Sales: 678.967.3854
Support: 866.252.6363

Alpharetta, Georgia 2016 – DynaSis, Atlanta’s premier provider of IT services and support for small and midsized businesses (SMBs), recently announced it has completed the first phase of a comprehensive IT planning and upgrade effort for Oglethorpe University. The first major project, begun in late 2015, has provided the institution with redundant firewall capabilities to protect hundreds of servers across a network that has hundreds of thousands of open connections at any given time.

The firewall chosen for the project, a Dell Sonic Wall NSA, is a next-generation appliance that provides consolidated, centralized and advanced filtering, and threat protection, while achieving low latency with a very large number of connections. It represents an important step for Oglethorpe as part of a cohesive plan, developed with the input of DynaSis’s IT experts, to modernize the university’s technology infrastructure and processes.

“DynaSis started with a comprehensive assessment of our core systems, which helped us focus on areas that could make a significant difference for our students, faculty and staff” said Oglethorpe Chief Information Officer Mike Gonsalves. “In August 2015, DynaSis started remote monitoring and maintenance of our servers, which resulted in a more stable and reliable server environment. The benefits have been a 24/7 operation with minimal unplanned downtime as a result. They really do a great job.”

On the horizon for Oglethorpe is a storage area network (SAN) and then a network upgrade after DynaSis completes further analyses. Like most educational institutions, Oglethorpe must pace its upgrades to align with student and faculty needs during the school year, which made systematic prioritization of projects critical to the effort.

“Educational institutions today are under attack, literally, with some of the world’s brightest people trying to gain access to sensitive data” said DynaSis's President of Managed IT Services, Dave Moorman. “Our most pressing concern, after performing a comprehensive situational assessment, was to ensure Oglethorpe had 100% firewall protection—with both a main unit and a high-availability unit that would take over in the event of an outage. Additional upgrades, which will give the university an IT platform to match its world-class reputation, continue to be implemented.”

When Classic Collision IT Manager Scott Britt looked for help reducing network outages and handling day-to-day IT duties, his search led him to DynaSis. Working together, DynaSis and Classic Collision formulated an ambitious 2- pronged plan: move Classic Collision’s entire day-to-day operations to the cloud, and provide day-to-day IT support for Classic’s employees.

“Our company used an another IT service previously. At that time, there was a server we had acquired when we bought an existing body shop. They hooked that server into our network without checking for viruses and compatibility, and it infected our whole system. We knew it was time for a change.”

Now, Britt reports, the new technology framework is helping the collision centers “do everything right the first time” for its customers.

Prior to signing with DynaSis, Britt had been charged with managing the IT needs for the nine collision centers then owned by Classic Collision (currently 18). However, providing support and assistance for so many different locations was a struggle. “We did everything ourselves—from training people to use our management system to repairing PCs,” says Britt. “Even with just the nine locations we had then all over metro Atlanta, it was hard to get to everybody.”

In particular, Britt reports, keeping tabs on licensing requirements for software was difficult, and untimely network outages hampered efforts to provide the excellent customer service for which Classic Collision is renowned. Britt interviewed four or five managed IT service providers but after meeting with DynaSis's VP of Managed IT Services, Chas Arnold.  DynaSis was hired to provide IT support, which dovetailed perfectly with Britt’s own plans. “We like to have the latest and greatest technology, and I had already envisioned that the cloud was where we wanted to go,” says Britt. “Once we got DynaSis in for the day-to-day IT issues, we were able to set up a meeting with our boss, Brandon Bishop, who liked the availability, security and mobility of the DynaSis Business Cloud.”

With the Cloud project approved, Classic Collision and DynaSis immediately began working to implement the complete solution, which would include moving all of Classic Collision’s operations to the cloud, hosted at DynaSis's world class Tier 3 data center. DynaSis would also provide 24/7/365 monitoring and maintenance, including software updates. Each Classic Collision location would still have a single on-premises server to assign IP addresses and help connect the desktop PCs in the office to the cloud environment.

Making the Move

To prepare for the move to the cloud, Classic Collision agreed to upgrade its aging desktop PCs and then began transitioning the company’s software, as well. DynaSis provided Classic Collision with hosted Microsoft Office and the Microsoft Exchange email client, two products frequently used in cloud environments. However, a bigger challenge was transitioning several specialized programs used by Classic Collision, including a collision shop management system, as well as estimating packages. “We had one nagging issue with one of the estimating packages, and DynaSis went above and beyond to figure it out,” says Britt. “As far as we know, none of the products had ever been run in a cloud environment before, and DynaSis was able to make them work.”

Moving to Mobile

With Classic Collision’s cloud-based operations in full swing, the company began focusing on its new
mobility benefits. “With the DynaSis Business Cloud, we immediately saw the benefits on the mobility side,” says Britt. “Mobility gave our estimators the freedom to work from home, instead of having to come in over the weekend to complete estimates.”

To add to its mobility, Classic Collision has since purchased laptops for each of the estimators in its 18 current stores. Each laptop rests on a mobile cart, equipped with a printer, battery, and battery charger so that they can be moved wherever needed within the facility. For offsite estimates at one of the many dealerships that uses Classic’s services, the estimator simply takes his laptop and remotely logs into the Classic Collision network.

Supplemental IT Staffing

With his responsibilities growing along with the number of collision centers, Britt had a decision to make: try and hire a full-time employee with the knowledge base and skill set he needed to support him, or look for a more practical solution. The answer: DynaSis Supplemental IT Staffing. Under this program, Classic contracts with DynaSis for a full-time, highly skilled DynaSis engineer who works on-site with Britt, and travels to all their centers. (DynaSis also offers part-time staffing.) “In addition to our DynaSis engineer, I also have access to DynaSis's own in-house senior IT executives who have been extremely helpful”

Bottom Line Benefits

Overall, Britt says, working with DynaSis and their cloud solution has given him more confidence in their system’s stability and reliability. He also likes the security of knowing the entire Classic Collision network is being monitored and updates are being done. “DynaSis is very efficient,” says Britt. “If the first tech cannot finish an issue, they stay with it until they resolve the problem.” On a professional level, the new solution has provided another benefit, as well. “We now have the ability to focus on things such as improving processes,” Britt says.

If there’s one takeaway from the project that Britt would offer other potential DynaSis clients, it’s to ensure they share with DynaSis every possible detail about their business. “During the initial implementation, DynaSis’s employees went above and beyond to learn how we do business and make sure every- thing interacted well with the cloud environment.”

[featured_image]

Fayetteville, GA – September 22, 2016 – DynaSis Integrated Solutions, headquartered in Alpharetta, today announced the major expansion of its Fayetteville office, serving the southern section of Metro Atlanta. With this increase in resources, DynaSis will now be able to provide its services to an even larger and more diverse clientele in this region.

“Our South Metro business has been growing rapidly and steadily,” said DynaSis Founder and President, Dave Moorman, “and now we know that we can continue to provide the same high level of service that has been our hallmark for the past 24 years.”

DynaSis also announced that it has retained the services of Scott Gallagher as vCIO (Virtual Chief Information Officer) to take over the day-to-day operations of the Fayetteville office. DynaSis’ vCIOs work hand-in-hand with their clients laying out future I.T. strategy and problem solving on a day-to-day basis. “Anyone who knows I.T. and knows Atlanta, also knows DynaSis. Dave and DynaSis have been at the forefront of managed IT service development and have instituted policies that are now used throughout the country. I am truly excited to be part of this superb team.”

According to Moorman, “Scott joins DynaSis with years of experience serving the same small to mid-sized market that we do. He has the technical expertise our clients need. We are happy to welcome him to the team…this is a really good fit.”

About DynaSis: DynaSis has been Atlanta’s premier IT support services provider for more than 23 years. As an IT company working with small to midsized businesses (10 to 150+ users), DynaSis has developed a unique 12-layer approach to network threat protection, ransomware prevention and crypto virus threat elimination. The DynaSis Business Cloud functions through a highly secure environment with full real-time data backup.

Contact DynaSis at 678.218.1769 or visit www.DynaSis.com.

Trough window glass. Designer brainstorming new ideas

Millennial generation workers...give them the technology tools they need, and your rewards will follow.

With the millennial workforce growing literally by the day, employers need to keep up-to-date with how these people function and think. While you may be thinking, “Why should I adapt to them? They’re going to work for me?” the reality is that they are not alone. Not only are they going to become your workforce, and you want the best of the best, they represent the likes and dislike of the millennials who will also be come your clientele.

Unlike traditional workers, they don’t always believe that work needs to be accomplished during the standard 9 to 5 work day, nor necessarily within the confines of your office walls, nor does it have to be Monday through Friday.

“What difference does it make where or when I do the work, as long as I get the job done?” More and more, the answer is: it doesn’t…as long as there are proper channels of communication. Enter mobile computing and BYOD (bring your own device) that lets people work from anywhere at any time while staying in touch and having full access to whatever work files they may need.

Right now, more than 85% of millennials have smartphones, whether iPhones or Androids, and it has a major effect on how they communicate with co-workers and superiors. A recent study showed that 41% prefer communicating electronically rather than by speaking over the phone or face-to-face. In fact, 59% said that an important consideration in whether or not to accept a job was whether or not the employer was going to provide state-of-the-art technology. This is so even though many admitted using their own devices right alongside the technology the company supplied. (This writer is writing on his own MacBook right now, which is sitting alongside the perfectly fine computer provided to him. I use both)

If you want to stay ahead of the game, you have to adapt your IT policies accordingly. Modern workers expect modern communications built into a technology ecosystem that may include things like social networking, instant messaging, blogs, wikis, and video on demand. This isn’t for fun and games. These tools are what enable the millennial generation instant connectivity and engagement with co-workers, superiors and customers. Ultimately, they enable these workers to be happier and more productive in their jobs and relate in a more meaningful way to the customers of their own generation. These tools also elevate their creativity and employers who cater to these needs are finding that the real benefit ends up belonging to the company.

DynaSis is an Atlanta managed IT service provider, in business for almost 25 years. DynaSis works with small to mid-sized businesses employing cloud technology where appropriate, and more traditional services when required. We have also been on the forefront of cyber security as well as helping businesses become truly digitized, so they can be the beneficiaries of digital disruption, not the victims.

 

 

Image shows a computer keyboard wit a password notice

You would be surprised to learn how many people still use a password like shown above...or "Password" as their password.

There are many areas of focus when it comes to keeping your IT network safe and one of the weakest points has traditionally been employee laxity. When it comes to protecting the passwords your employees use when logging in, most people don’t take the precautions necessary to protect themselves…or YOUR business. Not long ago, simply occasionally changing your passwords was considered enough, but with hackers becoming more and more sophisticated, your means of protection needs to become more sophisticated, as well.

That said, most people do realize that that securely logging in is critical. They just don’t understand what it entails. If you already understand that simply changing passwords isn’t enough, you may be familiar with the terms “two-factor” and “two-step” authentication, which are both in wide use today. Many people assume these are two terms for the same functionality, but that is not the case. There are differences…somewhat subtle but also important.

The “two-step” process is still what we call a “single-factor” authentication in that you would have a single login password that you have likely memorized, but additionally, you would have to take an additional step. For example, you may be sent a one-time code via your smartphone. This is a common practice when changing passwords on a website that is used by the public. The single factor is your password; the two steps are entering your password, then entering the code you were sent.

By adding that extra step to the login process, two-step authentication does make logging in more secure than a single-step authentication (i.e. just the password). However, if a person or business is hacked, it will do only a little to stop hackers from getting a hold of whatever they are looking for.

To reach a higher level of security, the “two-factor” (AKA “multi-factor”) authentication process takes your security to a much higher level. This authentication process requires you to provide two different types of information, such as password or passcode plus a retinal scan or fingerprint. In this case, you are providing two entirely different types of information, requiring a much higher level of effort and skill on the part of a hacker.

Essentially, every two-factor process is also a two-step process, but the reverse is not true. Not every two-step process is a two-factor process. This important distinction can be the difference between keeping your company’s data safe or leaving a way in for skilled cyber criminals.

We believe that the best way to determine the process that fits your business needs is to ask for a complimentary IT assessment from your managed IT service provider, or take you analysis to an even higher level with a Strategic Technology Review.

DynaSis has been serving the needs of the small to mid-sized business community in Atlanta since 1992 with managed IT service, managed IT security, business cloud, and a host of other IT solutions.

Manufacturing worker using digital tablet at work

Manufacturing employee using cloud-based tablet on the floor of the plant

A recent article in Forbes Magazine highlighted how technology is impacting the manufacturing industry. Among the other points it raised, it noted that surveys had found that:

From the survey results, based on the responses of almost 200 manufacturing companies ranging from food and beverage to automotive, it is obvious that the age of “connected” manufacturing, and IT management is here. This connectivity gives them a here-to-fore unavailable agility that enables them to work better with both suppliers and customers. On one hand, this affects management of the supply chain, and on the other, both innovation of new products and quality of existing ones. Interestingly, although we hear so much about the contraction/consolidation of manufacturing in this country, 90% have reported that they have actually grown over the past five year. The Cloud has also allowed more than 10% of the respondents to become actively engaging in “re-shoring”, the reversal of off-shoring…in other words, bringing their manufacturing, in full or in part, back to the United States.

Almost 3/4s of the companies state that use of the “Cloud” is giving them superior insight into their overall businesses and a full 90% say that they now have better access to company data. They are also reporting better communication with suppliers and customers, as well as with transportation vendors. By the end of the coming year, four in ten expect to be using big data analytics, or be well along in the planning stages of doing so.

The majority has stated that use of the “Cloud” improves their ability to deal with fluctuating customer demands and the consequential fluctuating supply chain needs. This allows them to become more customer-centric, something required by the upswing in customer-driven commerce.

Over the next five years, approximately two out of three of these manufacturing companies are looking at cloud-based technologies to: 1) increase connectivity with their supply chains, 2) improve their quality assurance programs, and 3) build upon their communications capabilities between plant and enterprise.

All-in-all, it is safe to say that the age of “connected manufacturing” though IT management has arrived.

DynaSis is an Atlanta based managed IT service provider and has worked with a variety local manufacturers since its inception in 1992. DynaSis world-class data center provides safe, reliable and economical cloud computing service to its clients. www.DynaSis.com. 678.218.1769.

Smart phone holding in female hand, blured background. mockup

Did you ever wonder how safe it was for you to be sending passwords or secret codes via airwaves through WiFi or Bluetooth? It can be a problem in that these transmissions can be susceptible to hacking and, once intercepted, the codes are susceptible to having the encryptions decoded. Well, a team of researchers…consisting of electrical engineers and computer scientists…at the University of Washington, believe they have come up with a solution with what they are calling “on-body transmission.”

Your cellphone fingerprint sensors and touchpads on many computer devices generate low-frequency transmissions that they have harnessed to send secure passwords through the human body.

“Fingerprint sensors have so far been used as an input device. What is cool is that we’ve shown for the first time that fingerprint sensors can be re-purposed to send out information that is confined to the body,” said one of the lead scientists, Shyam Gollakota of the U of W.

First results show a much more secure way to transmit authentication data to any number of devices, as long as the transmitting device, such as your smartphone, and the receiving device, such a medical equipment, are both touching your body at the same time. Your smartphone confirms your identity when you type in your password and transmits this to the other (in this case medical) device. This is accomplished by leveraging the signals that the smartphone is already generating.

The sensors in most up-to-date smartphones receive data about your fingers. The researchers came up with a way to instead use this data as output that ties in with data in your password. When used in a smartphone, this authenticating data actually travels securely through your body to the device seeking to confirm your identity. Among other uses, medical devices are high on the list. For example, this technology can be used to confirm identities before sending or receiving data from insulin pumps or glucose monitors.

As a managed IT service provider, we are always interested in new technologies, particularly those that involve security, often before the practical ways in which we will eventually use them for IT security are developed. It’s just one way we stay ahead of the pack. It’s early, but we believe that this may lead to a major shift in any number of security protocols. As for accuracy, the U of W researchers have tested the technology using a wide variety of devices, on people of various ages, weights and heights, and while sitting, standing, moving and even sleeping. They even tested it on various parts of the body – head, hands, feet, etc. The technology worked in all tested situations. Again, this process is still in its infancy, but the early results are very promising.

If you are keeping up–to-date with the latest on ransomware attacks making the news these days, you may be aware of a newly discovered insidious piece of malware called Satana. Satana appears to be an offshoot, or third cousin, of another ransomware Trojan named Petya, that has kept IT security professionals on their toes in their ongoing battle to stay one-step ahead of the cyber criminal.

Here is what makes Satana more difficult to deal with than the older Petya: In order to do its evil deeds, Petya needed help from a second Trojan called Mischa, which then attacked the computer’s master file table and encrypted files that it was able to access through that table. Satana is much more self-sufficient and is perfectly capable of encrypting files on your computer without any help. More than that, instead of attacking the master file table, it attacks the Windows Master Boot Record, which not only corrupts rebooting, but also inserts code directly into the booting process. Users have no way of knowing that by simply rebooting their devices, they are unleashing this malware throughout their computers, infecting the devices and encrypting file after file.

The first clue comes as a ransom demand that starts:

“You had bad luck.” It then goes on to let you know that your files have been encrypted and that to free up these files you have to send them an email, with your personal code, that they so thoughtfully provide. Of course, the instructions continue on, explaining that you will also have to pay the “ransom” of one half a bitcoin ($340). And all this appears on your screen in bright red text on a jet-black background. The whole thing looks like pure evil, which, of course, it is. Some very smart people spent a lot of time and effort figuring out how to steal your money.

The amount of the ransom can vary greatly. This is very smart. The amounts they charge (steal) are usually small enough that it makes more sense for you to pay the ransom than try and fight them. A larger company may be asked for several thousand dollars while a small one, as in this instance, just a few hundred. Smart and effective.

On the other hand, while the $340 (or more) may not concern you that much, there may be considerable downtime that can have a very adverse effect on your business.

Kaspersky Lab, a consumer-oriented developer of anti-virus, anti-spyware, anti-spam and personal firewall products with more than 400,000,000 customers world-wide, has called Satana the “ransomware from hell.”

As for “good news”, Satana is still new and not yet widespread, and weaknesses and errors in its code have been discovered, so IT security researchers and managed IT service providers are working on methodology to severely limit its effects. It is still unknown how the virus will morph and what long-range problems it may cause.

The good news, for the time being, is that Satana is currently in its infancy stages; it is not widespread, and researchers have uncovered errors and weaknesses in its code. On the flip side, it appears that Satana is positioned to evolve over time, and with its comprehensive method of attack, it has the potential to become the next major threat in the ransomware world.

As always, follow the basic rules of cyber security:

·    Make sure your data is backed up regularly

·    Do not open email attachments unless you know who they are from

·    Have your IT service provider install both Crypto-Prevent and Crypto-Containment software. Crypto-Prevent keeps known viruses out. Crypto-Containment is a newer development. If a system does become infected, Crypto-Containment identifies it quickly and immediately locks down the infected files, preventing further spread of the infection. These files can then be deleted and replaced from the backup.

DynaSis is a managed IT service provider, serving the small to mid-sized business community for a quarter century. We have been at the forefront of cyber-security for many years and have been instrumental is developing methodology for fighting all forms of malware that is now used across the country.

 

girl-support-desk-1024x683

Being unable to receive technical support when they need it is not only frustrating to your employees, it hurts your business. Your sales people can’t sell, your customer service team cannot provide the assistance your customers need, and the security of your I.T. infrastructure may be at risk.

Your onsite IT administrator can be pulled in a variety of directions including addressing mundane, routine computer and network issues instead of focusing on the bigger picture. The answer: you may be better off using a managed IT service provider to take over you IT Helpdesk chores. Here are some of the reasons:

Benefits of an Outsourced IT Helpdesk Team

1: It can save you money. Lost sales, disgruntled customers/clients…these cost you money, as do unhappy employees. This is particularly true if your client base covers more than a single time zone so that you have people working outside of the typical 9 to 6 time frame.

2: Increased productivity: a good managed IT service provider will have well-trained helpdesk personnel who can quickly resolve the vast majority of issues. They should also have the resources to escalate problems they cannot complete within a short period of time.

3: Fixed monthly fees. A managed IT helpdesk provider can also save you money on fees. Instead of paying for an in-house support team, or bringing in an expensive “break and fix” repair company for each problem, you effectively share this expense with a number of other companies who are using the same service.

4: Frees your IT executive or administrator to focus at improving your IT processes and high level support while the helpdesk team can put out the day-to-day “fires.”

5: Easy contact – single point of contact – always there. No one is always in the office. Your IT admin takes days off, even weeks, has business away from the office, and has days he comes in late or leaves early. Conversely, your outsourced IT helpdesk team is always there, 24 x 7, and can be found at the other end of the line by calling the same phone number anytime.

6: Wider range of expertise. The Information Technology field is so wide-ranging, complex and diverse today that no one person, or small team of people, can possibly have the answers to all the situations that arise. A good IT provider will not only have the helpdesk team, but also a cadre of highly trained IT executives who can provide technical support and advice in a broad range of situations.

Technology today is always changing and always challenging. Choosing the right helpdesk service can make your workplace a more enjoyable place to be, taking the burden off your IT admin, and reducing stress for all your employees.

DynaSis has been providing helpdesk support to Atlanta’s small to midsized business community for a quarter century. The company’s team of 55 professionals, including more than 30 engineers, also provides full design and installation service, along with remote 24 x 7 monitoring and managing of IT infrastructure. DynaSis provides full cloud service, along with traditional onsite solutions, and hybrid systems to match any business’s needs.

Current VoIP systems offer a lot. They speed up communications; they reduce downtime; they are easily scalable; they reduce costs. But we find that not everyone uses all the features these modern systems provide. Unlike older telephone systems, there are a number of built-in, easy-to-use features, so neglecting to use them is, simply put, a mistake. One of these is music/message on hold. Proper use of this feature can be a big determining factor in whether your prospect/customer hangs on during a long hold, or hangs up and calls the next company on his list.fonality-phones-1024x512

But there is more to it than that: you are given the opportunity to do several things. First, put the caller in a good mood by using the right upbeat music. Second, make a generic pitch as to why your company is a leader in your field. Next, promote specific products or services being offered, especially sales and promotions. Finally, tips (including tech tips) on best ways to use your products.

Whether the message is attempting to influence a purchase, or just entertain the person on hold, your primary end result is to keep them on the line.

Let’s talk about music.

Yes, everyone’s taste is different but common sense will lead you to the right decision. If you are dealing with a younger audience, you probably don’t want Tony Bennett (if you don’t know who Tony Bennett is, then you are part of that audience, yourself!) If your customers are baby boomers, then The Weeknd is likely a poor choice (no, that’s not a typo.) In general, keep it middle of the road, current, and uplifting. You are not trying to make a social point, be politically incorrect, or be cool. One other point: if your callers tend to call in frequently, and if they are generally put on hold, consider changing your music regularly. (You can upload multiple tracks and set schedules.)

Sales & Marketing

As long as you make the message entertaining, why not use this time to promote your company and/or a specific product or service. If you run radio or TV ads, pick up where they left off. Just try and make the message a little different so you aren’t faced with a subconscious: I’ve heard this already…I’m just going to tune out.

Your VoIP system probably has the ability to store multiple messages that can be scheduled, (like the music) to keep it interesting. Another trick is to string multiple messages together, then set them on a loop so that people are likely to hear different messages each time they call. And remember, a little humor is a good thing.

If you have interesting statistics that either highlight the benefits of your products/services, or how well your company is performing, you can add these.

You can also set the system to play different on hold messages for different incoming lines. For example, you may not want the same message playing on the Sales line as on the Customer Service line.

Learn More

If you want to learn more about all a VoIP business telephone system can do for your business, download our White Paper: "Your Telephone System as a Business Building Asset"

………

The point is, as part of your VoIP telephone system, you have an opportunity to enhance your prospect’s/customer’s experience with you, and that is always a good thing. If you think your company may be ready for a telephon system upgrade, give us a call. 678.218.1769

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram