Forbes: Does Your MSP Have Your Back?

forbes does your msp have your back

While small businesses, like their larger counterparts, need end-to-end services to keep them running smoothly—file sharing, software, and security as a service to cloud backups—a less-experienced MSP may simply be riding the cloud surge to keep their doors open.

As the Forbes Technology Council notes:

“…so many MSPs are newbies and/or are opportunistically hanging out where the action appears to be. It appears that the accent today is more on “provider” and less on “service.” A fair number of MSPs have taken to selling the cloud — a “best of times” development at first blush.” 

Sizing up your MSP…

Aside from basic services, does your MSP stand ready to do the real heavy lifting in times of Disaster Recovery, or handle hybrid installs with your latest SaaS applications?

SMB owners often place their networks ‘at risk’ on many fronts when timely security updates are shuffled to the bottom of their to-do lists. What’s more, just attempting to keep ahead of the latest IT developments can translate quickly to poor productivity in light of ever-changing market conditions.

Vetting your MSP…

Make sure you’ve made a list of questions to ask your potential candidate. including:

  • Do they offer more than off-the-shelf, basic services—can they tailor services to your specific needs?
  • How many years in the business?
  • Staffing: Level of engineering experience?
  • Is the service level agreement fit your needs? Penalties for not meeting requirements

Ask the tough questions….

A ‘biggie’ is making sure the MSP is SSAE (Standards for Attestation Engagements) compliant, offering 14-day retention, for example, with its managed backups, as well as “application-level protection, advanced monitoring, and multilevel intrusion prevention, SSL capability, hardware firewall, and IP-restricted FTP.”

BluWater Technology can offer your company levels of expertise tailored to your growing needs. Contact us to learn how our services can help your business run more efficiently: we improve bottom lines by bringing ‘fixed costs’ to your operation’s IT expenditures.

Mobile Security Threatens Company Data

mobile security threatens company data

According to CIO magazine, a Gartner analyst two years ago pointed to the “growing shortage of cybersecurity resources” and how those impending threats to company data continue to grow:

“Companies are worse off by 100% (with cybersecurity) compared to 10 years ago because the world is more complicated now…Companies have definitely raised the cybersecurity bar, but criminals can keep going higher than the bar.”

BYOD brings security risks to company data

Unfortunately, employees unwittingly connect to Wi-Fi hotspots that are traditionally not safe, from coffee shops and restaurants to airports and hotels. Instead, device users should connect through a virtual private network (VPN), one of the many services an experienced MSP can offer. 

Gartner’s prediction provides that clarion calls for businesses with remote, cloud operations to address these ‘new’ security risks, particularly with the incorporation of mobile devices (BYOD) in the workplace.

“When employees connect to public WiFi without using a VPN app, they put their company’s data at risk,” notes the head of Avast Software’s mobile division.

Global survey: More than half of SMBs use in-office/remote employees

 A global survey of IT pros found that “fifty-eight percent of SMBs now have a mix of in-office and remote employees.” What’s more, those employees are working 2 to 3 days a week from home.

Even more reason for SMBs to consider using a managed service provider ( MSP) for mobile-device management. MSPs utilize a set of protocols and platforms to mitigate risks associated with the proliferation of BYODs.

In addition, a seasoned pro, like BluWater, can manage a company’s firewall, antivirus, and application upgrades/updates—and even conduct a vulnerability assessment of a company’s, on-premise networks.  

Contact us today. We can help you implement a  BYOD strategy that fits your needs. Companies rely on us to provide them with the security and scalability to make them successful now and in the future. 

Cisco: IT Decision Makers Challenged with Mobile Security and Compliance

IT Decision Makers Are Challenged with Mobile Security and Compliance Cisco

The digital landscape is alive with change, particularly when it comes to the proliferation of mobile devices (BYOD) in the workplace. The dawning of this phenomenon began as far back as 2009, when the phrase first took hold, becoming, as CIO notes, the ‘New Normal’ in 2013:

“CIOs can thank mobile device management vendors for pushing their messages of compliance to business users and, as a result, helping bring IT into the discussion as a BYOD enabler.”

Cisco: More control of the cloud network is needed

In fact, a Cisco survey of 4,000 IT decision-makers worldwide noted the need for more control of the cloud network. Especially with the ever-increasing array of mobile devices, smartphones, and tablets in the workplace. 

However, along with this general acceptance of BYOD in the workplace, 82 percent of those surveyed were concerned about compliance and security requirements.

Follow the ‘moving’ mobile device!

For example, aligning departmental needs with a company’s BYOD policies creates new challenges. If an employee who uses his/her own mobile device switches to a new device, how is sensitive info to be tracked and stored? Worse, what happens to that data if the person leaves the company?

Cisco notes savings with BYOD in the workplace

Are these concerns lessened when the economic metric is added in? According to a recent Forbes overview on BYOD devices, Cisco notes a typical savings of $350 annually…per employee.

Still, concerns persist about ‘security’ when it comes to mobile strategies. As Forbes notes:

“Security is one concern for there are undeniable risks in permitting employees’ access to corporate resources from personal devices. The dangers posed by malicious applications and viruses will discourage many organizations from implementing BYOD.”

Contact us to learn how our managed services can help protect your cloud network. We really focus on your business needs before recommending our managed service options—clients love our proactive approach.

A ‘Disaster Recovery’ Plan Begins with a ‘Risk Assessment’.

a disaster recovery plan begins with a risk assessment

Forbes, in a recent overview of business emergency/contingency plans, challenged stakeholders with the question “Is your business prepared for the worst?”

Prepare for ‘Disaster Recovery’

For companies operating without a written Disaster Recovery or Business Continuity Plan (BCP), a disruption caused by hardware failures, building fires, or flooding can greatly impact efforts to promptly resume ‘business as usual.

While such strategies may be more commonplace in big business, DR plans are often overlooked by smaller companies. Unfortunately, without a written plan in place a small—or even temporary—disruption can delay recovery.

Getting operational quickly and efficiently requires the strategic planning and foresight of a BCP (Disaster Recovery Plan). This will improve responsiveness by the organization, minimize confusion, and ensure clear decisions are made during a time of crisis.

Get the C-Level Suite Onboard!

Today, more companies are creating DR plans to make sure their operations return to full operational mode quickly. Notably, and in what could be a clarion call to begin the process, IT folks are turning more and more to their ‘C-level’ stakeholders for the ultimate buy-in. As Information Age noted: 

It is therefore vital that IT leaders effectively communicate the latent threats to the ‘C-Suite’ – the top executives at that organization – to successfully address the weaknesses that may exist. Then, be fully prepared to respond when they happen.

‘Business Impact Analysis’ (Risk Assessment)

The first step toward establishing a DR plan is to audit the company’s vulnerable assets. This ‘Risk Assessment’ ( ‘Business Impact Analysis‘) will generally include the network’s hardware, all programs, and applications critical to maintaining the business.

Most importantly, the plan should assign specific roles for team members. Also, who would have the go-ahead to spend if the equipment needs replacement? Moreover, everyone should be on board with the assigned authority throughout the recovery process.

Contact us to learn how our proactive, Backup & Recovery services can bring the continuity you need. We will keep your organization up and running during small or large emergencies.

Auto Complete Passwords: Safe or Dangerous?

auto complete passwords safe or dangerous

Auto-complete for passwords is a feature commonly used in browsers today. It is a mechanism that allows usernames and passwords to be automatically entered into a web form. Only around 20% of US internet users have unique passwords for each online account. Many people have to manage dozens of different passwords and see auto-fill as a convenient feature that cuts down on time. However. others use a dedicated application to manage passwords outside of the browser. However, this is much more dangerous than many realize.

A hacker can easily trick the browser or program by placing an invisible form on a compromised web page. 

MARKETERS TRACK TOO

Surprisingly, this is not only done by hackers. Digital marketers often deploy this trick to track what websites users visit. AdThink and OnAudience are both known to do this. Their goal is gathering data for marketing purposes, but IT professionals warn it would not be hard for them to steal passwords as well. 

ONE EASY AND EFFECTIVE WAY TO IMPROVE SECURITY

It is quite simple to disable auto-complete in a browser. Privacy settings in most browsers can be easily accessed and auto-complete disabled within a minute. Below are instructions to accomplish this. 

For Chrome users: Go to the Settings window, go to Advanced, and then disable under Manage Passwords.

For Firefox users: Go to the Options window, click the Privacy tab, then under the History heading, select “Firefox will: Use custom settings for history.” Then in the new window, disable “Remember search and form history.”

For Safari users: Open the Preferences window, select the Auto-fill tab, and turn off all features related to usernames and passwords.

 Unfortunately, this is just one way hackers can get your information. Thus, modern organizations with advanced technology require more managed measures against hackers.  

Contact us today at BluWater Tech for around the clock security assistance