Sales: 678.967.3854
Support: 866.252.6363

[featured_image]

By the DynaSis Team

We recently came across a study, released earlier this year, about the challenges that professionals face with remote collaboration. The survey, which queried some 5,000 business professionals at various levels, was quite interesting.

As a whole, the group named poor audio and video quality to be their number one remote collaboration challenge, with 39 percent of respondents selecting that option. The group cited numerous other leading causes of remote collaboration problems, with technology-related issues popping up quite frequently. Among respondents, 35 percent said they had a hard time sharing content in a remote meeting, and 27 percent indicated that unreliable technology was a challenge for them when collaborating remotely.

Despite these challenges, respondents overwhelmingly said remote collaboration was valuable.  Among methods for collaboration, web conferencing and video conferencing were their top two preferred methods (27 percent and 25 percent, respectively). The least preferred method was instant messaging at 12 percent.

Here’s where it gets even more interesting. Unlike a few years ago, when executives and professionals often cited financial benefits as the primary reason for remote collaboration, according to the study they now cite benefits such as increased corporate efficiency and improved work-life balance.

In other words, many of these professionals believe that remote collaboration has become an important driver, not just of savings, but also of both business productivity and professional satisfaction. Executives, in particular, stressed these aspects. Among respondent CEOs, 88% stated that remote collaboration is key in helping their organizations meet objectives.

What does this tell us? That companies―and especially their executive leadership―are embracing the notion that workers and clients in distributed locations can have productive, collaborative engagements. “Remote” in the traditional sense of “far away and isolated” is no longer an accurate definition. The problem, it seems, is that professionals need a better way of achieving the collaborative environments they seek, no matter where they and their peers, clients, vendors and other partners might be.

At DynaSis, we’ve spent more than two decades helping our customers adopt the latest productivity tools, and we believe that mobility means more than being able to check email from the road. It means having the ability to achieve your work goals remotely, not only when you are working alone, but also when you want your entire team “with” you, even though they are really far away.

We’ve spent quite a bit of time researching the options for small and medium-sized businesses to achieve this goal, and we’d be happy to share our insights with you. For more information, fill out our inquiry form or give us a call at (770) 569-4600.

DynaSis, Atlanta’s premier provider of IT services and support for small and medium businesses (SMBs), today announced it has transitioned Atlanta law firm John Foy and Associates to its end-to-end IT monitoring, proactive management and technical support services. With the service, the noted Atlanta law firm is receiving 24/7/365 network and system monitoring and proactive troubleshooting, plus round-the-clock IT support.

“We recognized the need for more robust IT than we had previously―more bench strength,” said John Foy and Associates Administrator Andy Wys. “The structure of DynaSis’ offering appealed to us, and once we agreed to go with them, the transition was very smooth and easy.”

With Digital Veins, expert technicians will continuously monitor and proactively troubleshoot John Foy and Associates’ network and systems at DynaSis’ network operations center (NOC), processing trouble tickets as they are submitted, as well. Should a problem arise that cannot be resolved within four hours, DynaSis will send support technicians onsite. (The majority of DynaSis’ support tickets are resolved within 15 minutes.)

“Like many small, successful businesses, John Foy and Associates’ technology was working fairly well for them before we came on board,” said DynaSis VP, Business Development Chas Arnold. “Management didn’t realize how easy and cost-effective it was to transition to a fully monitored, preventive & proactive IT platform that would boost productivity and reduce the incidence of future problems dramatically.”

To implement Digital Veins, DynaSis technicians installed a small, load-free software agent on each of John Foy and Associates’ machines. The agent connects to and communicates with the DynaSis NOC, enabling computer experts to Secure, monitor and troubleshoot the systems and receive alerts if any evidence of impending trouble occurs, or any performance measurements are out of range.

“In addition to fixing problems that arise, they have already helped us make some improvements, such as helping to free up space for our backups,” said Wys. “DynaSis provides us with peace and comfort.”

About John Foy and Associates
John Foy and Associates was founded in 1999 by Milwaukee native John M. Foy, a graduate of the University of Dayton and Ohio Northern University Claude W. Pettit College of Law. He was admitted to the practice of law in 1993 for the state of Georgia. Foy is admitted to the U.S. District Court Northern District of Georgia and the Supreme Court of Georgia, and is a member of the State Bar of Georgia, the American Association of Justice, the Georgia Trial Lawyers Association, The American Bar Association and the Atlanta Bar Association. The firm's 16 lawyers specialize in representing individuals who have been injured in accidents. They also help clients file claims for Worker's Compensation and Social Security. For more information, visit www.johnfoy.com.

About DynaSis
DynaSis is a managed IT service provider for small and medium-sized businesses in Atlanta, Georgia. DynaSis specializes in offering on-premise and on-demand managed IT service plans, managed hosting and professional equipment installation. For more information about DynaSis’ services visit www.dynasis.com.

By the DynaSis Team

The results of a survey, conducted this year at an IT support conference, indicates that corporate IT departments are stretched way too thin and at the same time constricted by lack of budget (36 percent), resources (24 percent) or team skills (20 percent). Furthermore, 44 percent of IT managers polled for the survey said lack of technological awareness at the executive management level has created a divide between the board room and the IT department, in terms of priorities.

If you are an IT professional reading this, you are probably nodding your head in agreement. If you are a small or medium-sized business (SMB) owner, you are probably thinking, “That doesn’t apply to my firm.”  This disconnect is precisely where the problem lies.

According to the survey, if given free reign over IT decision-making, 58 percent of IT professionals would prioritize long-term, back-end infrastructure investment. Another 24 percent would pursue virtualization, and 18 percent would add more storage. Yet, according to survey respondents, none of these long-term investments topped the priority list at the upper management level. The executive priority most often cited by survey respondents (20%) was upgrading productivity software―such as Microsoft Office.

We’re not discouraging anyone from upgrading their productivity software. In fact, DynaSis is behind Office 365 (Microsoft’s new subscription-based licensing model for Office) 100 percent. We even offer a solution package for this product that includes planning, migration and support.

We are suggesting that the ability of many companies to operate effectively and competitively is being hampered because overtaxed IT professionals are trying unsuccessfully to run shoe-string operations with stressed out, often insufficient or inadequately skilled IT teams. In some cases, they’re trying to do everything themselves.

Technology is simply too important―and too much of a productivity builder―for executive leaders not to listen to their IT managers and work towards giving them the budget and resources to do their jobs. This doesn’t mean that organizations have to hire and train more workers or make major directional shifts.

At DynaSis, we have long assisted companies in a “back-up” capacity―coordinating closely with IT managers and taking over important tasks, such as help desk support or hardware installation, that they do not have time to manage effectively. In doing so, we give them the “breathing room” they need to focus on planning, coordination and strategic initiatives.

Of course, at some point business owners also must increase their budgets and give their IT managers some measure of control over decision-making to achieve the best outcomes. Frequently, we find that once business leaders stop and really look at the bottom-line benefits that more technology can bring them, they find those increases aren’t as painful as they expected.

If you are a business owner (with or without an IT manager), we would be happy to sit down and talk with you about what your next step should be. If you are a frustrated IT manager, we can help pull together the metrics you need to persuade executive leadership to see things your way. We can also back you up, wherever and whenever you need help. For more information, fill out our inquiry form or give us a call at (770) 569-4600.

[featured_image]

By the DynaSis Team

In August 2014, a new study about small and medium business (SMB) adoption of VoIP (Voice over Internet Protocol―also known as Internet calling) was released by Software Advice. The results were so compelling we thought we’d share them with you.

The study found that although SMBs still rely heavily on landlines (31%) and mobile phones (13%) as their sole business telecommunications medium, VoIP is now the frontrunner. Of the 350 SMB owners surveyed, 42% have already adopted VoIP for at least some of their phone communications and 57% indicated they were currently exploring VoIP solutions for the first time.

Perhaps more important for the future of VoIP in the business market were the reasons these business owners cited for exploring VoIP. Seventeen percent of respondents said they were experiencing reliability issues with their current phone systems and felt VoIP would be more reliable. Another 15% said their current solution had outgrown the business, and a VoIP system would be more scalable, and an equal percentage thought VoIP would be more affordable.

Coming in a close fourth was “increased functionality,” with 14% of business owners citing this reason for evaluating a VoIP platform. Finally, respondents overwhelmingly preferred a hosted (cloud-based) solution to an on-premise one, a move that is proven to increase reliability (assuming the business uses a quality provider).

We consider these results pretty amazing, given that only a few weeks earlier, Software Advice published another report that indicated 71% of consumers could not even define VoIP, and many had serious concerns about its reliability. In other words, the small business owners had a much better handle on VoIP and its benefits than did their consumer counterparts.

This is great news for both business owners and VoIP providers, because VoIP technology truly does deliver exactly the results that these business owners anticipate. VoIP provides companies with an amazing arsenal of special features, including automated attendant (the top feature SMB owners wanted), voice mail to email, Internet faxing, remote location services and more.

Furthermore, VoIP systems are more readily scalable than traditional landlines and more affordable than mobile-only platforms. Moreover, when a VoIP solution is hosted, business owners have the confidence of greater reliability―and a partner that is managing the service. If you have not looked at VoIP yet, or you are considering making the switch to a new provider, we’d love the opportunity to discuss the technology with you. DynaSis has partnered with some VoIP providers who are truly turning the industry on its ear. To learn more, fill out our inquiry form or give us a call at (770) 569-4600.

[featured_image]
By the DynaSis Team

In our last article, we talked about some important technology assessments and their value to your business and IT success. In this article, we’ll talk about another type of IT assessment― establishing a workable goal for the level of “uptime” (technology continuity) you require.

Ultimate availability, in the technology world, is 99.999% uptime. At that level, companies should have barely five minutes of unplanned downtime (system outage), per year. In reality, obtaining such an uptime figure is prohibitively expensive for the average business. Even dropping a decimal―to 99.99% (approximately an hour of yearly downtime)―doesn’t reduce the cost substantially.

So, how can you decide where your business falls, on the scale of attaining maximum uptime and productivity? In our viewpoint, a more realistic goal for many businesses is 99.9% uptime or better. At that level, a company can anticipate fewer than nine hours of unplanned downtime each year.

Some companies decide they can live with even more downtime. At 99% downtime, businesses experience approximately 87 hours of downtime, per year. We don’t recommend any business set its bar so low, especially if it relies heavily upon technology. Nevertheless, every business owner has to decide what is appropriate for his or her firm. Some business owners find a happy medium by opting for higher availability for mission-critical systems like email, but accepting a higher level of risk and downtime for information they can go a day or two without.

Beyond deciding how much downtime you can live with, also consider how much business disruption you can tolerate. Given that the work day consumes only one-third of each 24-hour period and most firms are closed on weekends, most business owners might assume that with 99% uptime, they would experience far less than one-third of their 87 hours of downtime during the working day. In many cases, they would be wrong.

The reality is that systems tend to fail when they are under heavy load. In many cases, issues can arise at night or over the weekend, but only when workers start using their systems do those issues cause trouble. If an IT provider proactively monitors your network and systems 24/7, troubleshooting and resolving issues as they arise, there is a good chance most of your downtime will happen when the office is closed.

If your provider doesn’t guarantee after-hours monitoring and problem resolution, then system glitches and issues may result in office-hours disruption while you wait for a technician to arrive. Furthermore, your availability figures may be skewed unfairly in the provider’s favor, because the provider also may not be monitoring your availability after hours or on weekends. As a result, no downtime that occurs outside business hours will count in any performance penalties you negotiate.

Finally, many IT providers exclude “planned” downtime (such as system maintenance) from their uptime guarantee. Before you sign with a company that takes that approach, be sure they’ll perform your system maintenance after hours or on weekends, or your total downtime figure could soar.

In the final analysis, finding your “sweet spot” for system availability requires more than deciding what level of unplanned downtime you can live with. It also involves partnering with a provider (or hiring an in-house team) that supports your goal in the least disruptive manner possible.

If you’d like to learn more about how the IT industry approaches downtime, as well as other considerations for achieving IT continuity without unpleasant surprises, fill out our inquiry form or give us a call at (770) 569-4600.

[featured_image]

By the DynaSis Team

There’s an old adage that says, “You can’t know where you are going if you don’t know where you’ve been.” With technology, we think it’s more accurate to say, “You can’t decide where you want to go unless you know where you are, right now.” Many companies work with technology every day without any real idea where they are―how well their networks are working, whether their systems are functioning efficiently or even what IT assets they have in the building.

Not knowing this information makes it impossible to prioritize and manage technology initiatives cost effectively, and it also opens the door to downtime, security issues and other problems, big and small. A great way to address such a knowledge gap is with a variety of IT assessments. Following are a few that we recommend to our customers.

Network Assessments: This procedure incorporates network performance tests to benchmark how efficiently and securely your network is running. The test is (or should be) followed by reports that identify network issues and weak spots and provide recommendations for resolving urgent network security and performance issues. Network assessments should also include a “risk score” and recommendations for better server and device configuration and management. They should be secure and invisible to company personnel when they are running (little to no effect on network performance.)

Asset Inventories: This process gives you a clear picture of what devices are operating in your business― and what applications are running on them (which also helps you explore whether or not you are in compliance with licensing requirements). In many cases, your network assessment will include an inventory of network-connected devices such as routers, printers, PCs, servers, etc. as well as an inventory of installed applications, which is why we recommend it, first.  (DynaSis’ network assessment includes this inventory.) Depending upon how many devices you have that are not network connected (and what their condition is), a second, physical assessment might also be appropriate.

Strategic Assessment: With this process, you explore and adjust (or develop) your current IT approaches and plans to ensure they support your business objectives. Usually conducted with a “CIO” level resource (either in-house or third-party), a strategic assessment moves beyond operation conditions to such considerations as optimal replacement cycles, anticipated challenges, future business plans and other aspects of business operation that involve technology. The result should be a comprehensive IT strategy that will reduce unplanned equipment downtime and replacement, boost productivity and keep budgets in check.

Would you like to explore where your company currently is, in terms of its IT solutions? Do you need help developing a workable yet proactive vision for the future? DynaSis offers all these assessments (and more), and we’d be glad to help. To learn more, fill out our inquiry form or give us a call at (770) 569-4600.

[featured_image]

By the DynaSis Team

The media gives a lot of coverage to cyberattacks and their perpetrators, but the reality for many businesses is that the blame for security breaches lies inside the office. Criminals in faraway countries may design and launch the attacks, but if a company is stoutly defended, an attack should not succeed.

Furthermore, although “stout” defenses require up-to-date technologies such as firewall devices and anti-malware solutions, technology isn’t your only line of defense. Numerous studies indicate that cyberattacks are often successful because company employees let the attackers in.

In fact, a 2014 study conducted by IBM found that in 2013, human error was involved at some level in more than 95 percent of security incidents. The most common “mistake” was an employee clicking on a malicious email link that compromised the corporate defenses in some way.

Other significant forms of human error cited by the IBM report included system misconfiguration, inadequate system patch management and bad password oversight. The remaining top “errors” the study cited were security breaches due to lost laptops and mobile devices.

To combat these vulnerabilities, companies should address what we consider to be the “three pillars” of corporate security―user education, properly managed IT and security systems, and mobile device management. Companies that are not yet taking these pillars seriously are playing Russian roulette, and it won’t be long before it’s their turn to become a victim. We’ll address the second two―properly managed IT and security systems and mobile device management―first.

  1. Managed IT and Security Systems: Purchasing and deploying a firewall appliance or other security mechanisms isn’t a sufficient defense. As the IBM survey noted, the people behind the technology are equally important. System configuration, patch management and password oversight are all activities normally handled by IT personnel, not by users. These factors being cited in the prevalence of cyberattacks underscores the importance of organizations having competent managed services teams working for them.
  2. Mobile Device Management (MDM): Human error may result in a stolen or lost tablet or mobile device, but that doesn’t mean the company has to be compromised. With a solid MDM solution in place, wiping corporate information is a painless process.
  3. User Education: We urge all business owners to engage in a major education initiative with employees, if they haven’t already. Actions we recommend include:

For companies that aren’t confident they have addressed all these issues, IT assessments and network vulnerability checks are the best place to start. For more information, fill out our inquiry form or give us a call at (770) 569-4600.

[featured_image]

By the DynaSis Team

On August 14, Forbes published an interesting article entitled Technology Will Change Your Job: How to Prepare. It’s no secret that technology changes our work lives (and our personal lives). It increases productivity enormously, for example. It also makes it easier to stay “plugged in” to the workplace―a double-edged sword that gives us more mobility but also lets others track us down when we would prefer not to be connected.

However, this article wasn’t about that aspect of technology. Rather, it referenced a book, by attorney Richard Lieberman, entitled Your Job and How Technology Will Change It. In the book, Lieberman postulated that technology won’t simply let us work more efficiently; it will change the intrinsic nature of our jobs. He also suggested that those who do not adapt to this change will find themselves out of work.

“Bemoaning new technology is very much like those people who said passenger airplanes were terrible because they did not provide the comfort, leisure and sociability of a long train trip,” Lieberman stated. A more accurate analogy, we submit, would be to compare the value of a technically astute, well-trained administrative assistant to one who clings to an early version of WordPerfect or Word―or heaven forbid, a typewriter.

The message was, essentially, “Adapt or die,” and we believe that this message applies not only to workers but also to the businesses for whom they work. Emerging technologies from robotics to cloud computing are being adopted much faster than most people had predicted. Young people are embracing these new technologies far more rapidly than their older counterparts, and they want their employers to adopt and provide cutting-edge solutions, as well.

Conversely, many older workers and managers (the Baby Boomers) are not staying abreast of technology. However, they retain the majority of cultural and institutional knowledge that makes a company “tick,” and they often make the rules regarding who can do what, and when.

Frustrated by the pace of technological change, younger workers are bringing their more advanced, personal technology to work, much to the consternation of the older, inflexible executives and managers. In doing so, these younger workers can put businesses at risk.

So, the challenge for business owners is to adopt a more aggressive technology stance that will attract the younger stars without endangering the business. They also need to identify and retain older corporate leaders that do appreciate technology―those who can bridge the generation gap within the firm. In doing so, companies can develop a tech-forward, integrated workplace where all players can embrace secure corporate solutions to foster a collaborative, productive work environment.

The alternative is an unspoken “war” at work, where older, hide-bound executives and IT pros attempt to “control” the activities of younger workers, and the workers either become frustrated and leave or they simply find workarounds and do what they want. Neither is a satisfactory, long-term solution for anyone.

Now, here’s the good news. Companies do not have to make major IT purchases and plan exhaustive implementations every year or two in order to have an up-to-speed IT infrastructure. Solutions exist, such as DynaSis Ascend platform, that let firms pay a flat monthly fee for deployment and use of modern, secure IT solutions upgraded on a regular basis.

Such an approach keeps everyone happy. To learn more, please fill out our inquiry form or give us a call at (770) 569-4600.

By the DynaSis Team

With the unrelenting news about successful cyber-attacks, many of our customers are asking us, “Are we vulnerable?” Cybersecurity is a complex issue, but fortunately it has some fairly straightforward solutions, if you know where to look.

One issue that complicates matters is file storage. Many organizational leaders assume that if they store company files only on local (on-premise) servers and do not provide access to them remotely, their files will be secure.

The reality is very different―many cyber-thefts involve data harvested from local servers over Internet connections. If your company hosts a website or is otherwise connected to the Internet, you may be vulnerable. Locking down your data to a local resource only hampers productivity and mobility. It doesn’t automatically make you safe.

One of the most secure solutions for data that does enable remote file sharing, collaboration and other productivity boosters is a secure, private (e.g. corporate) cloud. With this approach, your data and other digital assets remain on your local servers. You provide access to them as if they were in a public cloud environment, yet you control the stringency of security and access.

To help our clients realize the benefits of such an approach, DynaSis offers a secure, affordable, private-cloud storage and sharing solution, DynaSis BLUE. BLUE was built from the ground-up as a highly secure, accountable business productivity tool that incorporates 448-bit Blowfish encryption, two-factor authentication, full auditability and granular user-access and security controls.

With BLUE, organizations enjoy absolute control over which data remote workers can view and share, with DynaSis enabling cloud-based access for only those documents and folders the client company designates. BLUE also includes comprehensive, 100% synchronized backups that replicate to DynaSis’ state-of-the-art, exceptionally secure data centers.

To deploy BLUE, our technicians install a tiny, secure software agent (essentially, an “app,”) on a client’s file server and then configure the in-house cloud environment to meet the customer’s specifications. BLUE enables firms to reap the benefits of remote file sharing and collaboration without compromising security. BLUE also eliminates the financial barriers to private cloud adoption, is easy to deploy, has low impact on system resources and does not require any special server configuration.

If you haven’t checked out BLUE yet, we’d be happy to schedule an evaluation for you, at your convenience. To learn more, fill out our inquiry form or give us a call at (770) 569-4600.

[featured_image]

By the DynaSis Team

With all the media coverage of data breaches, many companies and individuals may be asking themselves if cloud-based backups (or for that matter, cloud-based prime storage) are safe. The reality is that although cloud storage CAN be riskier than on-premise file storage (server and/or desktop), it can also be much more secure. Prudent companies can take precautions―beginning with vetting their cloud providers and solutions―to ensure their files are as safe, if not safer, in the cloud than anywhere else.

Following are a few protections you should require of any cloud backup or storage provider. DynaSis incorporates all these protections into its cloud-based solutions.

  1. Encryption―Don’t accept anything less than AES 256-bit encryption, preferably in the Cipher Block Chaining (CMC) mode with 256-bit keys. There are no known methods to compromise this type of encryption. DynaSis’ cloud-based backup solution uses this type of encryption―and its “private cloud” file storage and sharing solution, DynaSis Blue, uses 448-bit Blowfish encryption (on-device and in-transit).
  2. Intrusion Prevention System (IPS) to dynamically monitor and remediate security incidents.
  3. Incident Response and Notification Plan.
  4. The ability to provide access to security information on customer data in response to a customer’s regulatory request or internal investigation.
  5. Cyber insurance liability policy to cover cloud-based losses, assuming there is a breach and customer records are stolen or otherwise compromised.

In addition to these protections, we recommend such administrative controls as customizable deleted-file retention periods, granular controls of user access and security, and continuous, real-time, multiple-folder backup, including revised-file backup. Of course, the solution must also incorporate sufficient bandwidth to enable rapid transfers and the ability to easily and dynamically increase your storage allocation if your current allowance reaches a pre-set percentage of capacity.

Managing data is a challenge in any organization. Taking it to the cloud adds a few additional considerations, but that doesn’t mean it necessarily adds complexity. Working with an experienced cloud provider, you should be able to enjoy more security and continuity of file backup and retrieval―with less involvement and fewer headaches―than your on-premise solution can provide.

Many companies choose to have their entire systems backed up, including not only data but also applications and other elements. Many cloud providers (including DynaSis) can use these whole-system backups to build an off-site server for a firm in the event that their on-premise equipment fails. At the minimum, we strongly recommend that companies backup their email files and folders to the cloud. This not only keeps the email archive in a central location, facilitating message search and retrieval, but it also builds a segregated archive that will help the company protect itself should emails be required in the event of eDiscovery or compliance requests.

To learn more about our cloud-based backups and other cloud solutions, please fill out our inquiry form or give us a call at (770) 569-4600.

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram