1815
paged,page-template,page-template-blog-large-image,page-template-blog-large-image-php,page,page-id-1815,page-parent,paged-18,page-paged-18,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Blog

Once Disaster Hits, Everyone Says, “I Wish I Would Have…”

Two years ago, no one could have predicted that countless businesses would shift to a remote work model. The pandemic hit hard and fast, and small businesses had to think on their toes. Many had only a few weeks to adapt. It was stressful and extremely challenging.

Looking back on it, many SMBs wish they’d had a plan in place that would have made things easier. When the pandemic hit in February/March 2020, SMBs had to absorb the huge cost of getting their employees up and running off-site. Not only was it costly, but it also took a lot of coordination and on-the-fly planning. This meant things slipped through the cracks, including cybersecurity.

As they say, hindsight is 20/20. You may wish you had a plan in place or had more time, but you didn’t. A vast majority didn’t. However, you can still plan for the future! While you never know when disaster is going to strike, you CAN be prepared for it. Whether that disaster is a pandemic, flood, fire or even hardware failure, there are steps you can implement today that will put you in a better place tomorrow. Here’s how to get started.

Put Your Plan Into Writing.

First and foremost, you should have a standard operating procedure to call on should something go wrong. For example, in early 2020, many SMBs didn’t have a security plan in place, let alone a remote work security plan. They had to make it up as they went, which just added to the challenges they were already experiencing.

To get over this challenge, work with an experienced IT services company or managed services provider (MSP) to put together a plan. This plan should include a cybersecurity protocol. It should define what malware software employees should be using, what number they should call for 24/7 support, who to contact when they receive suspicious e-mails, how to identify suspicious e-mails and so on.

More than that, it should outline exactly what needs to happen when disaster strikes. Pandemic? Here’s how we operate. Fire? Here’s what you need to know. Hardware failure? Call this number immediately. The list goes on, and it can be pretty extensive. This, again, is why it’s so important to work with an MSP. They’ve already put together plans for other SMBs, and they know where to start when they customize a plan with you.

Invest In Security And Backups.

While every business should have network security already in place, the reality is that many don’t. There are a ton of reasons why (cost concerns, lack of time, lack of resources, etc.), but those reasons why aren’t going to stop a cyber-attack. Hackers don’t care that you didn’t have time to put malware protection on your PCs; they just want money and to wreak havoc.

When you have IT security in place, including firewall protection, malware software, strong passwords and a company-wide IT security policy, you put your business and all your employees in a much better place. All of this should be in place for both on-site employees and remote workers. With more people working from home going into 2021, having reliable IT security in place is more important than ever before.

On top of that, you should have secure backups in place. Investing in cloud storage is a great way to go. That way, if anything happens on-site or to your primary data storage, you have backups you can rely on to restore lost or inaccessible data. Plus, having a solid cloud storage option gives remote employees ready access to any data they might need while at home or on the go.

Where Do You Begin?

Some SMBs have the time, money, and resources to invest in on-site IT personnel, but most don’t. It is a big investment. This is where partnering with an experienced IT services firm can really pay off. You may have employees in-office or you may have a team working remotely – or you may have a mix of both. You need support that can take care of everyone in your organization while taking care of the data security of the business itself. This is where an IT partner like Net Activity comes into play. They are someone you can rely on 24/7 and someone who will be there for you during a pandemic or any other disaster.

BYOD vs. CYOD: Which Is Better For Your Business?

Bring your own device (BYOD) and choose your own device (CYOD) policies have been shown to enhance employees’ flexibility, productivity, and job satisfaction. If you’re thinking of adopting one of these strategies, here are some things to consider.

What is BYOD?

With BYOD, employees use their own devices, such as smartphones and laptops, to connect to the company network, access business data and applications, and perform work-related tasks. Since your staff are already familiar with these devices, the need to learn and adjust to new technology is eliminated. Therefore, your employees can get right to work, which leads to higher efficiency as well as better employee experience.

Also, BYOD gives employees greater flexibility and increased mobility, as it enables them to work anywhere, anytime. They don’t have to be chained to a desk in order to do their tasks. Instead, they can use their smartphones to check emails or their laptops to edit documents even when they’re on the go.

Your business stands to gain a lot from BYOD as well. Aside from enjoying enhanced employee productivity, you can reduce expenses related to owning computers and mobile devices, including maintenance and upgrades. The money you save can be put toward investments to further improve your bottom line.

However, the main drawback of BYOD is the risk involved when you grant employee-owned devices access to corporate resources. If you’re considering adopting BYOD, you must create a BYOD security policy to ensure that your company’s assets are well protected. This policy should outline key elements such as:

  • The applications and data that employees can access from their personal devices
  • The minimum security control requirements for employee-owned devices
  • The implementation of a mobile device management solution that will allow your IT staff to remotely wipe lost or stolen devices of company data

What is CYOD?

CYOD allows users to choose from a list of devices approved by the company. In this regard, CYOD is similar to BYOD — it gives employees freedom of choice. While not everyone may like the selection of available devices, they may appreciate having a say regarding what computer or mobile device they’ll be using for work. You can also offer employees the option to purchase the device from the company, paying in installments or upfront.

For businesses, the biggest advantage of CYOD is security. You can equip devices with security features to ensure that sensitive data is properly protected. However, since you own the devices, the responsibility of spending on security and optimization will fall on you. This may not be ideal for small businesses or those with a limited budget.

Which policy should your company adopt?

Ultimately, the choice between BYOD and CYOD boils down to what your business needs. If you’re operating on a tight budget, a BYOD policy is the right option for you. On the other hand, CYOD is perfect if you want to ensure the security of your data and other company assets.

If you still need more information to help you make a decision or you just need guidance on all things related to business IT, give Net Activity’s experts a call today.

Microsoft Teams Fend Off Phishing Attacks With Link Protection

Microsoft Defender has long included “Safe Links” protection as part of its overall function. The company recently announced that it would be extending Safe Link functionality to protect from inside Microsoft Teams.

Safe Links is a powerful safety feature that scans a web link in real-time as a user clicks on it. Many users share useful links inside Teams. Most of the shared links are fine but some point back to poisoned websites that contain malicious code. That could potentially infect a user’s computer or other devices. Microsoft aims to limit this risk by extending the protection that Safe Links provides to include Teams.

The company had this to say about the change in a recent blog post:

“With today’s announcement, organizations with Microsoft Defender for Office 365 can further protect Microsoft Teams users from malicious phishing attacks that are often orchestrated using weaponized URLs.

Safe Links in Defender for Office 365 scans URLs at the time of click to ensure that users are protected with the latest intelligence from Microsoft Defender.”

It’s a very good and very timely change. Teams has seen explosive growth over the last year and a half. Some of that growth would have occurred even without the pandemic but Covid-19 is undoubtedly the reason for most of the surge.

Because so many more people are using teams, the decision to extend Safe Links protection to the platform was easy.

Kudos to Microsoft for taking an active stance here and providing even better and more robust protections to one of the company’s most popular products. This will by no means completely prevent poisoned links from being shared because no system is perfect. It will dramatically reduce the number though and that’s a very good thing.

Sharing Calendars With Microsoft 365 Is Easy

If you want to keep everyone updated on each other’s assignments or improve your team’s productivity, sharing your calendar on Microsoft 365 is a must. In this article, we’ll take a look at how you can sync your schedules on different versions of Outlook.

Outlook on the web

If you have Microsoft 365 or another email service based on Microsoft Exchange Online, follow these steps to share your calendar:

  1. Open the Calendar by clicking on the calendar icon at the bottom of the page.
  2. Once you’re in Calendar, go to the toolbar at the top of the page. Click on Share and choose which calendar you want to share. Keep in mind that you can only share calendars you own and not other people’s.
  3. Indicate whom you want to share your calendar with by entering their email address or name.
  4. Select which activities recipients are permitted to perform on your calendar. You can choose from the following:
    • Can view when I’m busy ⁠– if you want the calendar to show when you’re busy but hide certain details
    • Can view titles and locations ⁠– if you want the calendar to indicate when you’re busy, as well as key details like an event’s title or location
    • Can view all details ⁠– if you want the calendar to reveal all details about an event
    • Can edit ⁠– if you want recipients to be able to modify your calendar
    • Delegate ⁠– if you want recipients to be able to alter your calendar and share it with other users
  5. To proceed, click on Share. If you change your mind, click on the Trash icon to cancel sharing your calendar.

Alternatively, you can publish your calendar and share it with others using a URL. Here’s how you do it:

  1. In Calendar, go to Settings and click View all Outlook settings.
  2. Select Shared calendars.
  3. Go to Publish a calendar and choose which calendar you want to publish and how much information is revealed to recipients.
  4. Click Publish.
  5. You will be given the choice between using an HTML or an ICS link. The HTML link can be used to view your calendar using a browser like Firefox or Google Chrome. An ICS link allows recipients to import your calendar and view it on their own Outlook calendar.

Outlook.com

Like Outlook on the web, Outlook.com allows you to share your calendar directly or publish it. The steps for sharing are exactly like those used in Outlook on the web, too, except you only have two options for how recipients can use your calendar. These are “Can view all details” and “Can edit.

Publishing your calendar on Outlook.com requires you to::

  1. Click on the calendar icon to open the Calendar view.
  2. In Calendar, go to Settings and click View all Outlook settings.
  3. Go to Calendar and select Shared calendars.
  4. In “Publish a calendar,” select which calendar you’re publishing and how much information it contains.
  5. Click Publish and choose to use either an HTML or ICS link.

Outlook on iOS and Android

If you’re using a mobile version of Outlook, these are the steps for sharing your calendar:

  1. On your Outlook app, click the hamburger button at the top-left corner and select Calendar.
  2. Go to Share and tap on Add People to indicate your calendar’s recipients.
  3. Input each recipient’s name or email address. Once you’re done, tap on the Check button at the top-right corner of the page.
  4. You will see a list of recipients. Tap on a name to edit their permissions and how much information they’re allowed to see. As with Outlook on the web, available options are “Can View,” “Can Edit,” “Delegate,” “Only When I’m Busy,” “Only Titles and Locations,” and “All Details.”
  5. To remove a user from your recipients, tap on Remove at the bottom of the page.
  6. After you’ve set permissions, tap on the Check button at the top-right corner of the page.

 

The Outlook calendar is an excellent feature for managing your team’s events and workflows and can help boost your efficiency and productivity. If you have other questions and concerns about Microsoft 365, get in touch with Net Activity today.

Lost Employee Smartphone? 7 Steps You Need to Take Now

“Hey boss, I lost my smartphone.”

How well have you prepared for this moment? It will happen sooner or later. If your company has a plan in place, no big deal. If not, you may suddenly get that sinking feeling in your gut…And well you might. You now have three big worries:

Compliance Issues –If your employee had access to information covered by any number of regulations, your company could be subject to stiff penalties. One employer we know of wound up with a $900,000 fine.

Data Security –Sensitive company data in the wrong hands could spell disaster. Access to your network, secure sites, proprietary files, work-related e-mails and corporate secrets may now be out of your control. You must move quickly to prevent serious financial harm.

Employee Privacy and Property Concerns –If a valued employee had family photos and movies on the device, and you remotely delete all data on the phone, you may now have a disgruntled, or even uncooperative, employee. Especially if company policy regarding BYOD (bring your own device) and data loss were not clearly stated and agreed to up-front.

So how do you prevent a relatively minor incident from blowing up into a big problem? Here are seven smart measures you can take right now to prepare for the day an employee smartphone is lost or stolen:

  1. Install a mobile device management (MDM) system on any employee device to be used at work. This software can create a virtual wall separating work data from personal. It facilitates any security measures you wish to impose. And to protect employee privacy, it can limit company access to work data only.
  • Determine which devices will be allowed and which types of company data people may access from them.
  • Require that employees agree with an Acceptable Use Policy before they connect to your network. Make sure these include notice as to conditions in which company data may be “wiped” –i.e., destroyed. Also include specific policies regarding device inspection and removal of company records.
  • Put strong data protection practices in place. Require use of hard-to-crack passwords and auto-locking after periods of inactivity. Establish protocols for reporting lost or stolen devices. Mandate antivirus and other protective software as well as regular backups.
  • Designate someone at your company to authorize access to software and critical data. This person can also be your main point of contact for questions about BYOD policy and practices. It might also work well to distribute a resource page or FAQ document to your employees.
  • Establish a standard protocol for what to do when a device is lost or stolen. Both Android and iOS phones have features that allow device owners to locate, lock and/or “wipe” all data on their phones. Make sure your policy requires that these features are set up in advance. Then, when a device is lost or stolen, your employee can be instructed to take appropriate action according to your protocol in order to protect company data.
  • And finally, your best protection is to implement a well-crafted Acceptable Use/BYOD policy in advance. Develop it in partnership with risk management and operations personnel, as well as legal counsel and IT professionals, to come up with an effective and comprehensive plan.

Download a Mobile Device/Acceptable Use Policy Template here to get started.

Don’t risk waiting until an incident occurs! Begin the process with our template, and contact us anytime for help clarifying and developing a “bulletproof” policy to keep your data safe. Contact us today 216-503-5150.

4 Ways Microsoft Bookings Saves You Time

We all undeniably have hectic schedules, and they’re made even worse with unorganized meetings, impromptu lunch dates, and unscheduled yoga classes. To move or cancel appointments, your clients would generally have to pick up the phone and call someone, which can be a drag. But with Microsoft Bookings, clients can schedule and effortlessly manage appointments. In case one isn’t enough, here are four more reasons to give it a go:

Visibility

Bid adieu to the days of scribbling on post-its and frantically going through your schedule to find out where you’re heading for lunch. Microsoft Bookings provides you with a unique webpage that is compatible on both desktops and mobile devices. Here, customers can select times and dates based on current availability — simply enter the contact information and then book it! The system fully automates the process of managing your appointments.

No more rain checks

Cancellations and missed appointments mean wasted time slots unless you’re able to fill them up with new bookings. Avoid lost income by controlling how much advance notice is required to make a cancellation. With Bookings, appointments appear immediately in staff calendars and can be added or revised by customers in their own personal calendars. Additionally, a confirmation email is automatically sent to the customer, which is then followed by another automatic email reminder before the appointment time. The web page also offers a rescheduling service: customers can simply click on the link on the confirmation email and pick a time that they’re more comfortable with.

Synchronization

Once completed, the booking is then synced to a centralized calendar where businesses are given the option to reschedule, cancel, or reassign the appointment to other staff members as they see fit.

If you do decide to reassign it to staff members, Bookings offers a nifty feature known as “split view.” This shows which staff members are booked at which times, and you can compare everyone’s schedules side-by-side. The appointments are synced not only to your calendar but to the staff members’ calendars as well. Moreover, this versatile system accommodates Office 365, Outlook, and even Google Calendar, so clients and staff can keep whatever calendaring service they prefer.

Double duty

Appointment setting might be the primary goal of Bookings, but the system can also be utilized to build your company’s customer list. Once customers input their information into the system, it automatically creates contact entries for those customers. The contact card contains personal information such as your customer’s name, address, phone number, and email address.

And, as your company grows, you can add more staff members as well as create additional booking pages for free. Furthermore, staff members aren’t required to have Office 365 subscriptions to be a part of the service.

Efficient tech resources aren’t enough to maintain a successful business anymore. To really stand out from competitors, you need comprehensive appointment management. Give us a call if you need any questions answered or issues addressed. We’re more than happy to help.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room