Sales: 678.967.3854
Support: 866.252.6363

[featured_image]

By the DynaSis Team

In his recent article, DynaSis President and Founder Dave Moorman detailed how modern, up-to-date technology minimizes risk. This was a “broad strokes” piece, so he focused on big picture items, such as how high availability reduces the risk of business loss from outages, and how robust security mitigates the risk of—and damage from—cyberattacks. The article, “Technology Outcomes Every C-Level Executive Should Expect,” is a great, quick read if you haven’t downloaded it yet.

To compliment Dave’s efforts, we wanted to drill a bit further into this issue. When you really examine how businesses operate today, it is amazing how much modern technology is minimizing risk. Consider, for example, a company whose operation is reliant on a functional, predictable supply chain.

A recent survey found that mitigating risk is the single biggest challenge—and one of the highest priorities for—supply chain executives. When a company relies on trading partners that may be located around the world, technology can play a crucial role in fostering better collaboration and information exchange to keep executives abreast of supply chain efficiency. Automation technologies, including not only manufacturing, packaging and handling automation, but also information automation, such as shipping delay notifications, are further improving the efficiency and visibility of the supply chain. None of these advantages were available a few decades ago.

Of course, not every company lives or dies by its supply chain (even though most require supply chain reliability at some level). For all firms, there are other specific examples of how modern technology helps to minimize risk. Following are some of our top picks:

Technology also reduces risk in a million others ways, from ensuring employees and executives receive urgent messages (mobile messaging) to helping organizations hire more safely (Internet, social and news media searches). The list goes on and on.

When you think about it, there are very few aspects of today’s corporate environment that are not improved by, and even dependent upon, technology. The question then becomes, how effectively is your firm leveraging this gift? No matter where your firm stands, in terms of technology adoption, we promise there are more improvements awaiting you.

About DynaSis

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

By the DynaSis Team

[featured_image]

In his most recent article, “Technology Outcomes Every C-Level Executive Should Expect,” DynaSis Founder and President Dave Moorman details the three fundamental benefits of technology: increased productivity, reduced expenses and minimized risk. Dave does a great job of illustrating how technology achieves these goals, so for this article, we will just reiterate one truly vital productivity enhancer, and then give you the "freebies" we promised in the title.

Information technology (IT) has been helping employees and business owners execute tasks in half the time—or less—than it typically took them before PCs, the Internet and other major productivity enablers. That’s a given, so the question then becomes, how do they make that result even better? As Dave mentioned in his article, one of these enablers is availability, which is crucial to productivity in today’s business environment. If your systems are down all the time, it's a no-brainer that your productivity is being reduced. But, even the difference between 99% uptime (which sounds impressive to the uninformed) and 99.999% uptime is significant. (We covered this issue in more detail in our Availability blog, which you can read here to explore the topic further.)

At a 99% uptime level, you can expect 3.65 days of downtime per year. At 99.999%, you can anticipate 5.26 minutes. Of course, all that downtime might not occur during business hours, but if your business sells products or provides information online, or your employees work during off-hours or other time zones, your exposure increases significantly. Consequently, the easiest way for any business to increase productivity is to contract for the highest possible uptime, period.

Now, it's time for the freebies. Here are a few simple ways your business can start increasing productivity through technology without spending a dime.

Automated Reminders:  Ensure all your employees know how to use their calendar appointment and reminder functions and encourage them to use them. These are helpful for more than business meetings. Every time an employee doesn’t stop what they are doing to accomplish a forgotten task on a rush basis, the result is increased productivity. Reminders are great for everything from prospect follow-ups to ordering supplies for the break room. They can also remind your personnel to leave the computer to move around, which might save their lives.

Once personnel start using reminders, they will see how valuable they can be. Encourage them to explore other systems and platforms that provide reminders—or allow advance scheduling of tasks—and make use of them, as well.

Get Smart:  Rather than falling back on “I Don’t Know” as the answer to a question, or emailing other personnel and waiting for a response, encourage employees to perform Internet research first. If a question involves confidential company information, this might not work, but in most other cases, it will. If a salesperson is preparing a quote, for example, and needs to know the company's employee count or annual sales volume, they can likely find that information in five minutes, online. Writing targeted search queries to exclude irrelevant results takes a little practice, but there might be a search guru in your office that can teach others.

Leverage Other People’s Work

One of the most valuable aspects of technology is its ability to make solutions available to others inexpensively. From better financial tracking and management to faster presentation development with pre-built components, there are a multitude of “software as a service” (SaaS) programs that make your business efforts more productive—and in some cases, more impressive as well.

Many of these are inexpensive or even free. For faster, better presentations, for example, try Prezi, which offers a lot of content at no charge. For more ideas, check out this list of business-boosting technology tools from Inc.com.

About DynaSis

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

 

By the DynaSis Team

[featured_image]

DynaSis Founder and President Dave Moorman has released the second article in his IT for the C-Suite series, a collection of articles that details how business leaders and other C-level executives can use technology to improve business agility, security and productivity—and power the organization’s success. “Technology Outcomes Every C-Level Executive Should Expect” details the three fundamental benefits of technology from Moorman’s perspective, and explores in detail why these benefits are so important.

Increasing Productivity: Maximizing the use of technology to enhance the business effort and foster great customer service.

Reducing Expense: Hosting and maintaining a modern, properly managed IT infrastructure to reduce technology overhead and potentially shrink the organization’s ownership and management footprint for both technology and physical space.

Minimizing Risk: Implementing a cloud-based model to make it statistically impossible for corporate assets to be destroyed or displaced by a single event business.

Moorman illustrates his point by briefly discussing some of the world’s great business success stories—entrepreneurs who created an incredibly successful business model by relying almost exclusively on technology.

Backed by credible statistics and reports, Moorman offers solid advice on how technology helps business leaders achieve these three goals, and why it is so essential for them to place appropriate emphasis on technology. He also helps them envision how they can start leveraging technology to realize the advantages discussed in the article.

All of his advice, in this article and beyond, is designed to help even the most traditional operation become innovative and extraordinary—not only enjoying success today, but establishing the competitive advantage that is vital to ongoing business development and value.

By following the advice in Moorman’s article, C-level executives can help transform their operations into what Moorman calls “the Modern Business”—One whose leadership “embraces and leverages technology to deliver targeted, advantageous outcomes in the organization.” As he notes in this article, Moorman views technology not merely as an enabler, but literally as the fulcrum that provides leverage for success.

It’s a great read, and we hope you enjoy it! To download the PDF, use the link above, or click here.

About DynaSis

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visitwww.dynasis.com.

By the DynaSis Team

[featured_image]

In May 2014, a Bitglass survey noted that only eight percent of organizations had adopted Microsoft’s Office 365. All we can say is, “What a difference 18 months makes.” In January 2015, Office 365 became Microsoft's fastest growing commercial product ever, with the number of Office 365 commercial seats in use nearly doubling in the fourth quarter of 2014, compared to 2013.

In August, the media announced that Office 365 had overtaken Google’s productivity suite in adoption. Now, according to one recent survey, Office 365 is the most widely used business cloud application of any type, surpassing even cloud giants like Salesforce.com.

This is exciting, but the numbers are based on Microsoft licensing figures, which don’t always tell the whole story. At DynaSis, we have worked with numerous business leaders who license Office 365 with high expectations and then discover the challenges of migrating to the product completely. Email migrations, especially, are a big issue.

The good news is that with proper planning and execution, migrations to Office 365 can be not only complete but also nearly seamless. Over the course of a few hours, properly trained technicians can deploy Office 365 on dozens—or hundreds—of desktops. Email migrations can be clean and accurate enough to maintain compliance requirements. It’s all a matter of how the firm goes about the process.

To ask yourself if your firm has the expertise to tackle an Office 365 migration, consider these key tasks beyond selecting the most appropriate model for Office:

Not only is implementing Office 365 more involved than most organizations realize, but ongoing operation is also not hands-off. Companies must plan for post-migration Help Desk support, which includes not only answering questions but also resetting passwords, setting mailbox and/or folder permissions, and more.

With 48% of enterprises now using cloud-based productivity and email products, there is no doubt that the future of business productivity apps lies in the cloud. Companies shouldn’t hold off on adopting Office 365 due to fear of complexity and problems. Rather, they should prepare for it in advance and ensure all technical support resources, in-house or outsourced, are up to the challenge.

About DynaSis

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

 

By the DynaSis Team

[featured_image]

In the current corporate landscape, business continuity requires ongoing access to important company files, no matter what. No longer are customers willing to wait a week to receive a quote for a job or to have their order confirmed. The world operates in real time, and customers expect the businesses with which they work to do the same.

This need is leading many business owners to rely on real time data storage solutions that could actually hamper their business continuity in certain situations. To illustrate this point, let’s consider Dropbox—one of the most popular file storage services on the planet. Dropbox is an inexpensive way for organizations to store and share files among employees, customers and other authorized individuals. However, Dropbox has serious limitations from a business continuity perspective.

Dropbox has an easy-to-use mechanism to help users recover deleted files—or restore older versions—for up to 30 days (up to a year with Dropbox for Business Accounts). It also has redundant servers protecting customer data in the event Dropbox itself experiences a server failure.

However, for company personnel to make the most effective use of Dropbox, they must sync some or all company files to their local computing devices. To do this, during setup they tell Dropbox what data they want to store and sync locally. Most users share and sync folders rather than individual files, and these can become enormous over time as other users add files to them.

If local devices lack enough storage to stay in sync, Dropbox will stop syncing and prompt the users to reevaluate their Dropbox allocations, a process that wastes time and drains productivity. When users don’t have time or knowledge to manage those allocations, many will save their files locally, planning to upload them to Dropbox later. When that doesn’t happen, the entire system falls apart, along with any pretense of having a complete backup.

Second, most file storage and sharing services such as Dropbox (and Google Drive) do not offer end-to end-security. Files stored with them are encrypted on those servers, but they're not locally encrypted on the computers where they originate before being synced to the cloud, which also means they are not encrypted during transit. If a hacker has access to a user’s account or has penetrated the corporate network, he or she could easily steal company data unless the firm is using local encryption, which is a rarity.

The advanced file backup solutions offered by companies such as DynaSis will eliminate both of these challenges, and they can incorporate on-demand file access and sharing, as well. Productivity is maximized, and concerns about local PC and backup continuity are resolved.

In today’s threat laden environment, data protection is king, and ensuring it is appropriately secured and replicated is essential. We’re not saying that companies should avoid online file storage and sharing. Rather, we’re suggesting that business owners should work with a competent IT advisor that can help them determine exactly which file storage, sharing and backup solutions are right for their environments.

About DynaSis

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

 

By the DynaSis Team

[featured_image]

Although small and midsized businesses (SMBs) were a bit late to the cloud party compared to larger enterprises, several research reports indicate that SMB decision makers are now embracing the cloud enthusiastically. As we might expect from overworked, budget-limited business owners, they are expressing a preference for “bundled” cloud services, whereby an SMB can have its email, applications, data storage (servers) and security united under a single service with a single provider.

Such a solution makes complete sense from the SMB business perspective. Not only is it easier and faster to deploy the cloud with a unified solution, but company personnel enjoy access to business-critical applications and data without the bur­den of IT infrastructure support. Furthermore, the bottom line gets a boost from a fixed, pay-as-you-go model, including converting IT costs to an operating expense and eliminating infrastructure and software upgrade expenses.

So popular has this approach become among SMBs that a survey of 1,300 SMBs, conducted by Coleman Parkes Research, found that nearly 70 percent of SMB decision makers prefer to receive their cloud services as a bundle. SMBs expressed even greater support for having all communication-related services united. Among those surveyed, 80 percent supported the idea of receiving a single monthly bill from one provider for both cloud environment and telecommunications services.

So, what does a “bundled” cloud solution look like? Optimally, it would be a fully managed, cloud-based IT platform with the following features and functions:

Providers such as DynaSis offer solutions that meet all of these critieria, giving SMBs the freedom to walk away from IT burdens and headaches, forever. As SMBs realize the potential of these offerings, we expect a large percentage will move from supporting the concept of a unified cloud solution to actively using one. In essence, all-in-one cloud hosting is the best way to realize the core value proposition of the cloud, which is to deliver high-value applications and data securely, anytime, anywhere and on any device.

About DynaSis

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

 

 

By the DynaSis Team

[featured_image]

The technology world is filled with inscrutable acronyms, but two that seem to really confuse our customers are RPO or RTO – Recovery Point Objective versus Recovery Time Objective. Both metrics are crucial to data and system backup and recovery – and by correlation, to business continuity. Unfortunately, and not surprisingly given the confusion, business owners often don’t realize the importance of these two KPIs (key performance indicators) until their company has lost business or been placed at risk after a system outage.

When firms contract for backup or disaster recovery/business continuity services, they may assume their provider’s recommendation will meet their levels of risk. They may not ask the right questions to ensure sufficient protection. In reality, the level of data loss tolerance after a technology outage varies from company to company, and even from department to department within a single firm. There are ways to address these differences, but the time to consider them is before an outage, not afterward.

To get started, let’s explore these acronyms and why they are absolutely crucial for business survival. To the list we will also add MTO (Maximum Tolerable Outage), a less-commonly used KPI that is perhaps the most important of all.

Recovery Time Objective (RTO): This number reflects your goal for how quickly you would like to restore access to corporate data, applications, email and other IT systems after an outage. Could you wait a week and not suffer business losses or damage to your corporate reputation? Alternately, would you prefer to give personnel instant access to applications, data and email, perhaps through a secure portal on a computer or mobile device? Perhaps your level of risk tolerance lies somewhere in between?

Recovery Point Objective (RPO): This figure reflects the most recent point to which company data and applications would be restored after a data or system disruption or failure. Backup and disaster recovery solutions create periodic “snapshots” – mirror images of the assets being monitored by the solution. The most advanced systems take snapshots every few seconds, while others take them every few minutes, every hour, daily or even weekly. In the event of an irrevocable server or system crash, that lapse after the last snapshot is the amount of data you would lose forever.

Maximum Tolerable Outage (MTO): This KPI indicates the longest amount of time your business could be disrupted by loss of access to your data, email and applications before it would constitute a “disaster” for your business operations. Calculating your MTO is the first step in determining your data loss tolerance. Many business owners are surprised when they honestly consider this issue and realize how short of an outage their business could tolerate.

Calculating these metrics — called a Business Impact Analysis — is beyond the scope of this article, but we will discuss that process in the future. Many firms discover there is no “magic number” that will suit the entire organization. A company might be able to survive without a week’s worth of payroll data but wish to retain as many email messages and customer purchase orders as possible.

Fortunately, there are solutions that can accommodate different RPOs and RTOs within the same organization. Technology providers such as DynaSis have the tools and expertise to help business decision makers calculate their data loss tolerance accurately and eliminate unpleasant surprises when an outage occurs.

About DynaSis
DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

 

By the DynaSis Team
[featured_image]

Due to the rising cost of breach remediation, including potential fines, penalties and lost customer goodwill from data theft, cybersecurity experts are now looking at “cyber risk” in a new light. Today, the riskiest threats aren’t necessarily those that do the most system damage. They are the ones that expose a company to the most liability. For example, an attack that reconfigures software or deletes data might be expensive to remediate, but its total damage footprint will be less than having thousands or even hundreds of confidential records stolen. And, because profit is now the central motive of the vast majority of threats, theft or fraud-based activities are a component of nearly every attack.

Exacerbating the situation, 2014 saw the continued development of Malware as a Service (MaaS). Like the cloud-based Software as a Service (SaaS) programs – from Salesforce to Dropbox – that are popular with consumers and businesses, MaaS is highly intuitive, sophisticated and able to serve many users at once.

Essentially, companies are producing and packaging these products and services and selling, leasing or subcontracting them to others, making it easier than ever for criminals to stage complex and highly evasive multi-stage attacks. Other are customizing malicious source code on a contract basis for their own and others’ benefit.

These companies and individuals are also sharing information to enhance each other’s capabilities. There is no “competition” among malware authors that prevents information sharing. All of them have the same goals and all can profit individually from their attacks.

Finally, the development of detection-evasion techniques is also accelerating. Given that a successful threat actor only needs to focus on one or two evasion techniques to deploy a threat capable of breaching many organizations’ defenses, firms that rely on outdated security solutions are operating with a false sense of complacency - and putting their firms at extreme risk.

In such a landscape, organizations must constantly enhance their security postures to counter this evolving threat environment. Furthermore, the IT teams that work on corporate security, whether they are in-house or outsourced, must have very high-level skill sets that are continually updated. Integration with an advanced threat detection resource that continually scans the globe for new threats - and a mechanism for automatically updating whatever solution is in place - is also vital.

Currently, the courts are taking a dim view of companies that fail to adequately protect confidential assets and thereby expose other, unwitting individuals to risk, as well. Taking steps now to implement a comprehensive, advanced, largely automated security solution is the surest way to protect your firm, your assets and your customers and to sharply reduce the potential for unsurmountable liability.

About DynaSis

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

Mobility Graphic DynaSisWith 74 percent of organizations either using or planning to adopt BYOD*, (bring your own device), the days of companies issuing corporate devices are coming to an end. In fact, Gartner predicts that by 2017, half of employers will actually require personnel to provide their own devices.

If enterprise mobility is no longer defined (and secured) by device selection, what does the future of mobility look like? Increasingly, progressive organizations are moving away from a model where employees access a handful of corporate assets (most commonly mobile email) on their smartphones. Rather, as we discussed in our recent article, “Moving Your Business to the Cloud: Three Top Reasons Why the Time Is Now,” true corporate mobility, today, affords secure employee access to a much broader array of corporate resources on any device, at any place and at any time.

To support full mobile productivity, companies now enable users to access and work with data, email and productivity applications. In other words, a district manager should be able not only to view an Excel spreadsheet but also to run analytics on it and generate a report. A salesperson should be able to pull up a contract on his or her tablet and allow a customer to sign it, onscreen, and then submit it to the finance department for processing with a single click.

These types of activities foster significant productivity gains, but they also require organizations to engage in effective application and content management, and to secure both email and productivity applications. In this environment, and especially with BYOD in the picture, the blanket approach to securing an entire device simply doesn’t work.

Rather, such an environment requires companies to take a much more granular approach to mobility management. To assist in this effort, specialized Enterprise Mobility Management (EMM) tools have been developed. They allow organizations and/or their IT partners to manage and secure mobile and cloud-based (software as a service, or SaaS) apps and their data, and to encrypt and protect all data transfers between a device and the corporate network and servers. These tools also allow organizations to create and apply policies selectively based on type of user (e.g. employee or contractor), job description and requirement, level of authority and many other variables.

This maturation of enterprise mobility is enabling worker behaviors most of us wouldn’t have dreamed were possible only 10 years ago. In the most advanced mobility deployments, retail employees roam around stores, using tablets to provide inventory checks for customers and then taking payments for merchandise on the tablet, as well. Doctors consult and update medical records from the bedside of a patient. Technicians receive text alerts on their smartphones when company equipment experiences a problem and adjust their schedules to address the issue more quickly.

These are only a few examples of what mobility is doing for the workplace, today. The new era of mobility is incredibly exciting, and here at DynaSis, we are delighted to be part of it.

*Tech Pro Research, 2015

 

 

msecurityBy the DynaSis Team

With the news of the data breach at the Federal Office of Personnel Management (OPM), where some 21.5 million confidential, sensitive records were stolen, security experts are reinforcing how important it is for every organization—private or public; large or small—to implement robust security measures. Yet, 58 percent of SMBs haven't invested additional resources in cyber security in the past year, even though 81 percent of them are concerned about it and 91 percent "think about it often."*

That's deeply concerning, because even the smallest firm is at risk. With the emergence of tools that scan the Internet 24/7, "sniffing" for vulnerable systems, hackers no longer need to target a company to penetrate it.  Once these tools find a vulnerable system, they are programmed to infiltrate it, steal the data and even install software that can then turn these systems into "bots" that help troll for and exploit more victims.

So, what security measures should a small or midsized business (SMB) take to repel these invaders? Following are a few solutions that are absolutely critical for SMB security, today.

  1. Physical or virtual security appliances that incorporate firewall, intrusion prevention, wireless and wired security, application control and Web filtering, at the minimum.
  2. The services of an advanced threat research team that scans for new threats and automatically updates protective services 24/7/365.
  3. A unified, user-friendly management console that makes it easy for organizations or their security providers to add and delete corporate personnel and computing devices including smartphones, adjust access restrictions, perform updates and more across the entire security platform.
  4. Preferably, all solutions should incorporate high-performance network boost filtering performance and reduce drain on operating systems.

This list may sound daunting, but solutions that meet these criteria are readily available. As discussed in our recent article, "Moving Your Business to the Cloud: Three Top Reasons Why the Time Is Now," cloud-based security platforms are the most efficient and cost effective. However, firms that insist on physical security can achieve that at a slightly higher cost.

The most disconcerting issue with the OPM breach wasn't its extent. It was that 80% of the breach wasn't even discovered until a forensic investigation occurred. For businesses with fewer resources at their disposal, it often takes a call from an outside entity, such as the FBI, for a business to discover it has been hacked. Thanks to the current generation of sophisticated, automated hacking tools, your corporate system could easily become a victim—and even a "bot" for future attacks—unless your systems are adequately protected.

About DynaSis

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

*Endurance International Group, 2015.

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram