Author: seth

  • Don’t sign up with that MSP just yet!

    Don’t sign up with that MSP just yet!

    The decision to sign up with a MSP is a big one–you are essentially trusting someone with the backbone of your business–your technology infrastructure, so you need to make sure you pick someone with whom you can have a mutually beneficial, long-term relationship. This blog discusses what you need to know before you sign up with a MSP.

    Values: Your MSP is your technology partner and for your partnership to be smooth, make sure you pick a MSP whose core value system matches yours as a business.

    Knowledge, skill set and experience: Does your MSP have the skillset and the resources to cover all your IT needs? Are they experienced in working with SMBs? How long have they been in the business? Make sure you have satisfactory answers to these questions before you bring your MSP on board.

    Flexibility: Does your MSP let you pick and choose whatever services you want, or do they sell it as a fixed package? Having the option to choose what you want lets you invest your money where you really need to.

    Service and support: You are opting for a MSP so you can get solid IT support–the kind you can’t get with an in-house IT team owing to resource constraints. So, make sure your MSP will actually provide you that. Talking to their existing clients can help you figure out how good they are in terms of service and support.

    To have a MSP manage your IT needs successfully, you need to create a strong partnership with them, where they help you grow and are agile enough to scale up or down to suit your business demands. There are plenty of MSPs in the market, but not everyone will fit well with your needs.

    Our recent whitepaper explores this in detail as it discusses the 8 things you need to know before you partner with a MSP for your IT services. Please click here to download the whitepaper.
  • WHAT IS THE CLOUD? WHERE DID IT COME FROM?


    If you’re new to the concept of cloud computing, you’ve probably asked yourself what is the cloud? Many companies want to understand exactly what the cloud is, how it works, and where it came from before they sign up for cloud based services. The good news is, you aren’t alone. Many people are searching for answers, and the cloud computing community has answered with a few simple explanations.

    What is the Cloud?

    Simply put, the term “cloud” is just an analogy. In literal terms, what we now know as the cloud is an off-site hub that contains massive computing resources shared between many different organizations. Essentially, the cloud is made up of banks and banks of computer servers which act as portals for sharing and storing information. What makes the cloud unique from your in-house servers is that they are connected in such a way that customers pay for access to a portion of the available space, and that space can be located on any server in the hub at any time. Rather than dedicated space for each customer, which would limit your ability to scale up or down, data is free to flow in the most efficient way among the group of servers. In addition, servers are able to host data from multiple customers with the help of high-end security protocols that protect each individual company from unwanted access to their data.

    Where did the Cloud Come From?

    The earliest references to the cloud are widely debated in the IT community, although many people credit a 2006 conference and Google with making the term popular. The idea is that all of the services and infrastructure that we depend on should live not on our personal devices, but rather outside of them in a “cloud”. As a result, the cloud cannot be seen or felt, but we know it is out there, holding all of our data. In addition, the cloud can be accessed by any device with reliable Internet access, thereby reducing compatibility issues between major technology manufacturers, such as Apple and Microsoft. The metaphor of a cloud works effectively for this type of data storage because we can easily imagine a place somewhere “out there” where all of the data is highly concentrated while we take advantage of the silver linings. In fact, if you were to drive to the hub where your data is stored, you still wouldn’t find “the cloud” so much as a bunch of mysterious black boxes.

    For those who ask “what is the cloud?” the best explanation is that it is an off-site collection of processors that manage data on our behalf. It’s an unknowable data center that concentrates computing power and makes more resources available to everyone. The concept itself may have had its roots in the late 1990s, but today it has become a full-fledged industry unto itself.


  • Slappey Communications acquires RevTel and Presidium Networks:


    Slappey Communications acquires RevTel and Presidium Networks:

    Slappey Communications is pleased to announce the acquisition of two successful telecommunication companies, Presidium Networks in Lakeland Florida, and VOLstate/RevTel in Dayton Tennessee. Acquiring these two companies allows Slappey to expand further than just local businesses, but to the entire Southeast.

    Slappey was founded in 1983 by Bill Slappey and is now run by his son Will Slappey and Slappey continues to grow as the leading provider of technology and telecommunications to businesses. The acquisition of these two companies happened within the last six months, and Slappey’s vision to be the best hosted PBX and Managed IT has been enhanced.

     “We are very excited for the future of RevTel. Our customers will be well served by the combined company as Slappey brings added resources and personnel, which will help us continue to serve our growing customer base. Slappey adds approximately 50 new employees to augment RevTel’s local staff.   Like RevTel, Slappey has many years of experience serving the technology and telecommunications needs of small businesses,” said David Snyder, CEO of RevTel.

    Slappey has the personnel and financial resources to move RevTel and Presidium to the next level. From this acquisition, Slappey will offer these two companies new services, expansion of their reach and construction of a fast-growing organization. Customers will continue to be served by their local technology company, Slappey, RevTel, or Presidium, staff whom they know and trust.  

     “We wanted to find a partner that can continue the service tradition that we have built over the last 24 years at RevTel.   Slappey has been doing similar work in Birmingham, AL since 1983, so the match is great.   The people at Slappey are super to work with and we look forward to helping grow the company.”

    RevTel has a Dayton office at 278 1 st Ave.

    Presidium has a Lakeland office at 624 Mid-Florida Dr.

  • Why you need the cloud?

    Why you need the cloud?

    When talking to our clients, we have noticed that SMBs often think the cloud is something for their bigger counterparts to explore. We hear objections like, “But, it’s too complicated.”, “The cloud sounds expensive.”, “We are a small business, we don’t think we need the cloud.”, Hold on!

    In reality, it is the SMBs that benefit the most from the cloud. Here’s how…

    The cloud grows with you

    Yes, you may be a SMB today and perhaps a few desktops and in-house hard-disks are sufficient as of now. However, as you grow, your data storage needs will increase and you will need much more than a few external hard-disks. Servers become expensive and wholly owning one is not very cost-effective.Change the dynamic:he cloud grows with you–you can scale up or down on cloud usage easily and save on costs. Plus, when using cloud storage, you are sharing your server space with others, so you essentially pay for only what you use.

    Security is not your concern

    When you store your data in-house, the headache of security, backups and updates falls on you. However, with the cloud, all of that becomes your cloud service provider’s responsibility. You focus on running your business and your cloud service provider will take care of your data’s security and accessibility. .

    Accessibility

    When you store your data on the cloud, it is accessible from anywhere using the internet. That lends a lot of flexibility to you. You or your employees don’t have to be in the in the office or have immediate access to their computers to be able to work. A quick order can be processed or an invoice can be raised even using an iPad or a smartphone!

    So, don’t you think it may be beneficial to get a little ‘cloudy’? For more, download our whitepaper- Demystifying the cloud in layman’s terms

  • Data Security: A People Problem



    Phishing Scams – A People Problem

    There are some things that only people can fix. There are many security risks to which your data is susceptible, but there is one method that remains a wonderfully effective hacking tool. That is the phishing scam. This is a legitimate looking email that asks the reader to click on a link. If clicked, the link can infect the user’s computer with malicious software that can steal passwords, logins, and other critical data. Alternatively, the email appears to be from a legitimate source, perhaps even duplicating a legitimate webpage. The distinction is that the phishing email asks the user to enter personal information, including passcodes. In either case, that is how hackers easily get into your systems.

    What’s the best defense against this one? The single biggest defense is education. Training your people to be constantly wary of all the emails they receive. One way some firms are educating their people is by sending out their own “fake” phishing scams. Employees who click on the link inside are greeted with a notice that they’ve fallen for a phishing scam and then are offered tips how not to be fooled in the future. Think of it as the hi­-tech version of Punk’d.

    You may not be ready to go that far, but it is important to provide ongoing training to all of your staff about phishing scams. Your staff are all critical factors in your data security plans.
  • Benefits of Using VoIP Technology


    Benefits of Using VoIP Technology

    More and more businesses are implementing Voice over Internet Protocol or VoIP technology because of its versatility, flexibility and cost-effectiveness. With new developments in this technology, the scope of its applications is widening. It is becoming more than just voice communications technology. That is why businesses of all sizes are migrating at an increasing rate. Here is a short list of some of the benefits.

    Versatility/Flexibility: There are many VoIP service companies that have been working feverishly to enhance the use of this technology. They are bundling up other communication applications into a single unified communication platform to increase the efficiency for businesses. This means all modes of communication such as voice, fax, video, web conferencing and emails can be utilized, using a single software application. The ability of this application to convert voice into an email or fax into an email can bring a tremendous amount of efficiency to business operations. You don’t need to sign up for a separate service for a telephone or video conference. An incoming phone call can be received on a mobile phone and regular phone simultaneously. That means there are fewer missed important phone calls, and less wasted time on ‘phone-tag.’ An employee can receive an important fax on a laptop while sitting in an Internet café or within range of a Wi-Fi hot spot, and can redirect it to an associate within minutes with a few keystrokes. The list of benefits goes on.

    Reduced cost: There are many ways VoIP can lower communications cost thus significantly enhancing the revenue. Here are some of the financial benefits of implementing VoIP.
    1. Cost per phone call: Making long distance or international phone calls using landlines or mobile phones can be very expensive. Charges incurred at per-minute rate can add up quickly. When you conduct business from multiple locations VoIP applications allow you to make calls from PC to PC that are free if they are within the same network. That could be significant to eliminate long distance charges if two locations are hundreds of miles apart. You can also pay a low monthly flat fee and make an unlimited number of calls, including international calls. This means much less usage of your mobile phone-minutes.
    2. Operational costs: You don’t need separate networks for data and voice communications. Everything can be done using the data network. Specially designed phones with VoIP technology can be managed right from your desktops. There are a few things at work here. First of all, you have the potential to be eliminating traditional “phone” lines, usually a significant monthly fixed cost, in addition to the per minute usage costs. Paying per minute remains a major issue if you do any international calling, or have offices located in other countries, where per minute rates may not have dropped like those in the US. Another operational cost that goes away are the labor costs involved in moving employees from office to office. Reconfiguring numbers and phones can still require physical changes. Even if they are only software changes, there is a cost to pay the technician who handles these reconfigurations.
    3. Infrastructure cost: With this technology your infrastructure cost is greatly reduced. For example, you have to pay more for the telephone extensions using traditional PBX and key systems. Using VoIP allows you to run those extensions right from your computers. Dual-mode phones can be used with this technology after making minor configuration changes. That allows the user to switch the use of a dual phone from cellular to a local Wi-Fi environment, reducing the need to carry a regular phone and a cell phone. That means fewer devices to manage.
    Summary: After our discussion, the significance of implementation of VoIP can’t be overstated. Every business strives for better revenue. This new technology offers many ways to cut costs and bring efficiency by unifying all modes of communication onto a single platform. Efficiency and lower costs are always synonymous with greater revenue. Get in touch with a Managed Service Provider and ask them how they can bring you on board with this great technology called VoIP.
  • Five Things You Should Do Right Now to Preserve Your Network and Systems



     
    1. Backup Files Every Day –  As catastrophic as data loss is, the number of businesses that still are not backing up their network is unbelievable. According to the Symantec Small to Medium Size Businesses (SMB) data, only 23% of SMBs are backing up their data on a daily basis and fewer than 50% are backing up data weekly. Any number of events can result in data loss, so the importance of frequently backing up your network cannot be overstated.
     
    2. Ensure Backup Procedures Are Checked Regularly –  Many times business owners think that they have a backup system in place only to find out after it’s too late that it hasn’t been working properly. It may seem like your files are being backed up daily, however, the backup could have become corrupt or it is not backing up huge chunks of critical data. Check your backup procedures regularly to ensure they are working properly in order to be sure that ALL of your data can be recovered. In the age of BYOD (Bring-Your-Own-Devices) it is also important to frequently backup data on your employee’s personal laptops, iPads or Blackberrys, so make sure you have a procedure in place to check those backups as well.
     
    3. Make Sure Updated Virus Protection and Firewalls Are Always Enabled –  Far too many companies either have no virus protection, expired virus software licenses, or disabled virus programs that aren’t running at all. This makes their business technology vulnerable to virus attacks from emails, spam, data downloads, and unreputable websites. Further, because of inadequate firewall protection about 40% of small to medium businesses will have their network accessed by a hacker. Chances are, when these businesses are attacked they will be entirely unaware it is happening. In order to protect your valuable data and assets, ensure your virus protection is adequate, up-to-date and functioning properly and that your firewall is intact. Finally, don’t forget to update security patches and change passwords when an employee leaves in order to deter hacking attempts.
     
    4. Monitor Server Drives –  Dangerously full server drives can bring their own set of problems – ranging from program and server crashes to sluggish email delivery. Proactive monitoring and maintenance of your server can spare your business a lot of problems down the road.
     
    5. Regularly Check Critical Built-In Logs –  Very few problems with technology emerge suddenly. These problems typically progress over time and evolve into more serious problems. Frequently review your critical built-in log files to help identify the problem before it has gotten out of control and wreaks havoc on your business infrastructure.

  • Why do you need a top-down approach to IT security?

    Why do you need a top-down approach to IT security?

    For any organization, its employees are its biggest assets. But, what happens when your biggest assets turn out to be your greatest threats or liabilities? That is how cybercrime can change the game. In a recent study, it came to light that employee actions account for about 70% of the data breaches that happen. This blog focuses on the first step you need to take as an organization to better prepare your employees to identify and mitigate cyber threats–adopting a top-down approach to IT security.

    Being a victim of cyber-attack can prove disastrous for your business as it has the following repercussions.

    • Affects your brand image negatively: Business disruption due to downtime or having your important business data including customer and vendor details stolen reflects poorly on your brand.
    • It can cause you to lose customers: Your customers may take their business elsewhere as they may not feel safe sharing their PII with you.
    • Can cost you quite a bit financially: Data breach makes you liable to follow certain disclosure requirements mandated by the law. These most likely require you to make announcements on popular media, which can prove expensive. Plus, you will also have to invest in positive PR to boost your brand value.
    • It makes you vulnerable to lawsuits: You could be sued by customers whose Personally Identifiable Information (PII) has been compromised or stolen.

    The organizational mindset needs to change and acknowledge the fact that IT security is not ONLY your IT department, CTO or Managed Service Provider’s (MSP) responsibility. You need to truly believe that IT security is everyone’s business, and that includes everybody working in your company, from the C-level execs to the newly hired intern. Everybody needs to understand the gravity of a cyberattack and its impact. Only then will they take cybersecurity seriously.
  • Data security in the ‘Work-from-home’ environment

    Data security in the ‘Work-from-home’ environment

    2020 threw a lot of challenges at the world. One of them, from the business perspective, that overshadowed the others was cybersecurity. How to ensure data safety and security in an environment where businesses can’t really control what employees do even during work hours? With the world almost a year into the pandemic, new best practices emerged that will be in use not just during the pandemic, but probably also in the future, post-pandemic era. Because the trend of working from home now seems to be here to stay. This blog will discuss some best practices for data security that can be deployed when working remotely.

    • If you can provide your employees with a computer that they will solely access for work, then that solves the majority of the issues. When employees use their own devices for accessing work data, the risk of a security breach is higher as businesses don’t have any control over staff’s personal devices. Your employee’s computer may have security loopholes such as pending updates and security patches or unauthorized software programs. If, instead, it is a company device, you can install control mechanisms that limit what your employees can do with the device. You can impose firewall restrictions, make it a part of your intranet and also monitor employee activities freely.
    • If you are allowing employees to use their personal devices for work purposes, you can encourage them to keep their device safe by alerting them about software updates, security patches and offering to install the latest version of antimalware software for their devices. This is a win-win situation for you and your employees, as you get to keep your data safe, while they get to keep their device and personal data secure.
    In either case, you need to educate your employees on the basics of data security. These include password hygiene, identifying phishing attempts, attachment hygiene, etc.

    Don’t forget the cloud! The cloud can help you keep your data safe and secure even in the remote working environment by adding layers of data security and eliminating storage of data on local hard drives and removable storage devices. Contact a cloud service provider today to learn more!

  • Three responses after a Ransomware attack

     
     
    Three responses after a Ransomware attack
     
    If you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you. Ransomware is a type of computer virus that kidnaps your data and holds it hostage for money. It has become increasingly common; attacking governments and all manner of business as well as non-for profit institutions.
     
    Why is ransomware so nasty? Because it steals the most important thing your contact center possesses. Data. Worse, once infected there isn’t generally a way out. No one can “disinfect” your machine. You aren’t going to be able to call in IT support to solve the problem. Basically, you have three options.
     
    1. Pay the ransom. This payment is usually via credit card or bitcoin (a digital currency). Some ransomware viruses even provide help lines if you’re having trouble. Of course there are no guarantees your will get access to your data – these are thieves you’re dealing with.
    2. Don’t pay and lose your data – This has its obvious downsides, unless…
    3. You have a safe, clean backup. In that case, you are stuck with the nuisance of restoring your data with the backup, but you aren’t out any money. However, this comes with a caveat: your backups have to be clean. The problem with ransomware viruses is that just making backups may not be sufficient to protect your data, as the backups can be infected also.
     
    As you can see, the first two options aren’t very favorable solutions. The only real defense against an attack is the third option. You have to be prepared ahead of time with a safe, segregated backup. Be sure to get the advice of a specialist on how to protect your data from this very serious threat to your business.