-1
archive,paged,category,category-our-blogs,category-50,paged-3,category-paged-3,qode-social-login-1.1.3,qode-restaurant-1.1.1,stockholm-core-1.1,select-child-theme-ver-1.1,select-theme-ver-5.1.8,ajax_fade,page_not_loaded,wpb-js-composer js-comp-ver-6.0.5,vc_responsive
Title Image

Our Blogs

  • Sort Blog:
  • All
  • Case Studies
  • Microsoft

Look out for the Latest O365 Cyberattack

Phishing scams disguise malicious links and emails as messages from trusted sources. The most recent scam to watch out for almost perfectly imitates a trusted invitation to collaborate through Microsoft SharePoint. It’s a three-step attack that’s easy to avoid if you know how it works.

Step 1 – Invitation to collaborate email

The first thing victims receive from hackers is a message that looks identical to an email from Microsoft’s file sharing platform SharePoint. It says, “John Doe has sent you a file, to view it click the link below…”

In most cases, the sender will be an unfamiliar name. However, some hackers research your organization to make the email more convincing.

Step 2 – Fake file sharing portal

Clicking the link opens a SharePoint file that looks like another trusted invitation from a Microsoft app, usually OneDrive. This is a big red flag since there’s no reason to send an email containing a link to a page with nothing but another link.

Step 2 allows hackers to evade Outlook’s security scans, which monitor links inside emails for possible phishing scams. But Outlook’s current features cannot scan the text within a file linked in the email. Once you’ve opened the file, SharePoint has almost no way to flag suspicious links.

Step 3 – Fake Office 365 login page

The malicious link in Step 2 leads to an almost perfect replica of an Office 365 login page, managed by whoever sent the email in Step 1. If you enter your username and password on this page, all your Office 365 documents will be compromised.

Microsoft has designed hundreds of cybersecurity features to prevent phishing scams and a solution to this problem is likely on the way. Until then, you can stay safe with these simple rules:

  • Check the sender’s address every time you receive an email. You might not notice the number one in this email at first glance: johndoe@gma1l.com.
  • Confirm with the sender that the links inside the shared document are safe.
  • Open cloud files by typing in the correct address and checking your sharing notifications to avoid fake collaboration invitations.
  • Double check a site’s URL before entering your password. A zero can look very similar to the letter ‘o’ (e.g. 0ffice.com/signin).

Third-party IT solutions exist to prevent these types of scams, but setting them up and keeping them running requires a lot of time and attention. Give us a call today for information about our unlimited support plans for Microsoft products.

Using the Right Communication Tools Can Bolster Productivity

Productivity is a major consideration in any business environment – that’s largely why so many solutions designed for a business’ use focus on increasing productivity as much as possible. One method of doing so that many businesses have found effective is the adoption of Unified Communication and Collaboration solutions.

What Does UCC Do?
Once, not too long ago, a team had to assemble in order to effectively get anything done. This was not only due to the limitations of the communication devices available at the time, but also because it was the only way for everyone to contribute to the task at hand.

While this method was workable, it was prone to serious delays and numerous hangups. Schedules needed to be synchronized and arrangements made for a meeting to take place, which delayed the process. Furthermore, anyone who couldn’t attend (for whatever reason) was rendered unable to contribute, potentially sacrificing invaluable insight and reducing the manpower actively working to complete the group’s task.

While this method was tolerated for years, the development of an alternative has led to a rapid change to the new approach. This development, known as Unified Communication and Collaboration, leverages the Internet and cloud technology to allow employees to work together on the same documents and projects, providing a single communications interface and real-time updates to changes their fellow team members have made that they can access from anywhere they can establish an Internet connection.

Why This is So Important
There are a few contributing factors to why today’s businesses need to adopt a UCC strategy, especially if they want to leverage the benefits that it can bring to their productivity.

Generational Values
First, there’s the shifts taking place in the workforces that power these businesses. Rather than those members of the generation nicknamed the Baby Boomers, those referred to as Millennials are becoming the prominent group in the workplace. By 2020, it’s expected that they will make up a full 50 percent. While this may seem to be a mostly unrelated factor, one has to consider the upbringing that the Millennial generation experienced – more specifically, in terms of the technology available to them and how it has shaped their lifestyles. Millennials have been breaking away from the traditional concrete 9 to 5 schedule, instead creating a more organic balance to their work and personal lives.

As a result, the odd hours that are committed to doing work may not always line up with those of their teammates. In the past, this rendered collaboration effectively impossible, as the communication tools of the time just weren’t ready to support the needs that a true collaborative experience requires. UCC remedies that deficit by allowing for remote access to shared work.

User Satisfaction
People tend to like the devices they personally own – otherwise, they wouldn’t own them for very long. They also become accustomed to using these devices very quickly. If paired with a Bring Your Own Device policy, your employees could leverage Unified Communications and Collaboration on a device they are comfortable using, allowing them to work faster and accomplish more.

Efficiency
UCC can also generally boost the efficiency of employee communications. A study conducted in 2017 revealed that more than two-thirds of the time an employee spends working is taken up by communicating, approximately three hours each day on in-person work conversations, one and a half on email. This study also attributed inefficient communications for a full fifteen percent of lost and wasted work time – costing mid-sized businesses about $11,000 each year, per employee. UCC has been shown to reduce this time considerably.

Remote and Mobile Workers
Finally, there is also the rising popularity of remote work to take into account. Also, by 2020, the mobile workforce will make up around seventy-five percent of all those who work in the United States. With businesses undergoing such a shift, they will need the means to ensure that these employees are prepared to accomplish all they need to from home and maintain contact with their coworkers in the office as they do so. The 2017 study also indicated that the use of UCC saved mobile workers about three hours each week in sixty percent of businesses that adopted it. So, in summation, UCC allows workers to accomplish more, in less time, in conditions that they are comfortable with.

Of course, this is only the tip of the iceberg – Unified Communications and Collaboration has had many other effects on how business is conducted and managed every day.

How You Can Use UCC to Your Benefit
There are a variety of ways that UCC can be leveraged in the business environment, from file sharing to conferencing to group messaging – and considering that the UCC market is around $2 billion annually, this isn’t going to go away anytime soon.

We can help you implement it in your business. Reach out to us at 216-503-5150 for more information.

Should You Be Concerned About Cloud Security?

If you think that working with the cloud doesn’t have risks, think again. It’s inevitable that you’ll face security compliance concerns when it comes to your cloud-based data. If your organization has data stored in a cloud-based environment, you’ll want to pay particularly close attention to how compliance laws affect the way that you access and store this information. How can you make sure that your cloud-based data isn’t in violation of some cloud compliance laws?

First of all, if you work with a cloud provider, you’ll have to ask them specific questions about how compliance is handled. You should also make sure that any and all information you discuss with your cloud provider regarding compliance be put into a written agreement so that you can adequately document who is responsible for what. Here are some of the details that you will want to consider.

The Cloud Can Be Interfered With
Since data is being stored in an online environment, there will naturally be concerns regarding how it is being managed, maintained, stored, and transferred. Of course, this also means that any traffic going to and from the source of the data could be tampered with and cause problems. Data can be intercepted while it’s in transit, which is a considerable issue if you hope to remain compliant. Your goals should be to make sure that your data can’t be changed without your consent or knowledge.

If you’d like to make sure that your organization is protected in the event of a cloud compliance mishap, start by thinking about the legal issues that could surface from not knowing who is hosting the data or how it’s maintained. It’s also critical that you understand who can see this data. The differences between the private and public cloud also make this a challenging prospect, as depending on the way it’s hosted, there could be further complications associated with it. For example, if someone else is hosting your data, are they the one responsible for its security? Ultimately, it all comes down to figuring out who is responsible for what–for compliance’s sake.

What You Should Do
The best way you can improve your organization’s cloud compliance is by taking the above ideas and applying them directly to how your business approached cloud-based data hosting. First, ask yourself just how much cloud computing your organization actually uses or needs. If certain data is particularly important, perhaps it’s better to simply host it in-house rather than rely on a third party to take care of it for you. The best way to achieve compliance is a proper blending of private and public cloud hosting, so knowing which data is most sensitive or important is of the utmost importance.

Next, start thinking about who should be managing this data, as well as any agreements that you’ve made to ensure its safety. Is it an in-house department or an outsourced agency? Depending on whether it’s outsourced or not, you’ll need to make sure that you’re aware of whose responsibility it is to adhere to compliance guidelines. Furthermore, you should also plan for having data backups to protect assets in the event of the worst.

To learn more about how you can ensure cloud compliance, reach out to us at 216-503-5150.

Watch Out For Rise In Microsoft Office Attacks

Menlo Security has recently published a new report that will probably dismay you if you’re a business owner.

Microsoft Office has been named as the attack vector of choice for hackers around the world. The most common form of the attack is a malicious Word document or other office document attached to an innocent looking email.

There are, of course, plenty of other ways to take advantage of various security weaknesses in MS Office and Office 365.  These include the use of remotely hosted malicious components embedded within documents that deliver zero-day exploits when the document is opened.

The reason MS Office is such a wildly popular choice isn’t because it has an unusual number of security loopholes that can be exploited (although it’s certainly got its share).  Rather, it has everything to do with the overwhelming popularity of the office suite.  Simply put, lots of people use it on a regular basis, and that means the pool of potential victims is enormous.

As the report explains:

“There is likely to be an increase in attacks via malevolent email attachments using stealthily embedded, remotely hosted malicious components that leverage applications and operating system vulnerabilities, both old and new.

With CVE-2018-8174 and CVE-2018-5002, the attackers leveraged Word as a vector to exploit Adobe Flash Player and Internet Explorer.  By using Word as the vector, the attackers were able to exploit a browser, even if it is not the default browser, and exploit Flash, even though Flash is blocked by most enterprises…Microsoft is therefore undoubtedly going to become the platform that attackers leverage most to deliver their zero-day exploits.”

All true, and beyond troubling.  If your business uses Microsoft Office or Office 365 (and odds are excellent that it does), continued vigilance is the key.

Why (and How) SMBs Should Strategically Adopt Technology

There is no question that a small business can benefit from technology, as has been proven time and time again. However, an issue can arise if a business bites off more than it can chew, so to speak, and ultimately creates a spike in costs. A responsible business owner will resist this temptation and prioritize the solutions they need over the ones they want – building profitability and generating capital needed to make other improvements.

In this blog, we’ll examine some of the implementations that can deliver a good return on investment to a small business.

Managed IT Services
For the small or medium-sized business seeking maximum value for their dollar, managed IT is a great choice. For a predictable, scaled monthly fee, a managed service provider (also known as an MSP) will make sure that a company’s information technology solutions are functional before a problem or issue arises. What’s more, a relationship with an MSP can also provide invaluable access to specialized vendors, enabling you to leverage some of the best solutions available.

As alluded to above, one of the biggest values that an MSP provides is in the hands-on experience that its technicians have, both on-site and remotely. A company whose solutions aren’t in working order is a company that is hemorrhaging money via downtime, and so it is crucial that a company in this situation has the means to resolve and ideally avoid downtime, continuing its productivity and revenue generation.

One of the biggest benefits to investing in managed IT services is the speed at which you will see a return on that investment. Comparing the cost of an MSP’s services to the multitude of costs that these services help you avoid will help to illustrate how much an MSP can help you. How much are you spending on break/fix services, hiring and onboarding an in-house technician, updating and upgrading your hardware and software, and weathering downtime? All of these costs can be consolidated and/or eliminated with an agreement with an MSP.

Hybrid Cloud
The cloud is growing at an explosive pace, and for the business or organization with specific needs where accessibility and security are concerned, a hybrid cloud platform may be the best strategy to leverage this industry-shaking technology. Private clouds, while secure, are costly to implement and maintain. Public clouds are more affordable, but there are some major concerns among businesses at the thought of blindly entrusting crucial data to another organization. While the security of such methods is improving, there is an understandable need for control among many business owners that disqualifies the public cloud as a viable option.

The hybrid cloud is the integration of these two halves, joined together to eliminate the downsides while preserving the advantages. This also provides control over a business’ data and applications while allowing the scalability to leverage it as needed. Arguably best of all, the hybrid cloud can add the productivity that your business needs to increase revenue and profits. These reasons are large contributors to why the hybrid cloud is swiftly being considered an inevitability for all businesses by many industry experts.

Bring Your Own Device (BYOD)
Nowadays, just about every business has a wireless network. This has led, in conjunction with every employee coming to work with a smartphone in their pocket, to a need to manage the devices that connect to that network. Allowing employees to utilize their personal devices for work purposes brings great benefits but requires a solution to help eliminate the risks and threats that these devices bring in from the outside. There is also no shortage of incidents where inappropriate and shortsighted mobile behaviors on a wireless network have brought issues to a business. This is why you need to take the necessary steps to protect your network through the enforcement of BYOD policies.

A BYOD policy needs to take many things into account to be seen as having a worthwhile value to the organization, from how many devices are being brought into the company to the cost of the mobile device management software to the affect that introducing these devices into the workflow has on productivity and collaboration.

Of course, you should also keep in mind that some employees and most of the visitors you receive to the office will see no problem in using your business network to access things that aren’t conducive to your business operations, eating up resources that should be used for other things. This is why any BYOD implementation also needs to see to including access control and permissions within its mobile device management policies. This will provide you with benefits from heightened efficiency to enhanced security, leading to a potential boost in revenue generation – all the while enjoying the diminished costs that leveraging BYOD provides to your business’ budget.

It’s true that adding new technology solutions to your business can carry a hefty expense with it, but the right solutions can offset that cost with improved company operations and diminished security risks. The professionals at Net Activity, Inc. have the experience and know-how with IT solutions to ensure that the right solutions are the ones that go into your business, in the right way.

For more information about some of the things we can help you to improve in your organization’s IT, give us a call at 216-503-5150.

Updates and Patches are Critical to Your Infrastructure’s Security

When you get a new device, you’re getting more than just the physical device and whatever software is currently installed on it. You’re also getting any updates and patches that the manufacturer and software developers release. However, many users neglect to incorporate these key improvements. Today, we’ll go over why updates and patches are so crucial.

Why They Matter
When you first come into possession of a new device, whether its a PC workstation, laptop, tablet, or other mobile device, it comes with certain protections against threats and malware. However, these threats are constantly improving in order to overcome these protections, and furthermore, these protections aren’t always perfect.

As a result, if nothing is done, your device will swiftly become vulnerable to threats, and you will experience the ill effects that this malware causes.

This is precisely why manufacturers and software developers work to improve their creations, releasing their improvements in the form of security updates and software patches. These updates and patches are their retaliation against the malware developers and distributors who actively work to overcome the security that the devices you use have in place.

The Difference between Updates and Patches
While they serve largely the same purpose, there are a few key differences between patches and software updates. While both ultimately are intended to resolve security issues, the scope of these processes are different.

Patches are more or less what they sound like: a quick fix that covers a hole in your business’ security until a more permanent solution can be implemented. The software update is the relatively more robust solution, taking the patch and incorporating what it fixes into the new version of the software.

It isn’t uncommon for you to be prompted to install these enhancements as they are released. This only makes sense, as the developers of patches and updates don’t want to be held responsible for a user falling victim to whatever the patch or update was supposed to fix simply because the user wasn’t notified that a fix was available.

We’re Here to Help
Admittedly, when faced with the choice to install an update or patch and wait for the process to complete, or take that time and make progress on some of your work tasks, it can be very tempting to let the patch or update wait for a more opportune time.

At Net Activity Inc., we’re available to install these crucial updates and patches when your workforce isn’t active at their workstations. For more information on how we can assist you in your patching and updating, reach out to us at 216-503-5150.

All Work and No Play Makes Fewer Opportunities

The office is a workplace, so it most likely isn’t a place that is often associated with fun and games. However, different aspects of games have been shown to provide significant benefits when introduced into the professional environment. Today, we’ll explore some of the ways that a little frivolity may benefit your office.

How Games Can Be Used
Just as classrooms devise games to reinforce lessons, the same strategy can be used to help employees engage with and embrace a given task. Research already supports the idea that the happier the worker is, the harder they work. Why not promote that with some entertaining games? Furthermore, a workplace that welcomes some playfulness can present a few other desirable outcomes as well, including an influx of fresh talent, decreased stress levels, boosted motivation, and improved workplace relationships – or in other words, games can make people in an office more enjoyable to be around. As an added bonus, it also promotes the kind of behaviors that will benefit the workplace in its normal operations. These behaviors include the willingness to collaborate and the readiness to create something new.

Reflecting on these factors, it makes sense that many companies today find the time employees invest in playing games to be well worth it.

Understanding ‘Gamification’
This integration of games into the workplace is referred to as gamification. Chances are, you’ve experienced it yourself, or would at least recognize a few examples of it in action. For example, was part of your on-the-job training presented as a computer program, with quizzes that needed to be passed in order for you to progress? Have you ever participated in a team-building exercise that involved a group of people tossing a ball back and forth, the person who possessed the ball sharing a little about themselves?

These are just a few examples of gamification. By leveraging the innate cravings that the human psyche has, like community, self-validation and improvement, or even your employees’ FOMO (Fear Of Missing Out), this methodology can improve a team’s productivity and boost morale and satisfaction on an individual level.

Some Basic Workplace Games to Start With
If you want to try to utilize gamification tactics in your office to reap some of its benefits, you will first need to determine what it is you intend to accomplish through introducing a game element. Do you mean to boost communication among the members of your different departments? Are you trying to encourage them to work more as a team? Or is your goal to simply allow your staff to blow off some steam before it negatively affects their performance?

While this may sound like you’re putting too much thought into playtime, it is actually an important consideration. Much like the “joke” that a game like Monopoly can ruin friendships, you want to be sure that your chosen activity is conducive to accomplishing your goal, and won’t actually have the opposite effect. If you’re trying to inspire a team to work together, maybe playing a game of basketball between departments or sending each department on a scavenger hunt around the office would be a wiser, more effective strategy. Alternatively, if you are looking to inspire some interpersonal competition, maybe a more competitive activity would be a better option.

Games That Help Company Culture
Here are a few basic games meant to boost spirits and coworker understanding in the office to get you started:

  • Two Truths and a Lie – This simple game is summed up in the title. Each participant writes three facts about themselves on a slip of paper, two of which are true and one being false. The rest of the group guesses who wrote these facts, and which of them is the lie.
  • Secret Mission of the Day – In Secret Mission of the Day, each employee receives a message detailing their task for that day first thing in the morning. These tasks may be to slip a particular word into conversation or some other benign prank, while others may receive a warning and be told to identify the person carrying out a particular task. For instance, a group of employees may each be given an uncommon word (like woebegone or logomachy) and be told to use it in a meeting five times, the winner being the one who isn’t called out on their use of the word.
  • Treasure Hunt – While this will take a considerably larger amount of forethought and planning, this activity can be a great way to get your employees thinking, working together, and sharing a positive experience. You can even reap some bonus team building benefits by gathering some of the creative types in your office to create the clues that their coworkers will need to follow. Hiding objects, devising riddles, and other challenges will make the treasure hunt ultimately more challenging, and ideally, more fun.

Gamification Can Help Sales
Utilizing games can help keep salespeople competitive. By setting quotas and a point system, you can have your sales team work towards earning rewards. You can establish an expectation of a certain quantity in sales each week or month, and then have a few rewards (gift cards, bonuses, or free lunches, for example) for the highest performers.

Tracking sales on a whiteboard or better yet, a flat-screen on the wall can help keep everyone’s eye on the prize. Longer term or more aggressively set goals could even lead to comparatively larger prizes; if a salesperson doubles their quota one month, they could be rewarded a cruise. You win, because they out performed and made the company more revenue, and they win, because they get to celebrate it a few miles offshore on the company’s dime.

Gamification Can Help Support or Customer Service
Similarly, a little friendly competition can help improve customer support. This can be a little more complicated, as you’ll need to come up with the KPI (Key Performance Indicators) of your staff to determine exactly what goals you are setting for the game, but it’s a great way to get everyone working towards the same goal. For example, if your goal is to get a customer answered and off the phone within three minutes, you could reward a point for each case where that happens. Then determine an average number of points a single employee should earn, and offer prizes and kudos when that is exceeded. Other examples might be having projects come in under budget, collecting shining reviews from customers, or exceeding other expectations. When you introduce fair and friendly competition in certain situations, it can lead to more getting done the way you’ve always intended it to.

What other team building activities and games can you think of to help bring an office together?

Google Cracking Down On 3rd Party Browser Extension Installs

Malicious code can wind up on your PC or phone by any number of roads.  Companies do their best to guard the digital passes, but invariably, things get missed and the hackers find a way in.  It’s a constant battle, and sadly, one that the good guys are losing.

Recently Google has stepped up its efforts, this time by focusing on Chrome browser extensions installed by third parties.  By the end of the year, no extensions will be allowed on Chrome except for those acquired via the Web Store.

James Wagner, Google’s Product Manager for the Extensions Platform, had this to say on the topic:

“We continue to receive large volumes of complaints from users about unwanted extensions causing their Chrome experience to change unexpectedly – and the majority of these complaints are attributed to confusing or deceptive uses of inline installation on websites.”

It’s a thorny problem, but industry experts broadly agree that Google is taking the right approach here.  Beginning in September, Google plans to disable the “inline installation” feature for all existing extensions.  The user will instead be redirected to the Chrome Web Store where they’ll have the option to install the extension straight from the source.

Then, in December 2018, the company will remove the inline install API from Chrome 71, which should solve the problem decisively.

Of course, hackers being hackers will no doubt find a way around that, but kudos to Google for taking decisive action here.  While browser extensions aren’t a major attack vector, it’s troublesome enough that Google’s attention is most welcome.

It should be noted that one of the indirect benefits of Google’s plan is that it further bolsters the importance of user ratings of extensions.  They’re highly visible on the Web Store, so anyone who’s considering installing something has a good, “at-a-glance” way of telling whether the extension is good or a scam. That’s information they wouldn’t get had the extension been installed inline.

Again, kudos to Google!

IT Budget Planning for Your Small Business

Over time, as technology has become a greater part of business operations, IT budgets have continued to grow, with small to mid-size companies generally outspending larger organizations when allocating dollars for technology investment. According to the State of the CIO report, the average small business (less than $50 million in yearly revenue) is investing 6.9% of their total annual budget on technology. Regardless of the actual dollars spent, the goal of any organization is to make wise and judicious decisions when planning IT expenditures. Like a project plan or IT roadmap, your IT budget provides direction and a holistic view of your department and its funding requirements. It lets you quickly determine whether resources are over committed in one area or another, and in the case of department-level IT budgets, lets you compare what you’re spending versus similar departments.

In order to produce a reliable IT budget, it’s critical that your organization lay out an IT investment strategy that aligns with the specific short and long-term goals of your organization.  Aligning these goals with the basic budgeting priorities that lay in front of you can be a challenge; here are suggested steps to keep in mind throughout the process. These steps will help you determine the best technology investments for the near-term, (we have a few suggestions), as well as keep your long-term investment strategy front and center.

First, make sure you have a clear picture of where you want to take your business, and what steps you need to take to get there. Start by looking at your business strategy over the next two to three years and determine which areas you plan to grow, change, or improve; this will help simplify the IT budget decision-making process, and make it easier to identify what new technologies and upgrades are the best fit for your organization.

Once you have your strategy in place, designate a member of your team to track IT trends and opportunities that might be available to your company.  Meet with this person regularly to discuss the key areas where your organization may need technological upgrades or changes.  Sit down regularly with this team member and list the key technology areas they should be monitoring based on your business needs. Are there new applications available that might enhance your business, or new web or wireless services to consider? What about your data warehousing?  Building this list allows you to assess what technologies are likely to impact your business and what growth opportunities they might provide. This list of technologies and opportunities is a way for you to narrow down your technology requirements and come up with a well-thought-out investment plan.

Once you have decided on a new IT spending plan, make sure to speak with a trusted IT consultant and run a cost/benefit analysis.  An expert can help you determine if your technology budget plan is realistic and whether or not there might be more appropriate solutions available to you. The 6-7% average budget mentioned above is a basic guideline, but the final number will depend on your company’s individual needs and goals.  Keep revisiting your IT budget every year, taking into account the cost of maintaining and supporting the technology you already have in place. It would be a huge mistake to use the same budgeting model year after year, without considering new technologies or current changes in the IT landscape (advancements in in computers, phones, tablets, POS systems, cloud storage, data backup, software etc.).  It’s critically important to monitor the newest in tech advancements to ensure that your company is making the best technology investments to promote profitability and productivity.

Next, create a list of those IT investments that you can not only afford, but will also help you achieve your stated business goals. Every business is different, and the technology that your organization decides to use should fully meet the needs of individual departments while still being flexible enough to integrate new technologies as needed, without compromising daily business operations. This is where your assessment and planning can really pay off, helping you determine where to best spend your technology dollars. Key areas you might consider for further IT budget and investment are cloud and mobile computing, Internet of Things (IoT) and advanced cybersecurity protection.

  • Cloud Computing. These days, most businesses rely on cloud applications for streamlined operations. Cloud computing allows you to set up what is essentially a virtual office to give you the flexibility of connecting to your company anywhere, any time. Cloud technology is still relatively new and comes with its own set of risks – security, compliance, privacy. But the advantages are paying off as organizations from all different industries migrate away from the traditional IT model. With the growing number of web-enabled devices used in today’s business environments, access to your data is easier than ever. Cloud computing offers potential reduced overall IT costs, scalability, business continuity, collaboration efficiency, flexibility of work practices, access to automatic updates, and much more.
  • Internet of Things. Despite being in its early stage, the Internet of Things (IoT) is already demonstrating a significant impact on the budget and technology planning decisions in all business sectors, and more than half of all businesses have made some investment in IoT devices. According to Gartner, Inc. more than 20.4 billion connected devices will be in use worldwide by 2020.  This explosive growth in IoT devices offers your business new opportunities to track and measure how your customers are consuming products and services, as well as track inventories, minimize system downtimes, and monitor facility and maintenance performance. By adopting IoT technology as early as possible, you’ll be giving your organization the ability to mine useful data from systems and devices that will become critical to future growth. For smaller businesses, starting small is a good first step.
  • Mobile Computing & Devices. Many organizations and their employees are spending IT dollars on premium smartphone and tablet devices, as PC replacement rates continue to fall. During 2018, well over 200 million Americans will use a smartphone. And that number is projected to grow to over 80% in three years (Statista). Most cell phones and tablets have the capability of performing many tasks that a computer can. This allows for flexibility and availability, keeping employees and managers from being glued to a computer desk to perform their work. Another investment to consider in mobile computing technology is responsive optimization of your website(s). Without mobile optimization, most websites look and act unwieldy and make it a hassle for potential customers to use, potentially even driving them away from using your services altogether. Your website is the first impression of your business and its optimization is an invaluable and necessary investment.
  • Advanced Cybersecurity Protection. As reliance on IoT and cloud technologies increases, so will cybersecurity budgets.  Within IT departments, a premium is being placed on security spending. Fifty-three percent of respondents said security will be a top priority in the 2018 budget.  This isn’t terribly surprising after high-profile 2017 breaches like the WannaCry, or WannaCrypt, attacks and the Equifax consumer data breach.  A Gartner study predicts that global expenditure on information security will grow to $96 billion in 2018, up from $86 billion last year. So, what should all this money be spent on?   As a small business or organization, you don’t want to lose customer data or let malicious groups take over your systems. Cover all the basics, including safeguarding sensitive business data and minimizing the risk of malware attacks.

Once you’ve decided on investment in a new IT project, do a proper risk analysis. When investing in any new technology project take the time to do a complete risk analysis. The project that offers the greatest benefit may also be the one that requires the most time, money, and staff, and investing in one large project may mean you don’t have the resources to invest in others. Make sure you have identified the likely risks associated with the project, quantified the cost of these risks, prepared an appropriate response, as well as documented the analysis and plan. By performing this analysis and planning for possible overruns, you’ll have a more realistic idea of the costs and delays you could be facing. If the project comes in on time and on budget, it will be a pleasant surprise!

Finally, continue to update your IT budget and investment plan and monitor new technology developments. The last thing you want is an aged IT strategy that misses out on the current opportunities in the marketplace. Keep in constant communication with your trusted IT advisor, and once you embark on a project, update your investment plan with new deadlines or cost estimates.

As a small business owner or manager, its critical to remember that your IT expenditures are an investment into the operations and flow of your organization, rather than a cost of doing business. Instead of looking at the budget solely as an administrative process, regard it as a validation and support tool for your IT strategy. If you don’t have a formal or informal IT strategy in place, the budgeting process is as good a place as any to start investigating areas for improvement that will be cornerstones of your first attempts at more strategic IT management.

At Net Activity Inc., we are here to assist you in making the most of your IT assets and investment planning; let’s build your new IT strategy together. Contact us today to get started.

 

 

New InvisiMole Malware Turns Your System Into A Video Camera

Another week, another new threat.  This time, in the form of a new strain of malware that researchers are calling InvisiMole.  The new threat was discovered by researchers at ESET, who found it on a number of hacked computers in Russia and the Ukraine.

While the researchers have yet to trace the software back to the group that developed it, based on the available evidence, the campaign appears to be tightly targeted and highly selective.  Only a few dozen computers have been found to be infected, although all impacted systems are both high-profile and high-value.

As for the software itself, it’s a nasty piece of business capable of quietly taking control over an infected system’s video camera and capture audio. This allows them to both see and hear anything going on in the vicinity of the system.  Essentially then, InvisiMole turns your computer into a compromised Amazon Echo.

Based on the sophisticated design of the software and the fact that the researchers have yet to be able to trace it back to the source, it’s believed that it has been developed by (or at least in partnership with) an unknown state actor.  Although the current campaign is small and highly targeted, given its capabilities, InvisiMole could easily become a much more serious threat.

Even worse, it’s entirely possible that the original developers could lose control of the code, or that some other hacker group could reverse engineer it, causing it to spread far and wide.

Research into the software is still ongoing, and at this point ESET can’t say with certainty how the malicious payload is being delivered to target machines. Of course, at present, there is no antivirus software defense against it.  Stay on your guard.  You never know who might be watching.

Special Year End Pricing !!

Microsoft Teams Rooms Systems For Small/Medium Meeting Room