Sales: 678.967.3854
Support: 866.252.6363
Trough window glass. Designer brainstorming new ideas

Millennial generation workers...give them the technology tools they need, and your rewards will follow.

With the millennial workforce growing literally by the day, employers need to keep up-to-date with how these people function and think. While you may be thinking, “Why should I adapt to them? They’re going to work for me?” the reality is that they are not alone. Not only are they going to become your workforce, and you want the best of the best, they represent the likes and dislike of the millennials who will also be come your clientele.

Unlike traditional workers, they don’t always believe that work needs to be accomplished during the standard 9 to 5 work day, nor necessarily within the confines of your office walls, nor does it have to be Monday through Friday.

“What difference does it make where or when I do the work, as long as I get the job done?” More and more, the answer is: it doesn’t…as long as there are proper channels of communication. Enter mobile computing and BYOD (bring your own device) that lets people work from anywhere at any time while staying in touch and having full access to whatever work files they may need.

Right now, more than 85% of millennials have smartphones, whether iPhones or Androids, and it has a major effect on how they communicate with co-workers and superiors. A recent study showed that 41% prefer communicating electronically rather than by speaking over the phone or face-to-face. In fact, 59% said that an important consideration in whether or not to accept a job was whether or not the employer was going to provide state-of-the-art technology. This is so even though many admitted using their own devices right alongside the technology the company supplied. (This writer is writing on his own MacBook right now, which is sitting alongside the perfectly fine computer provided to him. I use both)

If you want to stay ahead of the game, you have to adapt your IT policies accordingly. Modern workers expect modern communications built into a technology ecosystem that may include things like social networking, instant messaging, blogs, wikis, and video on demand. This isn’t for fun and games. These tools are what enable the millennial generation instant connectivity and engagement with co-workers, superiors and customers. Ultimately, they enable these workers to be happier and more productive in their jobs and relate in a more meaningful way to the customers of their own generation. These tools also elevate their creativity and employers who cater to these needs are finding that the real benefit ends up belonging to the company.

DynaSis is an Atlanta managed IT service provider, in business for almost 25 years. DynaSis works with small to mid-sized businesses employing cloud technology where appropriate, and more traditional services when required. We have also been on the forefront of cyber security as well as helping businesses become truly digitized, so they can be the beneficiaries of digital disruption, not the victims.

Manufacturing worker using digital tablet at work

Manufacturing employee using cloud-based tablet on the floor of the plant

A recent article in Forbes Magazine highlighted how technology is impacting the manufacturing industry. Among the other points it raised, it noted that surveys had found that:

From the survey results, based on the responses of almost 200 manufacturing companies ranging from food and beverage to automotive, it is obvious that the age of “connected” manufacturing, and IT management is here. This connectivity gives them a here-to-fore unavailable agility that enables them to work better with both suppliers and customers. On one hand, this affects management of the supply chain, and on the other, both innovation of new products and quality of existing ones. Interestingly, although we hear so much about the contraction/consolidation of manufacturing in this country, 90% have reported that they have actually grown over the past five year. The Cloud has also allowed more than 10% of the respondents to become actively engaging in “re-shoring”, the reversal of off-shoring…in other words, bringing their manufacturing, in full or in part, back to the United States.

Almost 3/4s of the companies state that use of the “Cloud” is giving them superior insight into their overall businesses and a full 90% say that they now have better access to company data. They are also reporting better communication with suppliers and customers, as well as with transportation vendors. By the end of the coming year, four in ten expect to be using big data analytics, or be well along in the planning stages of doing so.

The majority has stated that use of the “Cloud” improves their ability to deal with fluctuating customer demands and the consequential fluctuating supply chain needs. This allows them to become more customer-centric, something required by the upswing in customer-driven commerce.

Over the next five years, approximately two out of three of these manufacturing companies are looking at cloud-based technologies to: 1) increase connectivity with their supply chains, 2) improve their quality assurance programs, and 3) build upon their communications capabilities between plant and enterprise.

All-in-all, it is safe to say that the age of “connected manufacturing” though IT management has arrived.

DynaSis is an Atlanta based managed IT service provider and has worked with a variety local manufacturers since its inception in 1992. DynaSis world-class data center provides safe, reliable and economical cloud computing service to its clients. www.DynaSis.com. 678.218.1769.

Smart phone holding in female hand, blured background. mockup

Did you ever wonder how safe it was for you to be sending passwords or secret codes via airwaves through WiFi or Bluetooth? It can be a problem in that these transmissions can be susceptible to hacking and, once intercepted, the codes are susceptible to having the encryptions decoded. Well, a team of researchers…consisting of electrical engineers and computer scientists…at the University of Washington, believe they have come up with a solution with what they are calling “on-body transmission.”

Your cellphone fingerprint sensors and touchpads on many computer devices generate low-frequency transmissions that they have harnessed to send secure passwords through the human body.

“Fingerprint sensors have so far been used as an input device. What is cool is that we’ve shown for the first time that fingerprint sensors can be re-purposed to send out information that is confined to the body,” said one of the lead scientists, Shyam Gollakota of the U of W.

First results show a much more secure way to transmit authentication data to any number of devices, as long as the transmitting device, such as your smartphone, and the receiving device, such a medical equipment, are both touching your body at the same time. Your smartphone confirms your identity when you type in your password and transmits this to the other (in this case medical) device. This is accomplished by leveraging the signals that the smartphone is already generating.

The sensors in most up-to-date smartphones receive data about your fingers. The researchers came up with a way to instead use this data as output that ties in with data in your password. When used in a smartphone, this authenticating data actually travels securely through your body to the device seeking to confirm your identity. Among other uses, medical devices are high on the list. For example, this technology can be used to confirm identities before sending or receiving data from insulin pumps or glucose monitors.

As a managed IT service provider, we are always interested in new technologies, particularly those that involve security, often before the practical ways in which we will eventually use them for IT security are developed. It’s just one way we stay ahead of the pack. It’s early, but we believe that this may lead to a major shift in any number of security protocols. As for accuracy, the U of W researchers have tested the technology using a wide variety of devices, on people of various ages, weights and heights, and while sitting, standing, moving and even sleeping. They even tested it on various parts of the body – head, hands, feet, etc. The technology worked in all tested situations. Again, this process is still in its infancy, but the early results are very promising.

If you are keeping up–to-date with the latest on ransomware attacks making the news these days, you may be aware of a newly discovered insidious piece of malware called Satana. Satana appears to be an offshoot, or third cousin, of another ransomware Trojan named Petya, that has kept IT security professionals on their toes in their ongoing battle to stay one-step ahead of the cyber criminal.

Here is what makes Satana more difficult to deal with than the older Petya: In order to do its evil deeds, Petya needed help from a second Trojan called Mischa, which then attacked the computer’s master file table and encrypted files that it was able to access through that table. Satana is much more self-sufficient and is perfectly capable of encrypting files on your computer without any help. More than that, instead of attacking the master file table, it attacks the Windows Master Boot Record, which not only corrupts rebooting, but also inserts code directly into the booting process. Users have no way of knowing that by simply rebooting their devices, they are unleashing this malware throughout their computers, infecting the devices and encrypting file after file.

The first clue comes as a ransom demand that starts:

“You had bad luck.” It then goes on to let you know that your files have been encrypted and that to free up these files you have to send them an email, with your personal code, that they so thoughtfully provide. Of course, the instructions continue on, explaining that you will also have to pay the “ransom” of one half a bitcoin ($340). And all this appears on your screen in bright red text on a jet-black background. The whole thing looks like pure evil, which, of course, it is. Some very smart people spent a lot of time and effort figuring out how to steal your money.

The amount of the ransom can vary greatly. This is very smart. The amounts they charge (steal) are usually small enough that it makes more sense for you to pay the ransom than try and fight them. A larger company may be asked for several thousand dollars while a small one, as in this instance, just a few hundred. Smart and effective.

On the other hand, while the $340 (or more) may not concern you that much, there may be considerable downtime that can have a very adverse effect on your business.

Kaspersky Lab, a consumer-oriented developer of anti-virus, anti-spyware, anti-spam and personal firewall products with more than 400,000,000 customers world-wide, has called Satana the “ransomware from hell.”

As for “good news”, Satana is still new and not yet widespread, and weaknesses and errors in its code have been discovered, so IT security researchers and managed IT service providers are working on methodology to severely limit its effects. It is still unknown how the virus will morph and what long-range problems it may cause.

The good news, for the time being, is that Satana is currently in its infancy stages; it is not widespread, and researchers have uncovered errors and weaknesses in its code. On the flip side, it appears that Satana is positioned to evolve over time, and with its comprehensive method of attack, it has the potential to become the next major threat in the ransomware world.

As always, follow the basic rules of cyber security:

·    Make sure your data is backed up regularly

·    Do not open email attachments unless you know who they are from

·    Have your IT service provider install both Crypto-Prevent and Crypto-Containment software. Crypto-Prevent keeps known viruses out. Crypto-Containment is a newer development. If a system does become infected, Crypto-Containment identifies it quickly and immediately locks down the infected files, preventing further spread of the infection. These files can then be deleted and replaced from the backup.

DynaSis is a managed IT service provider, serving the small to mid-sized business community for a quarter century. We have been at the forefront of cyber-security for many years and have been instrumental is developing methodology for fighting all forms of malware that is now used across the country.

 

girl-support-desk-1024x683

Being unable to receive technical support when they need it is not only frustrating to your employees, it hurts your business. Your sales people can’t sell, your customer service team cannot provide the assistance your customers need, and the security of your I.T. infrastructure may be at risk.

Your onsite IT administrator can be pulled in a variety of directions including addressing mundane, routine computer and network issues instead of focusing on the bigger picture. The answer: you may be better off using a managed IT service provider to take over you IT Helpdesk chores. Here are some of the reasons:

Benefits of an Outsourced IT Helpdesk Team

1: It can save you money. Lost sales, disgruntled customers/clients…these cost you money, as do unhappy employees. This is particularly true if your client base covers more than a single time zone so that you have people working outside of the typical 9 to 6 time frame.

2: Increased productivity: a good managed IT service provider will have well-trained helpdesk personnel who can quickly resolve the vast majority of issues. They should also have the resources to escalate problems they cannot complete within a short period of time.

3: Fixed monthly fees. A managed IT helpdesk provider can also save you money on fees. Instead of paying for an in-house support team, or bringing in an expensive “break and fix” repair company for each problem, you effectively share this expense with a number of other companies who are using the same service.

4: Frees your IT executive or administrator to focus at improving your IT processes and high level support while the helpdesk team can put out the day-to-day “fires.”

5: Easy contact – single point of contact – always there. No one is always in the office. Your IT admin takes days off, even weeks, has business away from the office, and has days he comes in late or leaves early. Conversely, your outsourced IT helpdesk team is always there, 24 x 7, and can be found at the other end of the line by calling the same phone number anytime.

6: Wider range of expertise. The Information Technology field is so wide-ranging, complex and diverse today that no one person, or small team of people, can possibly have the answers to all the situations that arise. A good IT provider will not only have the helpdesk team, but also a cadre of highly trained IT executives who can provide technical support and advice in a broad range of situations.

Technology today is always changing and always challenging. Choosing the right helpdesk service can make your workplace a more enjoyable place to be, taking the burden off your IT admin, and reducing stress for all your employees.

DynaSis has been providing helpdesk support to Atlanta’s small to midsized business community for a quarter century. The company’s team of 55 professionals, including more than 30 engineers, also provides full design and installation service, along with remote 24 x 7 monitoring and managing of IT infrastructure. DynaSis provides full cloud service, along with traditional onsite solutions, and hybrid systems to match any business’s needs.

Current VoIP systems offer a lot. They speed up communications; they reduce downtime; they are easily scalable; they reduce costs. But we find that not everyone uses all the features these modern systems provide. Unlike older telephone systems, there are a number of built-in, easy-to-use features, so neglecting to use them is, simply put, a mistake. One of these is music/message on hold. Proper use of this feature can be a big determining factor in whether your prospect/customer hangs on during a long hold, or hangs up and calls the next company on his list.fonality-phones-1024x512

But there is more to it than that: you are given the opportunity to do several things. First, put the caller in a good mood by using the right upbeat music. Second, make a generic pitch as to why your company is a leader in your field. Next, promote specific products or services being offered, especially sales and promotions. Finally, tips (including tech tips) on best ways to use your products.

Whether the message is attempting to influence a purchase, or just entertain the person on hold, your primary end result is to keep them on the line.

Let’s talk about music.

Yes, everyone’s taste is different but common sense will lead you to the right decision. If you are dealing with a younger audience, you probably don’t want Tony Bennett (if you don’t know who Tony Bennett is, then you are part of that audience, yourself!) If your customers are baby boomers, then The Weeknd is likely a poor choice (no, that’s not a typo.) In general, keep it middle of the road, current, and uplifting. You are not trying to make a social point, be politically incorrect, or be cool. One other point: if your callers tend to call in frequently, and if they are generally put on hold, consider changing your music regularly. (You can upload multiple tracks and set schedules.)

Sales & Marketing

As long as you make the message entertaining, why not use this time to promote your company and/or a specific product or service. If you run radio or TV ads, pick up where they left off. Just try and make the message a little different so you aren’t faced with a subconscious: I’ve heard this already…I’m just going to tune out.

Your VoIP system probably has the ability to store multiple messages that can be scheduled, (like the music) to keep it interesting. Another trick is to string multiple messages together, then set them on a loop so that people are likely to hear different messages each time they call. And remember, a little humor is a good thing.

If you have interesting statistics that either highlight the benefits of your products/services, or how well your company is performing, you can add these.

You can also set the system to play different on hold messages for different incoming lines. For example, you may not want the same message playing on the Sales line as on the Customer Service line.

Learn More

If you want to learn more about all a VoIP business telephone system can do for your business, download our White Paper: "Your Telephone System as a Business Building Asset"

………

The point is, as part of your VoIP telephone system, you have an opportunity to enhance your prospect’s/customer’s experience with you, and that is always a good thing. If you think your company may be ready for a telephon system upgrade, give us a call. 678.218.1769

glossary-large-768x512

Yes, this is the age of IT Jargon. It seems that even things we have done for an entire lifetime now have new terminology. We used to “turn off” an electrical device. Now we “power down.” LOL used to mean lots of luck. Now it stand for laughing out loud. So here are some of the more commonly used technology terms that you should know:

Malware

Malware is a term used to identify software that is intended to damage or disable computers and computer systems. This include viruses, which is software designed to keep replicating until it has infected and/or destroyed a network. But viruses are not the only type of malware; any software intended to do harm is malware.

Ransomware

A type of malware that will lock down (encrypt) all or part of a data base until a ransom fee is paid and the “key” to unlocking the system is provided.

Intrusion Protection

Currently the most effective means of protecting a system from malware, it sits inside the firewall and identifies suspicious files before they can cause infection, then shuts it down before it can cause damage. Essentially, it stops the intrusion before it happens.

Crypto Containment

Software that identifies the first instance of encrypted files and quarantines them to prevent the spread of the malware. This keeps the network up and running and makes recovery of encrypted files much quicker.

Social Engineering

Simply put, social engineering is the tricking of people to give up sensitive information using any number of schemes. For cyber thieves, if they can trick you into giving them the information they are looking for, they don’t need to create complicated software programs.

Phishing

A common form of social engineering these days is phishing…they put out the bait and try and hook you. Common occurrences, often called "spear phishing" because they target people and companies directly, include fake emails from banks, insurance companies or the IRS. Just so you know, none of these institutions will ask for sensitive information via an email. Another good piece of advice: if you don't know the sender, don't open it. And more: if you DO know the sender and they are asking for personal information, assume the sender has been hacked and this email is a phishing attack. Just delete it and advise the real owner of the account. He/she may want to alert others on his/her contact list.

Anti-Virus

This software scans your hard drives to find and stop well-known viruses. The key word here is “well-known”.  Sometimes people believe that anti-virus protection is total and complete. It is not. It is only part of the solution. If a virus hits a computer before that virus is identified and added to the anti-virus protection, the software will not stop it. This is known as a…

Zero Day Attack

The most dangerous time to be attacked by malware is before it has been unearthed by cyber security experts. As we said above, anti-virus protection will not work. This is called a Zero Day Attack. This is where Crypto Containment (see above) and Redundant Data (see below) become invaluable.

Patch

As the name implies, this is a fix for vulnerabilities or “holes” a software company discovers within its code. This is important because the bad guys are always out there looking to exploits these gaps, always finding new ones, so be sure to download the updates you receive for your software.

Redundant Data

The reality is that no matter how much protection you have, there is still a chance an attack can get through. Top managed service provider

s have seen as much as an 80% drop in successful attacks over the past year, but some really smart criminals never stop trying to find a way in. When that happens, Redundant Data, another term for backed up data, is vitally important.

While there is no longer any question about the need for I.T. in business today, in many companies there is still the perception that information technology is more of a cost center than a valuable business asset. CFO magazine, in a recent survey, reported that almost 50% of CFOs felt that there was a misalignment between what the business needed from I.T. and what I.T. was providing.

This highlights the importance of CIOs, or whichever company executive is responsible for the company’s I.T. performance, CFOs and other top executives working together, often with the company’s managed IT service provider, to ensure that I.T. is providing the services the company needs. I.T. done right can be a powerful business tool that can help virtually any business thrive and prosper, but if not handled correctly, can just waste time, money, effort and become a true drag on business growth.

In fact, we believe that a business’s I.T. needs to be run like a business itself.

Here are some things you can do to make sure your I.T. is functioning at a high level, not just in terms of stability, but in terms of fulfilling your company’s needs:

1: The employees of your company are I.T. “users”, but they are also the “customers” of the I.T. department. Whether your I.T. is handled in-house, out-sourced through an IT service provider, or co-sourced (a third party augmenting the in-house team), the users should be treated as valued customers and their needs met.

2: On the other hand, there needs to be ongoing employee IT training for several reasons, including: not wasting the time of the I.T. department, not putting company data and infrastructure at risk, as well as enabling each employee to get the most out of all that I.T. offers. At too many companies, employees continue to use outdated methodology with which they are comfortable, when a few minutes, or hours, of getting comfortable with new technologies will make them more productive and more valuable to the entity paying their salaries.

3: Where feasible, actually create a system of charging each department for the IT services it uses in order to give each department head an understanding of the cost vs value relationship.

4: Take a good look at strategic co-sourcing or out-sourcing certain I.T. functions. As smaller businesses grow, this can provide your company with the ability to expand I.T. functions without the need for additional full-time employees. A good I.T. partner will have team members trained in many vital technology areas, a knowledge base that would be hard for your company to achieve on its own.

5: Finally, never stop analyzing and measuring performance with your goal being continual improvement.

Well-conceived, developed and managed IT can cut costs, increase productivity, decrease risk and drive growth, all leading to improved profitability. But to do this, IT and the rest of management must work together to determine the services each of the other departments needs…again, treating these company employees like customers. A company with a positive I.T. culture will constantly be looking for new projects that can help drive the business forward. It is this attitude that takes I.T. from “expense” to powerful business building “asset”.

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premises managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

The ROI of Outsourcing

By the DynaSis Team

If you are a small or midsized (SMB) business owner, how many times have you wondered, “Would it be less expensive to outsource a job rather than to retain staff in house?” For some functions, such as legal advice or trash collection, outsourcing is an obvious choice. For other roles, ranging from accounts receivable to marketing and beyond, the evaluation is more difficult.

A variety of “resource costing” tools, which SMB owners can use to calculate the hard costs of many functions, are available online (see one example, here). To arrive at a figure, most determine the time it takes an employee to perform relevant tasks and then multiply that number by the blended (pay plus benefits) rate for the job. Some include other factors that might be minimized or eliminated by using a professional (or an automated solution) to perform the work. These include the cost of space, supplies, and training, and even the cost of errors or other failures. Once the total cost is determined, SMB owners can compare it against the quote from a third-party provider to determine if there is any savings.

The problem with this approach is that it cannot account for benefits that are not quantifiable, nor can it project the gain or loss from things that do not happen. In our experience, nowhere are these intangibles more prevalent than with outsourced IT.

As a professional cloud and managed services provider, we sometimes hear from SMB decision makers that having in-house IT staff is less expensive than outsourcing IT services and IT support.

Invariably, the business leader is making his or her calculation based on hard costs, alone. They haven’t considered financial impacts that cannot be quantified or predicted. Consider these two examples:

With IT solutions, there are many such variables that firms should consider when determining the ROI of outsourcing. Following are just a few:

Although highly competent, in-house IT professionals can minimize some of these issues, those workers  come at a high price. Furthermore, rarely can SMBs afford to keep their IT staffs fully updated on all certifications and training. As a result, most lack the know-how to deploy the automated monitoring and maintenance solutions proven to substantially reduce downtime compared to traditional IT approaches.

For some business functions, keeping the work in-house may be the most cost-effective approach. For many others, and especially for IT, outsourcing provides strategic business advantages that are beyond the reach of SMBs with in-house staffs. Increasingly, progressive SMB owners are recognizing the value of assigning critical functions to the experts.

For small to midsized business owners and executives who are concerned about managed IT support services and network threat protection, DynaSis is one company that has been at the forefront since 1992. In this ever evolving world of cybercrime, crypto virus and network access protection have become critical to every company’s security. DynaSis also provides 24 x 7 x 365 outsourced IT services, with its own trained staff for helpdesk, real-time monitoring and the DynaSis Business Cloud, for highly secure data storage and backup. You can find out more by calling us at 678.218.1769, or checking out our website at www.DynaSis.com.

[featured_image]

By the DynaSis Team

On Tuesday, June 14, 2016 from 12:00-2:00 pm, the DynaSis Team will host an Open House at its new headquarters, located at 950 North Point Parkway, Suite 300, Alpharetta, Georgia. All of DynaSis customers, partners and associates, as well as local media, are invited to attend. At the event, one of our favorite local barbecue restaurants, ‘cue, will serve a luncheon to all attendees.

DynaSis’ move marks a milestone for our organization, as we have not only doubled our size but also expanded our systems to enhance the IT support and IT services we offer our customers. Recognizing the increasing challenge that small and midsized businesses (SMBs) face in today’s technology-centric, threat-laden landscape, DynaSis has taken significant steps to ensure it will remain the area’s most proactive managed services provider in coming years.

A recent study of IT security among SMBs, conducted by Wakefield Research, found that only 37 percent of IT decision makers felt their organizations were fully prepared to manage IT security and protect against threats. Equally concerning, fewer than 25 percent have a dedicated, in-house cybersecurity team or individual. Improvements we have incorporated into our new facility to directly address these shortfalls for SMBs include:

During the event, visitors will have the opportunity to meet some of the DynaSis Team as we lead guided tours that showcase our new offices and equipment and explain the inner workings of the Managed IT Services model. As a thank-you to the Atlanta community for its years of support, we will also donate $10 to the Atlanta Community Food Bank (ACFB) for every Open House attendee. For the convenience of attendees, we can accept donations of canned and boxed goods and forward them to the ACFB on donors’ behalf.

For more information, or to RSVP, please email events@DynaSis.com

For small to midsized business owners and executives who are concerned about managed IT support services and network threat protection, DynaSis is one company that has been at the forefront since 1992. In this ever evolving world of cybercrime, crypto virus and network access protection have become critical to every company’s security. DynaSis also provides 24 x 7 x 365 outsourced IT services, with its own trained staff for helpdesk, real-time monitoring and the DynaSis Business Cloud, for highly secure data storage and backup. You can find out more by calling us at 678.218.1769, or checking out our website at www.DynaSis.com.

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram