Sales: 678.967.3854
Support: 866.252.6363

Until recently, managed IT services only included IT security as an add-on. Your IT support company would be responsible for installing and maintaining your network, including software updates, patches and fixes, and keeping your equipment running smoothly. IT security was often limited to the installation of a firewall and anti-virus applications. But with the growth in both the volume and the sophistication of cyber-crime, cybersecurity has become a major responsibility of IT teams. In larger companies, entire new departments have been created for network security, often with new executives in charge. New positions such as Chief Information Security Officer (CISO) are becoming common. Managed IT services have become extremely important, but many small to mid-sized businesses are not financially equipped to support a new IT-based team much less a new “C” level position. DynaSis can help you deal with this situation extremely well.

 

The History of Cyber-Crime

Cyber-crime has become an easy to enter “vocation”. In the past, if some hacker decided to break into a company’s files, lock them down, and hold them for ransom, or wanted run a scam based on the millions of dollars he was “holding” for you, he had to start at “square one” and develop the software for this on his own. When you think about it, it is truly a daunting task. In fact, it was such a large project that entire criminal enterprises were established to generate the software required to accomplish these evil deeds.

Things have changed for the wannabe criminal. All he (or she) needs to do is dig around the dark web to find the off-the-shelf software needed to go into the crime business. Easy! Basic criminal software can be purchased for as little as $200 with a number of high tech upgrades available…and even a toll-free support line.

 

How Managed IT Services Fight Cyber-Crime

How have companies been handling this? Large companies, as we stated above, are spending large sums of money for protection. Not only are they hiring entire teams to deal with this situation, they are also spending the big bucks on hardware and software.

Smaller companies find themselves in a different position. First of all, many small to mid-sized businesses make (the very bad) assumption that they are safe because why would a cyber thief even bother with them? Wouldn’t they go after the big guys? Isn’t that why we hear about the IT break-ins at companies like Target, Equifax, Home Depot, etc.? This is a very, very bad assumption. Yes, sometimes you hear about the large thefts of customers’ personal data because that’s how the news cycles run. But, in reality, the criminals know that these big companies are spending millions on security and that the smaller company is now the low hanging fruit. Today, the vast majority of cyber-attacks are against small to mid-sized businesses.

 

Fear not! There is an excellent, cost-effective and highly efficient answer to this problem. Managed IT services companies like DynaSis are well-equipped to protect their clients’ IT infrastructures. At DynaSis, we have been working with small to mid-sized companies since 1992 and we are part of a nationwide team of managed IT services companies that develop and maintain a unique and proprietary Crypto-Containment System that identifies infected data within your IT networks, locks it down, and isolates it before it can spread through the rest of your network. We would love to show you how this works, as well as other cybersecurity measures we can provide, and how these can cost-effectively bring your internal cybersecurity to a new level. Give us a call today at 678-373-0716.

Many things in the business world have become commoditized, meaning that no matter which brand you buy, nor where you buy it from, they are all pretty much the same. Think about paper, pens, toner…even things like merchant services and banks. Often times, the only real difference is the price you pay. But there are also things that may seem to fall into the same “commoditization” category, that really don’t belong there.

Business telephone systems are among those “don’t belong there” items. The fact is, choosing the right phone system with the right features and network support can actually make quite a difference in your business, helping it grow in many ways.

Today we are living in a service economy and every business today is required to provide high levels of customer service. That said, some do go overboard with overly long greetings. You may have heard something like: “Thank you for calling us here at Amalgamated Foot Powder where we believe everyone’s feet should smell like roses. My name is Sunshine and how may I help you on this beautiful day?” A bit much? Sure, but conceptually, we know that every business is in danger of losing its customers to competitors so we work hard at keeping them. Customer loyalty is hard to win and easy to lose, so top flight customer service has become a requirement, not an added benefit. As a customer service and sales tool, your telephone system and network support can be making this job easier. Here are just a few of the features that can accomplish this:

Find Me, Follow Me: Just like your email follows you wherever you go, so can your phone calls. At home, in the airport, on the softball field, even on the beach in Maui. (Yes, you can turn it off!) But in the business world of today, taking that call may be the reason you sign up a new client, or keep from losing an old one. Having the right network support can ensure you never miss a crucial call.

Voicemail Transcription: Was that last voicemail important? Instead of having to listen all the way through, a quick scan of the transcription will tell you if it needs to be answered or if it should be clicked away.

Expansion: Super important! All too often people who start new businesses invest in telephone equipment that fits their needs at the moment, only to find out that it was a mistake down the road. For example, a company with five people buys equipment that can expand to ten people. Then they hire their eleventh. Modern systems are fully expandable with no limitations. Same for “outside lines”.

Those are just a few of the features that can help grow your business. If you want to learn more about things like call control, monitoring, whispering, barging, recording, network support, and more (and there are a lot more), we recently published “Your Telephone System as a Business Building Asset”, giving you a full description of how a truly modern and up-to-date business telephone system and network support can benefit your business, showing you how it can become a powerful sales tool. So if you are wondering if it’s time to investigate a switch, the white paper is a great place to start, but even better would be calling us here at DynaSis. We have been serving the small to mid-sized business community here in Atlanta for more than 25 years and would love to begin a conversation with you. Give us a call at 678-373-0716.

The Challenge

Accord Services was having communication issues with their previous IT provider. They did not have a dedicated account manager and were not getting timely responses. The varying support team had difficulty understanding their needs.

The Solution

DynaSis was able to help Accord Services by providing them with a Technical Account Manager and an onsite Staff Augmentation of Supplemental IT.  Once a week, their Staff Augmentation of Supplemental IT is onsite for a half day to assist with any issues. This has helped put the Accord Services staff at ease to knowing always have help available.

The Results

Accord Services has not had any major outages and is very pleased with the service and responsiveness of the DynaSis team. DynaSis is providing ongoing services to ensure their IT infrastructure is solid and meets their business needs.

Digital disruption is all around us. It’s unlikely that you haven’t heard the term “disruption” referring to new businesses that are taking over large segments of existing market places. But what exactly is this type of disruption and, as the word sounds, is it an entirely bad phenomenon for IT services? Well, that depends on whether you are the disruptor or the disruptee.

A long time ago, someone chipped away at a rock, or cut up a tree, and created a wheel. Disruption! Of course, this was a very good disruption of the then current norms and made it much easier to move large objects…or large animals that were about to become a scrumptious meal. The same goes for the Gutenberg printing press, the cotton gin, Edison’s lightbulb, et cetera.

In today’s world, disruption is all around us, largely in the form of Digital Disruption. Let’s look at a few.

Netflix. Think of what it did to Blockbuster. Viacom bought Blockbuster in 1994 for $8.4 billion. At its peak, in 2004, Blockbuster had more than 9,000 stores and more than 83,000 employees. Today, there is one Blockbuster store in the world…in Alaska. Did Wayne Huizenga, Blockbuster’s founder, see the writing on the wall, or did he just like receiving a very big check? This is a prime example of disruption. Is it good or is it bad? Well, if you are a Netflix shareholder, it’s good. If you own Viacom, not so much.

Uber. Founded in San Francisco in 2009, today there are more Uber drivers in New York City than there are taxicabs. The value of a New York City taxi “medallion”, the license to own a cab, has fallen from well over $1,000,000 to about one quarter of that. In this short time, Uber has become global.

 

But What About IT Services?

These are extreme cases, but digital disruption, even on a small scale, can help individual businesses gain business advantages over competitors. But digital disruption isn’t just about the rise of specific companies. There have been other events in recent history that were disruptive on a much broader scale. Just in the field of technology and IT services we have seen:

Personal Computers: The transformation in almost everyone’s daily lives have been tremendous. Can you imagine your business functioning today without computers? Think of the increased personnel you would need in almost every department.

Cloud Computing: Since we are a company that specializes in cloud computing and IT services we understand more than most how important an event this has become for many reasons, including the security and capacity it brings to document storage and availability.

Mobile Computing: The advent of mobile computing, still another form of digital disruption, means that when your people are on the road or working from home, both of which have become common, they will have all their digital tools available all the time. It’s a great advantage when you are in a prospect’s office or trying to sell a new idea to a client.

Artificial Intelligence: No, the robots aren’t taking over, but AI can process data faster than humans and can provide analyses and data driven insights much faster than a human being.

Data: Data is being created and stored today at an incredible rate. Those companies that learn how to harness it and use it (think AI) will have an enormous competitive edge regardless of the business they are in.

 

This barely scratches the surface of digital disruption and how it can benefit those businesses that learn how to use managed IT services to gain footholds in new markets or grow in existing ones. If you would like to learn more, we suggest you read our white paper, Digital Disruption, or, even better, give us a call today to learn how DynaSis, a company that has been working with small to mid-sized businesses here in Atlanta for more than 25 years, can equip you with the technology to power your business forward. Call us at 678-373-0716.

Imagine you had a computer (we know you do, but play along). Imagine how much you could accomplish with that computer. Now imagine that you had four employees…but only one computer. If they all took turns on that computer, productivity would be a bit impacted. Well, maybe not a “bit”, but a lot. Now imagine four computers, one for each of your people. A lot more work, but a lot more expense. Now imagine that instead each of your people working at separate full-blown computers, your IT service set your company up so that they were working at four “dumb” workstations that all relied on a single more powerful “server” computer  store applications and files and feed them to the workstations as needed. Here is what you have accomplished:

Virtualization

This whole process is called “virtualization”. By using virtualization software, your IT service able to effectively turn a single computer into four computers. Under this scenario, the workstations we mentioned above are called “clients” and are served by the “server” computer. The virtualization software is called a “hypervisor”…yes, it comes from the word “supervisor”.  What your IT service did was take one more powerful computer and with the use of this software, turn it into four “virtual” computers, also known as virtual machines, or VMs. Each of these VMs is called an “environment.” (Sorry for all the Geek talk).\

What’s also really cool is that each of these virtual machine environments can run its own operating system. Windows, Linux, Apple OS. All can run simultaneously on this single computer and feed appropriate apps and docs to each client.

Now imagine a company with a lot more than four employees. Imagine a company with 50 employees. Instead of 50 full-blown computers, because of virtualization, your IT service can set your company up so you are using only 10 more powerful units, with 50 “dumb” workstations. Yes, the savings are multiplied, but we have accomplished a lot more than that. A server computer that serves five or six workstations does not need the computing power of five or six single computers. The full computing power of a basic computer may be needed on rare occasion but is extremely unlikely to be needed all the time and the need for the full computing power of six computers at the same time would be so rare that it is almost unthinkable. All this matters because, since the computing power of the server computer is shared between the six workstations, and since it would be rare indeed for even one workstations to require its full computing power, the server can get away with, say, the equivalent of four regular computers’ computing power, which your IT service can install for a lot less money. The computing power is then shared, applied to each workstation as needed.

Virtualization is a powerful tool that is used extensively in cloud computing and is something you may want to learn more about. If you do, read our recent article (with some cool illustrations) on Understanding Virtualization. And if you want to know how it can benefit your company, give us a call here at DynaSis at 678-373-0716, because we have been at the forefront of small to mid-sized business computing since 1992.

Here at DynaSis, as a managed IT services provider, we offer prospective clients complimentary IT and Network Assessments. The assessment gives the business-person a good look at where the company’s IT infrastructure stands at that moment regarding a number of potential security issues as well as understanding where it stands in terms of updates and upgrades. We then ask people to consider four questions:

We’re not going to review these one by one because the answers are pretty obvious. What may be less obvious is where to start, and that is with the Assessment. The Assessment serves as a roadmap and without it, a managed IT services provider is likely to recommend unnecessary changes, and miss some that would be highly beneficial, in the end creating a framework that does not accomplish what you are looking for.

There are some basic yet important goals that your IT services company should be helping you accomplish:

Availability

Does 99% uptime sound good? Not by our standards. That is 1% downtime, or 5,256 minutes annually. Our goal between 99.99% and 99.999% uptime, or 5 minutes to one hour downtime per year.

Security

This is an important subject on its own and we encourage you to read a white paper we published earlier this year entitled Cyber Security 2018. As a managed IT services company, we are very much aware that the majority of cyber crimes are now committed against small to mid-sized businesses. Cyber criminals know that “enterprise” size companies have invested millions of dollars in protecting themselves, so small to mid-sized businesses have become the low hanging fruit.

Mobility

Everyone is on the go. Employees work from home, in airports, hotels, clients’ offices, even on vacation. Mobility today means a lot more than having a smartphone. It means being able to access your files anytime, anywhere. It means being able to collaborate with your team members no matter where they are. Again, this is a subject worthy of discussion on its own, and we would be happy to speak with you.

Productivity

People want to be productive and ensuring that your IT infrastructure is functioning at peak levels is necessary. In fact, studies show that millennials who are interviewing for all levels of management positions frequently inquire about the tools with which they will be provided to accomplish their jobs. An assessment will help here, too.

………………

What we have discussed in this week’s blog is merely the tip of the iceberg when it comes to the information that can be gleaned from an IT Network & Security Assessment. For a deeper look, we recently published a full white paper called The Value of an IT Assessment and we suggest you take a look. We believe you will find it eye opening.

At DynaSis, we have been providing managed IT services for more than a quarter century and we would love to start a discussion with you, so please give us a call at 678-373-0716.

The results of two recent surveys indicate that computer network support professionals working for “enterprise level companies” agree that a company’s own employees are often its weakest link in protecting against cyber-crime. (For specifics on these surveys and more information on the subject of employee training in general, read our White Paper on the subject.) So, as an owner of executive of a small to mid-sized business, consider this: if this problem is so prevalent in these enterprise level companies with large IT departments, where does this leave you?

It is well-known in computer network support circles that in this day and age of cyber-criminals who are relentless in their development of new ways to attack virtually everyone’s IT network that employee training is a key element. It is also known that careless and / or unintentional employee actions are the number one access point for these criminals. While all the other forms of network protection are still vital, employee education remains one of our best safeguards.

Here are some notes on areas that employees need to be taught, and then on which to be continuously reminded and updated:

Unbreakable Password Protection

Computer network support professionals are amazed at how many people still use easy to break passwords. Criminals use algorithms that can rapidly test millions of possible passwords, so if they have a reason to guess at part of a password, finishing it becomes a real possibility. Larger companies install protections against this, including automated requirements for regular changes as well as strong parameters. Try this. Current thinking among these computer network support people has changed from combining letters, number and characters, to letters only. Here’s why: if you combine three unrelated words of five letters each, (for example: househumanroses) those fifteen letters give you 1,677,259,342,285,730,000,000 possibilities. That’s 1.6 sextillion. And that’s only using lower case. Imagine if you mix upper and lower.

Downloading Unauthorized Software

Another activity that drives computer network support people crazy are the many software programs that can be downloaded for free with a simple mouse click. While many are truly useful, others may launch very destructive malware, including ransomware that can lock down an entire IT network.

Phishing and Spear-phishing – Social Engineering

These are tactics used to trick people into divulging sensitive information. You may not fall for the plea for assistance from the Nigerian Prince, but many people are fooled by realistic looking fake emails from banks, utilities, charities and others. One specific word of caution: the IRS never calls and never sends emails.

Social Media Scams

Fake Twitter Accounts: We all make typos. Studies show that a small percentage of people will inadvertently make mistakes and not correct them when typing. If you mean to send a tweet to a company called ABC123, but type ACB123, there may well be a fake account out there with that name, set up to trick you. These scam artists will set up hundreds of these accounts (ABD123, ABE123, ABC 123, etc.) to benefit from your mistakes.

……………………….

The reality is, there are too many ways that employees can make mistakes or be fooled to cover in this blog, so, again, we refer you to the white paper we wrote on this subject. Once you better understand the risks, you can set up training programs for your people. If you don’t have an in-house computer network support team to conduct employee training classes, speak with us here at DynaSis. We’ve been doing it since 1992 and would love to do the same for you. Call us today at 678-373-0716.

Most companies these days allow, or even insist, that employees use one or more of their own devices for work. Rather than causing resentment, the majority of employees actually prefer using their own phones, tablets or laptops, rather than having to carry two of the same type device. They are comfortable with the devices they understand and are probably upgrading them faster than the company network support team would be doing, thus giving both the employee and employer the benefit of more current technology.

That being said, there are concerns that many employees have, some real, some perceived, that must be addressed and, additionally, network support and security for devices the company doesn’t own can be challenging. On the employee front, those who are required to use their own devices often feel they are losing privacy, including the possibility that their personal information may be accessed. This can be overcome with adjustments on the network support side and explanations (in lay terms) to the employees.

We won’t get into too much technical detail here, but on the employer’s side the issue of keeping company data secure demands serious consideration. This requires the creation of an “Acceptable Use Policy”, but please keep in mind that policies like this are only helpful if they are enforced.  (If you want more information about BYOD policies, check out our White Paper on the subject.) If you are going to allow or require BYOD, here are some guidelines on how to begin:

Pilot Program

Start small. If you only have a few employees, you may want to include everyone, but if you are mid-sized and growing, limit the participants until you’ve got the bugs worked out.

Involve All Constituents

A strong BYOD policy will involve every department in the company: sales, marketing, HR, finance, R&D, etc. Make sure people from each of these are involved in the set-up and roll-out discussions.

Employee Training

Employee training today is important in many areas of cyber security. Employee email accounts are the number one source of access for cyber intrusion of all types. BYOD is no different. This is an important network support issue.

Industry Specific Security

PCI, HIPAA, GLBA, DSS and others. You don’t want to be 100% in compliance in-house, then fail to keep employee devices adequately protected.

Device Level Security Isn’t Enough

Proper network support and security requires multiple defense layers. Hard as you try, you may not always be successful in keeping every device secure, so your network must provide protection for this.

Additional Costs

Yes, by asking/allowing your employees to use their own devices, there will be savings, perhaps substantial. However, there may also be additional expenses to install updated infrastructure technology. All in all, however, the switch should help your bottom line.

Again, if you would like to learn more, check out the White Paper, or, even better, give us a call. We have been providing IT network support for more than 25 years and would love to chat with you. Call us today at 678-373-0716.

Cybercrime complaints to the FBI exceeded 300,000 in 2017 with an estimated loss of almost $1,500,000,000. The thing is, the Department of Justice estimates that only 1 in 7 criminal incidents are ever reported. That brings the estimated totals to 2,100,000 incidents and $10,500,000,000 in losses. Why is that?

First of all, if you believed you caused the attack because of an error in judgment, chances are you aren’t going to be so fast in letting anyone know. Neither would your employees. Now, very few employees, fortunately, are going to actively work at allowing cyber intrusions into your network, but simply clicking on a deceptively realistic looking phishing or spear-phishing email can open the door. Companies with effective in-house or managed IT support providers can usually determine whose mistake it was, but for many small to mid-sized businesses, the unintentional culprit will never be found.

But in some ways, that’s beside the point. The point is that your employees should have been well-trained enough that they aren’t susceptible to this kind of fraud.

If you are the boss and you know about the cyber break-in, your attitude may be that it’s unlikely that the perpetrator will ever be found so why bother? You are also way more likely to pay a ransomware demand than report the crime. It just seems easier. Except that in about 20% of the cases, the de-encryption code you need to unlock your files either never arrives or doesn’t work. This 20% would have been much better off dealing with prevention than with trying to rectify a really tough situation.

There is another growing area of cyber-crime, although it is not committed through entry into your IT infrastructure. This is IT support fraud and in 2016 there were more than 10,000 cases reported. Again, law enforcement believes the 10,000 are the tip of the iceberg. The reported losses were $800 each on average. Most of these were perpetrated against individuals, not businesses, but in today’s work-world, with many people using their own devices for work, sensitive business information that resides on an employee’s personal laptop may be stolen and used for illegitimate purposes.

The gist of this blog is to encourage two things: first, report all cyber-crime. You can never tell which case will be the one to break open a crime ring. Second, make sure your employees are well-trained in cyber-crime prevention. Fact: most ransomware and other malware intrusions are caused by employee errors that can be prevented.

Need more info? Try this article we published not too long ago, or, better still, give us a call at DynaSis at 678-373-0716

 

Many people are surprised to learn that today’s number one cyber security threat is email. Deeply concerned about all levels of IT security, we recently published a white paper analyzing the various threats and how to thwart them, as well as how we here at DynaSis work to make our clients’ email accounts secure. In this white paper, we went over things like “zero trust” and how effective current phishing and spear-phishing techniques have become…and how to protect yourself by educating your employees.

Zero Trust as a Security Model

This is a critical part of email security in today’s world. Sorry. It might sound unfriendly, but when we trust no one, we are more vigilant. It’s not that we don’t trust people’s integrity, especially when it comes to our most trusted employees, it’s that we simply don’t have the luxury of trusting their judgment when they are up against brilliantly (unfortunately) crafted schemes designed to inflict harm. This is especially true in this world of BYOD (Bring Your Own Device To Work). Not only are the bad guys trying to work their way into your system through your company-owned devices, they are also working on getting in through the personally owned devices your people are using to access the company network.

In addition to phishing and spear-phishing (including expanded definitions), we go over email spam, viruses, malware, ransomware, social engineering and state-sponsored hacking. And we remind you, as we do here, that all this can start with a simple, single email.

Best Practices

But we don’t just leave you hanging. We review “best practices” and how they can be used to keep the bad guys out. We go over specifics like auto-listing, RFC check greylisting, global reputation checks, recipient validation & active directory, anti-spoofing, email firewalls, and policy controls. Whew! That’s a lot of stuff, but it’s all important.

Mimecast

As a managed IT support provider and after reviewing all the software available (and with 25 years-experience, we are experts at conducting reviews) we have chosen Mimecast for our clients. You can click here to check out Mimecast on our website, or here to read about it in our white paper. Check out our entire website at www.DynaSis.com, or better yet, give us a call today at 678-373-0716.

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram