece of data and implement a plan so robust that if your business is ever hit by disaster or breach, downtime is minimal – along with losses.

If a disaster ever does occur, like fire, flood or theft, would an amateur know what to do? Who to call? These situations are so charged with tension and panic that making the wrong moves can lead to more damage. A professional help design continuity/disaster plans, which map out exactly what should happen, who should do it and in what order. It takes out the guesswork and minimizes downtime. Perhaps more importantly, the expertly written disaster plan will include a complete risk analysis so that you know in advance where to strengthen your protection. It also includes a business analysis so you know which systems are dependent so you can stop the domino effect, plus know the legal/contractual impacts, financial impacts and so on.

Your IT professional will also help ensure your business is meeting any regulatory requirements. Many businesses are subject to strict data rules set by government bodies, such as FISMA and HIPAA. The regulations change often and demand increasingly more attention to data security, with hefty penalties for businesses that fall behind. Professionals are constantly in the loop around upcoming revisions and how best to comply with little to no disruption to your daily business. Part of ensuring your business is safe means staying on top of software updates and patching multiple computers at the same time.

The best option is to run the updates before employees arrive for the day, and since the process can take a few hours and be quite fiddly, it’s generally not something amateurs will prioritize. Unfortunately, as we’ve seen with recent cyber-attacks, delaying a security update by even a few days can lead to disaster. Engaging an IT professional is a cost-effective solution that keeps your business running, growing and earning.

Let the professionals manage your tech the right way by calling us at 312-600-8357.

Filed Under: Security, Small Business

Share:

The Best Way to Buy New Computers

August 7, 2018 by Paco Lebron Leave a Comment


You’ve decided to buy a new computer for your business, perhaps even a whole set of computers. You can almost taste the excitement as you think about those sleek new machines and how much faster your employees will be able to do their work. There’s just one thing left to do: actually, choose which ones. That’s where it gets tricky. Most people pop out to their local retail store and look at the display models, then get overwhelmed when the salesperson starts throwing words like CPU and RAM around. Unfortunately, that scenario almost always ends up with your business having the wrong computer. Here’s why, and what you should do instead.

Most retail salespeople are minimally trained: Unsurprisingly, salespeople are trained to sell! They may have an interest in computers and they’re certainly great at reading the words on the box to you, but that’s the limit of their expertise. Their goal is to make the sale, earn the commission and go home happy. You are getting the computer your business needs and that 100% suits your purpose isn’t particularly high on their priority list. They’re not equipped to deeply understand the way your business works, nor do they have the time to find out. You’re also more likely to be upsold extras you don’t need but will rapidly drain your budget.

Compatibility can be a problem: While you probably know having both Mac and PC can lead to compatibility issues, did you know even switching brands within your PC network can cause issues? There are so many moving parts to your business network, from printers to routers, laptops to mobile payment processors, that anytime you throw a new computer into the mix you could end up with compatibility problems. Salespeople don’t know what your current setup is at your home or business but may still make recommendations based on assumptions and hopeful guesswork. Even the number and types of ports available on retail computers may cause a problem once you’re setting up.

The last thing you want to do is end up with a collection of wobbly adapter plugs as you attempt to course-correct and make do until it’s time for a do-over. Any time your employees need to go off-book and create workarounds, efficiency is guaranteed to take a dramatic hit. It’s best to skip the drama and get the right computer first time around.

Support could get tricky: Your IT provider will often stick to a handful of vendors to ensure all parts are kept uniform. That way we know which parts will work together, and should something fail, we can usually get replacements quickly. We’ll often have special relationships with parts vendors and can get special pricing, extended support, and upgrades that a salesperson can’t match. Your IT budget goes further with your consultant, and not just on the day of purchase.

By contrast, when you buy computers through your IT provider, you know you’re getting the exact computer your business needs. We know your business inside and out, including your long and short-term goals. From the first time you work with us, we’ll be sure to do our research before making a recommendation. Remember, you want your computers to last 3-4 years of heavy usage, so it’s also a good idea to buy business-grade computers. While the computers at the retail store are equally shiny, they’re rarely as durable as the ones your consultant can supply.

Your IT provider will also be able to set the new computers up, ready to go with the exact software you need. We’ll strip out all the bloatware (unnecessary programs and trials that come pre-installed) and configure your new computers to work perfectly from day 1. Your employees will be able to enjoy their new systems, take full advantage of the productivity boosts you paid for. That means the internet working, internal network connected, programs playing nice with each other, and yes, even printing without problems!

We can help with your next purchase – ask us how by calling us at 312-600-8357!

Filed Under: Entrepreneur, Maintenance, Small Business

Share:

4 Ways to Avoid IT Downtime

August 3, 2018 by Paco Lebron Leave a Comment


Technology is a wonderful addition to every business, but what happens when the IT goes down? All those things you do now that were completely unthinkable 30 years ago have become part of your day-to-day processes. It lets you compete with big business and connect with customers from far away, boost productivity and efficiency like never before, and even added multiple zeros to your bottom line. IT is a necessity. Unfortunately, this means when downtime inevitably hits, you’ve got a BIG problem.

Maybe it’s from a virus attack, a bug in the system, hardware failure or something else…whatever the cause, the impact is real and measurable. Gartner (an IT research company) reports that 43% of small businesses close their doors right after a major data loss, and only a tiny 6% survive long term. The financial cost of each hour can be in the thousands, and the damage to your brand could be ruinous. Fortunately, while downtime will occasionally strike every business, there are things you can do to minimize the duration and frequency.

Taking a few simple actions now may result in your business staying open while your competitor gives up.

Use monitored antivirus and firewalls

While most businesses have these protections, not all have embraced the idea of monitored antivirus and firewalls. Instead, the default setup has more in common with a home setup than a robust professional system. Given that SMBs are a primary target for malware and cyber-attack, you should seriously consider moving to the monitored versions. Our experts set up custom protection to block all attacks, both known and emerging. All updates are taken care of, plus company-wide protections applied so users can’t accidentally infect the network. When something doesn’t look quite right, our monitors take immediate action to protect your business.

Have backups you can count on

A great backup can not only protect you from digital threats like viruses and ransomware, they protect against physical threats like robbery, fire or natural disasters. The last thing you want is for your business to be crippled by data loss. A robust backup system can be as simple as asking our Managed Services team to take care of it, or if you have an on-site technician, using the rule of 3: one backup on the server, one unplugged from the server, and one off-site. If anything ever goes wrong, you’ll be able to pull up the most recent backup and continue as normal. Businesses without good backups tend to be down or limping along for days, if not weeks.

Plan for disaster

Nobody likes to think about their business flooding or being hit with ransomware, but would your employees know what to do if something happened? Having a comprehensive Disaster Recovery Plan helps you get up and running quicker, minimizing downtime. Everyone knows what steps to take, who to tell, who should be doing what, and which systems take priority.

Monitor hardware for early signs

Computer hardware is like any piece of equipment – when it’s getting old or cranky, it will let you know! This could be anything from making noises, being louder or slower than normal, or even system crashes. Each symptom is the early warning system that allows you to take action before a crash that sends everything into downtime. Our hardware monitoring service runs in the background and tracks various metrics to predict time until failure. If the signs point to imminent failure, we’ll let you know and can often repair/replace the affected hardware with little or no downtime.

Downtime is an unavoidable part of any tech-enabled business, but your preparation can dictate whether it goes for one minute or one week and how often it happens. According to one study, most firms experience 43 hours average downtime per year, a number much too high for comfort. While scheduled downtime can sometimes be unavoidable, your business will appreciate being able to skip the panic of surprise downtime events. Reducing your risk is the best action you can take, making downtime a truly rare occasion. Even better, our Managed Services can take care of this for you, stopping many downtime-events before they occur.

Talk to us about minimizing your downtime. Call us at 312-600-8357

Filed Under: Entrepreneur, Maintenance, Small Business

Share:

Why Periodic Security Assessments Should Be Your New Normal

July 25, 2018 by Paco Lebron Leave a Comment


By now you know that building up your cybersecurity is just as important as building up your cash flow. Both are essential to your success, but while most businesses keep an eye on the financials, they tend to think cybersecurity is something they can set and forget. Unfortunately, cybercriminals are constantly coming up with new methods of attack and the security you had in place yesterday may not be sufficient today.

Instead of reacting to breaches and taking on the costs of downtime, lost files, and destroyed trust, a periodic security assessment can identify blind spots that place you at risk. Once you know about these problems, you’re able to proactively set up adequate protection before cybercriminals strike. It’s best to use independent IT experts who can audit your security from an outside perspective, often seeing risks that would otherwise be missed.

Regulations change – Are you affected?

Many businesses are kept to strict government regulations around the way they store, process and protect data. Their operating license depends on staying as secure as possible. All regulations require regular security assessments but they vary in scope and timeframe. As regulations change, so do the security assessment requirements. You can imagine how much stricter they are now compared to just 5 years ago. Our team can ensure your business is meeting the relevant regulations, diving deep to be certain you’re safe.

Security patches and updates are vital

It’s so easy to fall behind on your security patches, after all, it seems like there’s a new update every week and each one takes precious time to apply. What we’re seeing though, is that cybercriminals are targeting any business running late, and it’s basically easy pickings for them. If you’re unpatched where it counts, it’s like inviting them in. When we conduct your security assessment, we take a look at your history and see if your business has a robust patch plan in place and make sure you’re up to date. If there’s an issue that’s placing you at risk now, impacted you in the past, or will in the future, we’ll find it.

Viruses are always evolving

Just like the human variety, computer viruses are nothing to welcome into your workplace. They’re constantly evolving to skip past anti-virus scans and do damage in new and interesting ways. Cybercriminals know people are more aware of the traditional infection methods like downloading an attachment or inserting an infected USB, so they’re getting more and more creative. Your security assessment doesn’t just include ticking that you have the latest anti-virus, it includes identifying where you’ve had the most breach attempts and where your biggest vulnerabilities are. This type of precise awareness has a lasting impact on reducing your risks.

Your business may have changed

As your business has grown over the years (or shorter if you’ve experienced a recent surge), your entire setup has changed. More employees, expanded remote access, additional vendors, supplementary locations…the list really is endless. With each change has come a new risk, particularly if your security has been growing around you. It might be that your password policies haven’t been updated since you began, or that you still have the old voicemail system even though phones are within easy reach of customers. This is perhaps one of the most useful areas a security assessment can help with, as you and your employees are accustomed to the business working in a certain way, whether that way leads to risk or not. Our experts will be able to see things from a different perspective, particularly as we make sure to think the same way a cybercriminal would.

What to do with your assessment results

While many experts might present you with a long list of problems and leave you feeling overwhelmed, our team ensures you have a benchmark for progress. You’ll know exactly what you need to do, how we can help, and perhaps most importantly, which actions take priority. Moving ahead, future security investments will be smarter as you focus on the high-payoff areas. You’ll also know exactly what you’ve done well and where your security strengths lie. Employees will see how much you value security, which helps to create a stable culture, and you’ll be able to report your commitment to customers, confirming they’re making the right choice by staying with you.

Book your security assessment today. Call us at 312-600-8357

Filed Under: Maintenance, Privacy, Security, Small Business, Uncategorized

Share:

Should You Pay for a Ransomware Attack?

June 4, 2018 by Paco Lebron Leave a Comment


Getting hit with a ransomware attack is never fun, your files get encrypted by cybercriminals and you’re left having to decide: should we pay to get them back? It’s a scene that’s played out across the world with 70% of businesses saying ‘yes’ in 2016 alone. Here’s what you should consider if you’re ever in this situation.

Do you trust them?

Besides the fact that they’re criminals holding your data hostage, how confident are you that they’ll send the decryption key? Most attackers demand you send the payment via untraceable Bitcoin, so you have no recourse if they take it and run. You’re also equally trapped if they decide they asked too little and come back with increasingly higher demands. If they do send the decryption key, be aware they still have access to your systems and can hit you again at any time until your network is disinfected by experts. Businesses don’t exactly want their breach publicized either, so many don’t admit to paying the ransom, whether it went to plan or otherwise.

Can you manage the impact?

Best case scenario, you can wipe the affected drives and restore from a clean backup without paying the ransom. You might even decide the encrypted files aren’t that important and simply let them go, or even wipe a whole laptop or workstation. On the other hand, if your data management comes under any special regulations, like health or legal, you may find the attack has a much wider, more intense impact. The attacker will usually give you a countdown to motivate a payment, with a threat of deletion when it hits zero. If the data isn’t that valuable, or you have confirmed backups, this urgency has no effect. There are also new types of ransomware like KillDisk which can permanently wipe your entire hard drive or even network.

How much do they want?

Cybercriminals rarely send out global attacks with set amounts, instead, they prefer to customize the ransom based on how much they think you can pay. Large corporations and hospitals are hit with very high demands, while small business demands are more modest. They may be criminals, but they’re smart people who know your financial limits. They’ll also consider how much similar businesses have paid and how quickly, then expect you to follow suit.

Are your backups good?

Many businesses are discovering too late that their backup systems aren’t robust enough to withstand this type of attack. Either they’ve become infected too, they weren’t up-to-date or they backed up the wrong data. It’s worth doing some quick checks on your backup processes as even if you have to take the system down for a day as you recover, you’re still light years ahead of those without them.

What’s your policy?

More and more often, businesses are adding ransomware to their disaster recovery plans and having predefined actions mapped out. Seemingly simple inclusions like who has final say over the payment decision can stop chaos in its tracks. Employees and management alike can then approach the situation calmly, ready to make the best decisions for the business.

Stay safe in the first place

Ransomware is showing no signs of slowing down. As more businesses keep them funded the cybercriminals are steadily launching new attacks and making it their full-time job. Most attacks come via phishing emails – those emails that trick employees into clicking a link – and they can be extremely convincing. While training helps people spot them, it’s no guarantee. We recommend using business-class spam filters to catch these types of emails before they land in your employee inboxes so that triggering a ransomware attack becomes something that happens to other businesses, not yours.

Secure your data systems now, we can help! Call us at 312-600-8357

Filed Under: Scams, Security, Small Business, Virus and Malware

Share:

4 Advantages of Managed IT over In-House IT

April 6, 2018 by Paco Lebron Leave a Comment


It’s tempting to hire an in-house IT technician to take care of your network and set them up with a cozy office just down the hall, but is it the right decision for your business? If you’re like most businesses, you’re always on the lookout for ways to save money while improving results. Sometimes this means expanding your staff to include a team of tech specialists at your beck and call, but this can often be an unnecessary expense that leaves you with highly paid employees twiddling their thumbs all day. For SMEs who are looking for the best of both worlds, we recommend Managed IT services.

Put simply, Managed IT is our solution which gives you that team of specialist technicians and network experts, without the ‘quick, look busy’ element - and at a fraction of the cost. Naturally, you’d rather see your IT budget working to support your growth and kept as low as possible. That’s our focus too, and why we don’t simply maintain and repair your systems, we proactively monitor to avoid downtime and work with you to ensure your IT increases productivity and efficiency. Whether you already have in-house IT and are auditing the value, or are curious about what having IT support might be like for your business, we’ve put together a few factors to consider before making your choice:

Availability: Most employees work 9-5, but what happens if something goes wrong with your systems outside these hours? Your in-house technician won’t appreciate being woken at 1 am and called in for emergency repairs. It’s more likely that they simply won’t answer the call (or hear it), or if they do, expect some hefty contract renegotiation come 9 am. Managed IT is very different as we expect problems after hours and have support technicians ready. We know that every minute of downtime is affecting your revenue, plus your business reputation, so we prioritize getting your systems up and running asap. As a bonus, with our Managed IT these types of disasters are rarer as we’re constantly monitoring and correcting problems before they occur.

Total cost: One of the things that may have attracted you to have an in-house technician is the cost. But while you may be able to pay them a lower hourly rate, there are extra costs like hiring, training, ongoing training, healthcare and retirement. Once you start adding up the cost of an in-house technician, you might find it’s eating up your IT budget and leaving you scrambling to fill gaps you didn’t expect. Upgrades get delayed, opportunities missed, and IT expenses become a sore point. In comparison, Managed IT is one fixed monthly rate delivering enormous value, including access to specialists across all software applications and technology.

Ongoing Training: Putting aside the fact your technician will often spend entire weeks away upgrading their skills and leaving you scrambling for support while they’re gone, those training costs quickly add up. With a salaried technician, you’ll have to pay all ongoing training and certification costs, plus travel costs for industry conferences. We know how important it is to remain current, certified and skilled in new technologies, so we spend the money to invest in ourselves so we can serve you better. We’re part of industry related communities and attend multiple conferences each year, all at our own expense.

Different goals: For most employees, a higher wage is the goal and many will job-hop to achieve that. A salaried tech may be looking for the first opportunity to leave and get paid more, often leveraging all the training you’ve just provided. In these modern times, switching jobs regularly is expected, with an average of only 3 years in each position. Considering how much it cost your business to acquire, train and upskill your technician, 3 years is an unreasonable ROI. Our goals couldn’t be more different - we only aim to keep you a happy customer for as long as we can!

In the end, your business needs to find the right balance between profit and expertise. When you partner with our Managed IT, you’re securing availability, ever-increasing expertise and commitment to your success. We work closely with you to provide the very best support and protect you costly disasters, taking preemptive action to keep you safe and operational. There’s no doubt Managed IT is a better decision than hiring an in-house technician, and we’d be delighted to prove it to you.

Talk to us about Managed IT for your business. Click the button below for your assessment 

Contact Us

Filed Under: Maintenance, Small Business

Share:

Does Dropbox Make Sense For Your Business?

May 29, 2017 by Paco Lebron Leave a Comment

It seems so easy! Drag your files into a Dropbox folder and you’ve got yourself a file sharing system that brings your business in line with modern expectations. But then again, maybe not.

Dropbox has grown to become one of the main file sharing and cloud storage solutions of choice, with a core simplicity that’s hard to deny. But for business, that simplicity comes with a catch. In some cases, sticking with the familiar blue box can provide good value, and of course, it never hurts when your staff already know how to use your software. In other cases, you’ll need to consider alternatives designed to meet your needs more explicitly.

When Dropbox is a Good Choice

Micro-sized: If your business is small with no more than a handful of employees (or none);

No sensitive information: This includes accounts, customer details, vendor, staff or proprietary data; plus

Nobody ever accidentally deletes anything: Dropbox is a syncing service, which means when a file is deleted, it deletes it from all machines. While the file is recoverable from the Dropbox website within 30 days, by the time you notice it’s missing, it might be too late.

If you’re thinking those attributes sound more like a fictional business, you’re not far off. Somehow, Dropbox’s popularity in the consumer sphere has snuck into business environments, despite the risks. Key amongst these is the fact that Dropbox is designed for syncing, NOT a backup. This means while your data is sprawling across all connected devices, it’s a mirror of the source only – when you delete or change the original file, the Dropbox version immediately syncs with it. In some cases, this can spread malware between your connected devices and put all of them at risk.

Your business also misses out on important security controls, such as user-level access control and password protected links. Rather like a free-for-all, the shared files are sitting there available to anyone with either a connected device or an unsecured weblink. You’ll also miss collaborative editing, losing out in productivity and data resilience as multiple employees overwrite each other simultaneously, with no record of who even opened the file, let alone changed it.

If Dropbox makes sense for your business, there’s no reason to change. But if it’s clearly not a good choice for you, there are multiple corporate grade syncing solutions. These are designed for business with security, encryption and collaboration controls built in. Rather than the easiest solution which may pose a risk to your business and digital security, consider implementing a scalable solution that meets all your needs.

Call us at 312-600-8357 to discuss syncing solutions for your business

Filed Under: Entrepreneur, Privacy, Small Business

Share:

Why You Should Never Use A Free Email Address For Your Business

May 25, 2017 by Paco Lebron Leave a Comment


The message is clear: email is king. Many clients and customers choose to communicate primarily by email and as you know, it gives a fantastic return on investment in your marketing strategy…unless you’re using a free email like Hotmail, Gmail, or even your internet provider. If that’s the case, you’re losing business each and every day.

It looks unprofessional: Imagine if banks used free email accounts – you’d never feel comfortable giving them your personal details let alone any money. How people perceive your business is what makes your business. Without that professional touch, you’ll appear temporary and fly-by-night. It puts your credibility into question and sends the message that you’re not serious about doing business – or worse – that you’re prepared to cut corners.

It erases your experience: Newer, fledgling businesses often start out with a free email address. The address clearly communicates that they are new and have little experience, and are perhaps testing the waters in a new direction. They’re not even remotely proven yet and are firmly within the hobby zone. Continuing to use the free address once your business moves into the professional arena means you’ll struggle to build momentum and any experience will be negated.

It’s forgettable or inappropriate: Your business success hinges on being memorable enough to gain referral custom and results from your advertising. Unfortunately, free email addresses are by default filled with hard to remember clutter, for example – joesplumbing_1985@hotmail.com or milkshakes_mybabby@gmail.com.

Neither of these rolls off the tongue is appropriate for business or can be remembered without a high likelihood of typos and bounce back. Branded email addresses such as joe@joesplumbing.com make running a profitable business much easier.

It’s not permanent or safe: When you use a free email address you are at the mercy of the email provider. They may close down operations or cancel your account for any reason. These types of accounts are also often hacked and leaked on a global scale. When a better internet or email deal comes along, you’re still stuck using the old address because it’s printed on your business cards, car lettering, and flyers.

Some will agree to keep the address open for a fee, but you’ll lose the control and flexibility you need to grow your business. With your own domain name, you own it and can move it to a new business-grade email service easily. You’ll also have complete master control over the addresses within your domain, resetting passwords and creating/closing accounts at will.

Give us a call at 312-600-8357 to set up your branded business email.

Filed Under: Cloud Email, Entrepreneur, G-Suite, Office 365, Small Business

Share:

  • « Previous Page
  • 1
  • 2
  • 3

ProdigyTeks

(312) 600-8357
159 N Sangamon Street Suite 262
Chicago, IL 60607

Get Remote Support

Services

  • Network Design and Implementation
  • Network Security
  • Email/Spam Protection
  • IT Support & Managed Services
  • Backup & Disaster Recovery
  • Cyber Security Services

FOLLOW US

Copyright © 2023 · ProdigyTeks · 159 N Sangamon Street Suite 262, Chicago, IL 60607