Sales: 678.967.3854
Support: 866.252.6363

These days everyone is concerned about data security, and with good cause. Not surprisingly, Microsoft has been a leading player in security, along with reliability and user productivity. When they took the Office productivity suite to the cloud with Office 365, they also took a giant leap forward in terms of being able to secure your most important and confidential information.

But let’s make one thing perfectly clear: your data is yours and it belongs to you alone. Office 365 gives you extensive control over privacy and visibility in terms of who has access. You manage these controls and you can customize them to fit the needs of your company. In the unlikely event that you choose to leave Office 365, you take you data with you and it is completely removed from the Microsoft cloud. Let’s look at some other features:

Secure Identity Controls

Office 365 allows you to manage users through access control, identity management and password authentication, which fully supports 3rd party identity providers. Through the use of multi-factor authentication, you can choose the level of ID control that works best for your organization:

In other words, Office 365 gives you options from fairly basic to extremely advanced and you are free to choose what works best for you.

Infrastructure Security

Microsoft spans the globe and their sheer size allows the use of techniques and strategies for defense against attacks on their network that few service providers can offer…certainly far above the ability of the typical small to mid-sized business.

Threat Management

Microsoft uses threat management controls that identify intent, determine capability of achieving that intent, and the likelihood of that threat successfully exploiting a vulnerability. This protection includes email spam, malware, viruses, and protection of Exchange.

Mobility

Your people are on the move. They work from home, in airports, hotels, clients’ offices…in town and around the world, and they take their devices, both self-owned and company provided, wherever they go. Whether they use Apple, Android or Windows platforms, the Office 365 mobile device management system identifies, monitors and protects your company’s sensitive information.

Incident Response

Stuff happens. Microsoft has a highly-advanced incident response program that includes multiple dedicated teams to prevent security incidents from happening, but when they do occur, they are immediately detected and immediately responded to.

Multi-Tenant Security

This is a fancy way of saying that multiple clients share the same infrastructure, which sometimes leads to a concern about keeping one client’s date secure from another client. Microsoft works under the assumption that any single client may have bad intentions and has created an enterprise level of security that insures privacy, confidentiality and integrity of files. It would be next to impossible for any single company to achieve this level of security on their own. By the way, it is this multi-tenant structure that enable small companies (although large companies do this as well) to have enterprise level infrastructure at affordable costs.

Physical Security

All Office 365 clients’ data is stored in data centers located around the world, using multi-layer “defense-in-depth” security protection. These centers are constructed to withstand natural disasters, or unauthorized access and have extensive power and internet backup systems. Geo-redundancy (co-locating in multiple centers) with automatic failover provides still further protection.

So as you can see, Microsoft Office 365 provides extensive security controls. We hope this information will give you a strong level of comfort, but if you have any questions, please give us a call.

DynaSis has been a Microsoft Partner since 1993 and specializes in Office 365 installation. You can find us online at 678.373.3716 or www.DynaSis.com.

Cloud computing can move a business forward.

Last week we began a discussion of myths surrounding business cloud computing. Here is a quick recap of the ones we tackled:

1: Data can’t be all that safe in a “cloud” – not true.

2: We lose control of our data in the Cloud – not true.

3: If I move to the Cloud it means that everything has to be in the cloud – not true.

If you missed last week’s blog, you can find it HERE. There are a number of other myths surrounding business cloud computing that we want to address, so let’s pick it up again:

4: Cloud computing is only for tech companies. First of all, the way we see it, today every company is a technology company. Are you using computers? Do you have email? Do you shop or do research online? Chances are you answered “yes” to every one of these question so, yes, you should be looking at cloud computing.

5: The cloud is harmful to the environment. Some people think this is so because large data centers use a lot of energy. They do. But when you add up all the energy saved by the companies that use the data center, there is actually a net energy savings and pollution reduction.

6: The cloud costs jobs. The fact is, the cloud has created jobs. Estimates are that by the end of 2015, the cloud was responsible for creating more than 13,000,000 jobs across the globe. Some jobs were lost along the way, but many more were created. But computerization in the cloud, and in general, has been responsible for such an exponential increase in productivity that the net effect has been extremely positive for almost every business.

7: Migrating to the cloud is just too much trouble. That depends on who is doing the migration for you. The right IT service provider can make the process virtually painless and with minimal downtime.

8: You should avoid the cloud for highly important applications. Again, this goes to unfounded fear of the cloud and whether or not it is truly safe. In reality, your mission critical apps are best run in the cloud, where they will also benefit from minimized downtime and automatic backups.

9: I’ll be locked in to my cloud vendor. Not true. A knowledgeable and reliable managed IT service provider or skilled in-house IT manager can get you quickly and safely up and running in the cloud, and, if the need arises, transfer your files and applications to another.

10: The cloud is for large companies – smaller companies aren’t moving there. Today, companies of every size are moving to the Cloud. Why? 94% of IT managers report that their tech security is better in the cloud. 75% of SMBs using the cloud reported better availability. 91% of companies that have significant compliance requirements use the cloud to satisfy them.

11: The cloud is best for everything in every business. Every company is unique and every company’s needs are different. We work with many great firms that keep all their data on-premises, many that are fully in the cloud, and others that are using a hybrid infrastructure that combine both on-premises and cloud. The goal of a managed IT support company should always be to find the very best solution on a client-by-client basis, and at DynaSis, we have been doing just that for Atlanta small to mid-sized businesses for 25 years. If you would like to learn more about our DynaSis Business Cloud services, click HERE.

We provide complimentary IT Assessments to determine the best course of action in implementing business cloud computing, in whole or in part, at once or over time, based on your needs, comfort level and budget. We can be reached at www.DynaSis.com or 678.373.0716.

By the DynaSis Team

Although the majority of business owners (87% per one survey) have adopted cloud computing in some form, that doesn’t mean they understand it fully. Every day, we hear from business owners who want to explore the cloud further but are not familiar with the various aspects of cloud computing. What’s Software as a Service, and how does it differ from Infrastructure as a Service? What is the difference between a public cloud and a private one? What are the criteria for selecting a provider?

To help business owners familiarize themselves with these important issues—and to help them choose the right cloud provider—we developed a white paper, Big Cloud Little Cloud, that is available on our website. To pique your interest in learning more, this article will explain the various cloud services—one of the most confusing aspects of cloud computing for many business owners.

The Cloud as a Service

Unless an organization runs its own data center, all cloud “products” are actually services. The company licenses one or more cloud-based elements hosted in data centers run by IT solutions firms and made accessible (served) to the company. The three main categories of cloud service are Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). There are other “services” that are often add-ons for companies deploying IaaS, PaaS or SaaS.  These are Desktop as a Service (DaaS), Disaster Recovery as a Service (DRaaS) and Backup as a Service (BaaS).

Software as a Service: With SaaS, software vendors host their applications on cloud servers and provide access to organizations and their personnel on a subscription basis (usually billed per user or per “seat”). The hosting company handles all licensing, upgrades, IT support and other aspects of the solution. Office 365, Salesforce, and Gmail are all examples of SaaS.

Infrastructure as a Service: IaaS is a hosted solution where a IT services vendor licenses server space in its data center. Organizations use IaaS to store and access corporate files in the cloud as well as to run applications, host websites and more. Some IaaS offerings include email, office productivity and other software, eliminating the need for firms to deploy and manage these solutions.

Platform as a Service (PaaS): PaaS is similar to IaaS, but it is more commonly used by organizations that develop, deploy and manage their own applications. PaaS solutions include hosted servers, operating systems, and other elements of a computing platform. In some scenarios, companies can also run third-party applications and store files and other assets on their PaaS resources, as well.

Desktop as a Service (DaaS): DaaS is often a front-end solution for an IaaS deployment. Personnel access cloud resources through a desktop portal that can be opened on any desktop, laptop or mobile device, eliminating the need for organizations to own and maintain desktop computers.

Disaster Recovery as a Service (DRaaS) and Backup as a Service (BaaS): Both DRaaS and BaaS provide hosted backup of an organization’s files, sometimes with selective (file by file) access. However, DRaaS generally creates complete system images that organizations can restore to recover their operations after a major outage. DRaaS solutions also may create backup images more frequently than do BaaS services, but this capability varies widely from one solution to the next.

As you can see, these solutions vary widely in their scope, and the specifics can be dramatically different from one provider to the next. As a result, we recommend organizations work with a qualified managed IT services firm, such as a managed services provider, to devise a plan. We go into detail about selection criteria in our cloud white paper. We hope you will find it helpful.

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premises managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

[featured_image]

By the DynaSis Team

With all the news about the wonders of cloud computing, many small and midsized business (SMB) owners may wonder if they are making a mistake by not adopting cloud technology. Yet, they also have concerns, ranging from security issues to availability of offsite resources if Internet connections go down.

Depending on the SMB’s business model, location, and level of technological sophistication, these may be valid concerns. Yet, there is no doubt that cloud computing provides big benefits, and SMB adoption is accelerating. In a round-up of cloud computing “facts and figures,” Forbes noted that the cloud market for SMBs will double between 2015 and 2020, from 37 percent of U.S. SMBs to 78 percent.

The good news is that decision makers don’t need to choose between an off-site cloud and their current on-site systems. With a hybrid setup, they can have both—and they can selectively choose which resources to run in the off-site cloud. With this approach, often called a hybrid cloud, some data and other business assets remain hosted on company servers while others are run and accessed remotely.

The two sets of resources are tied together so that they run as a single, cloud-supported solution, with their on-site resources essentially serving as a “corporate” cloud. Yet each of the components can be configured differently to meet designated security, backup, and other requirements.

To determine if a hybrid cloud is the right approach, SMB owners must evaluate their current needs and future plans, as well as their ability to support on-premise systems. Such an evaluation is often difficult and time-consuming for business owners, who may benefit from the help of an objective, qualified outsider such as an IT solutions or IT consulting company.

If you are currently evaluating your resources for a new or expanded cloud deployment, consider these factors:

All Cloud Solution

All On-Site Solution

Hybrid Solutions

If you like the benefits listed under All Cloud but some of the All On-Site criteria apply to your organization, a hybrid storage and delivery model could be the perfect option. With hybrid delivery, for example:

A hybrid solution also allows you the flexibility to test a variety of cloud delivery and storage approaches to find the perfect mix for your firm.

Reputable managed services providers can help you evaluate and make these decisions and can also help you move resources to the cloud safely and securely. Some managed services companies offer ready-made hybrid solutions that include ongoing IT support.

Specializing in managed IT services and network security, Atlanta based DynaSis has been supporting small to midsized business for almost a quarter century. Among the services we provide are cloud computing through the DynaSis Business Cloud, 24 x 7 x 365 helpdesk support, and real-time monitoring enabling us to deal with “issues” before they become problems. For more information, please call DynaSis at 678.218.1769 or visit www.DynaSis.com.

[featured_image]

By the DynaSis Team

We have watched with interest what could be called “Storage Wars: Cloud Edition.” In this production, treasure hunters aren’t trying to outbid each other for locked storage containers. Instead, companies are working to figure out how the cloud can help them store and access files for better productivity and mobility. Although the cloud can be powerful for many reasons, one of its greatest benefits is its “anytime, anywhere” nature, which enables remote file access, transfer, storage and backup for personnel using any device with an Internet connection.

Despite this fact, there is no consensus among business decision makers about cloud storage solutions. Adoption of the big mass-marketed services—Dropbox, Google Drive and Microsoft OneDrive—is nearly evenly split (Dropbox leads, at 33%). However, many firms are uncertain if they should trust these services and don’t know if there are other, potentially better, choices.

Here is the scoop: There are numerous options for cloud storage, including custom solutions developed and administered by IT services firms. Some but certainly not all of these are more flexible, intuitive and/or configurable IT solutions than these “Big Three.” Many organizational leaders might assume that all these solutions are similar and use the same basic setup and logic, but that is not true. They differ in cost, security, ease of use, operating design and other variables. As a result, the search for a storage solution can be complicated and should be thorough.

Storage Selection Should Not Be Taken Lightly

Even apparently minor differences can make it more likely that one service creates greater risk exposure than another. File sharing is a prime example. Windows has a built-in mechanism for file sharing that, while not exactly easy to use, optimizes sharing for security over convenience. In short, only administrator-level owners of a folder can configure sharing, and they also decide who can access the folder—and what actions they can take with it.

One of the “Big Three,” which we won’t name, does not work that way for all versions. Its “business” solution has fairly robust sharing controls. However, its “basic” version handles sharing in a messy, risky fashion.

In this version, the folder’s owner (the effective administrator) does not have the ability to customize access. Anyone given access can share the folder with anyone else for viewing or even editing. Those users can take actions, such as moving folders that they do not own, that have serious ramifications. A simple drag and drop action, for example, can automatically break the connections that support folder sharing and synchronizing (populating file changes to all shared members) and no one is the wiser. Undoing the action does not fix the problem, and resending sharing invitations does not repair the synchronization damage.

Yet, 78% of employees in a corporate survey admitted using this version of the service outside of IT approval—and many businesses adopt it organizationally as a low-cost storage solution.

Decision Time

In summary, methodologies for sharing, as well as two other “S Words,” security and synchronization, are very important aspects of file storage. Unless they are configured effectively, they can put corporate assets at risk, not only of data theft but also of damage or loss—a function of data protection, which we talked about last week.  As a result, we urge organizations to work with a reputable IT consulting or IT support company to evaluate, determine and configure the most appropriate storage solution. We don’t have room to provide specific recommendations now, but we’d be happy to “share” them with anyone who gives us a call.

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premises managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

By the DynaSis Team

[featured_image]

With bad news about cybersecurity hitting the media nearly daily (including recent attacks on healthcare organizations), it’s hard for a business owner to know what to do. It’s also easy to think, “Let’s focus on securing what we have and not add anything else to the mix.” Certainly, securing corporate assets (along with training the employees not to expose them) is a sound idea. However, refusing to explore new ideas and technologies out of concern for security isn’t the safest strategy.

One approach that has proven security value is virtualization. With virtualization, a company’s files and other digital assets are distributed by designated criteria and stored, not all together on one physical or cloud server, but rather on multiple “virtual” servers. These are discrete partitions, each of which can have its own level of security, access control and other protections, yet all can reside on a single on-premise or cloud resource. Assets can be separated by user, with each department or employee having its own virtual resource; by security need, with public, private and sensitive/proprietary files each on different virtual servers; or by any other criteria.

It may be a bit confusing to imagine how a group of files on a single server can be separated so completely, so here’s an analogy. Consider an overcoat with one or more hidden pockets. The wearer can put his wallet and all other valuables into one hidden pocket, but if a thief finds the pocket, everything will be gone. He or she could also divide those valuables among several hidden pockets, reducing the chances of the thief finding all of them—and increasing the time it takes. One or more pocket could be secured with multiple defenses, making those valuables the safest, of all.

Expanding this example, imagine now that owner is carrying candy for his or her small children and a present for the spouse. He or she puts the candy in a hidden pocket at the waist, but puts the presents in a zippered breast pocket. Upon arriving home, the children can find the candy quickly, because they can reach—and know how to open—the right pockets. However, they won’t be able to reach or see the hidden present intended for someone else.

That’s exactly how virtualization works. It isolates data in the manner that the corporate decision maker desires, making it more difficult not only for outsiders to find it, but also for the firm’s own “children”—employees—to discover files they are not supposed to see or access. Virtualization also makes is easier and less expensive to secure mission critical resources, since the most aggressive security efforts can focus on a single “pocket” rather than the entire coat.

Virtualization used to be considered one of the more advanced IT solutions, but that is no longer the case. Managed services firms routinely orchestrate virtualization for their customers. However, the best, most experienced managed IT services companies proactively work with organizations to ensure virtualization solutions optimize security and productivity while minimizing cost and complexity.

Selection of an IT outsourcing company is a very important business decision. For almost a quarter century, Atlanta’s small to mid-sized businesses have relied on DynaSis’ for managed IT services, internet security, and 24 x 7 x 365 helpdesk support. Today, with cybercrime becoming an ever-increasing threat, DynaSis has become an industry leader in network protection and ransomware prevention. Please take a tour through our website at www.DynaSis.com or speak with a technical expert at 678.218.1769.

By the DynaSis Team

[featured_image]

We have been fans of cloud computing for quite some time, and many of our discussions relate to its value, its growth and its outlook. Last week, we came across a recent article, from Computer Business Review, that does a good job of summing up several of its most fundamental benefits. In a nutshell, the article cites five top benefits of cloud computing, and then goes into a bit more detail about each:

  1. Streamline collaboration
  2. Convert capital expense into operational gain
  3. Support BYOD
  4. Simplify technology
  5. Ensure business continuity

In the article, the writer describes the cloud’s role in “Support BYOD” at a fundamental level. He points out that BYOD, whereby employees own the mobile devices they use for work, would not have developed as rapidly without the secure, flexible access to corporate resources that cloud computing facilitates.

While this is true, it is important to recognize that the cloud plays a much larger role in maximizing BYOD—and for that matter, the adoption of remote working as a whole. When corporate resources are in the cloud, employees and other authorized individuals can connect via any device with an Internet connection.

Whether via a mobile phone, tablet, laptop, or desktop—or, increasingly, a personal device such as a smartwatch—the cloud connects workers with their companies around the clock and around the globe. The value of this benefit for propelling productivity, worker satisfaction, and even business innovation cannot be understated.

In addition to the five benefits addressed by Computer Business Review, we can add a few more:

  1. Reduce worker downtime
  2. Minimize or eliminate peripheral IT costs (such as those associated with floor space and electric bills for on-site operations)
  3. Enable on-demand resource changes (e.g. increasing server space)
  4. Promote document centralization and control
  5. Minimize software licensing and management
  6. Reduce or eliminate the need for on-site support staff

Depending on the managed IT service provider and operating model chosen, the cloud can offer additional benefits, as well. For example, some providers have the cloud certifications to guarantee audit-grade compliance of cloud resources. Many cloud models now enable separation of workloads, so companies can establish varied access controls based on the sensitivity and importance of materials and the authorization level of individuals that need access.

Of course, not all companies will take advantage of every cloud computing benefit. Some may focus on savings, while others will find the technology invaluable for the connectivity and collaboration it enables. Over time, many organizations adopt new, business-building approaches because they are available so readily in the cloud.

True cloud innovation can be more readily facilitated with the help of an enthusiastic, qualified cloud services provider, which makes it very important for organizations to select their cloud partners carefully. The open, mutable nature of the cloud also enables IT services providers to develop customized solutions for their clients, from dedicated private servers to all-inclusive, 100% IT support for both cloud and on-premise resources, such as desktops.

In today’s cloud computing market, when organizations work with the right cloud service partner and are open to new ways of thinking, the sky really is the limit (no pun intended). All a business owner needs to do is reach up and grasp the potential inherent in the cloud.

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premises managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

By the DynaSis Team

[featured_image]

Cybersecurity, already a hot topic in the news, has moved to an even brighter spotlight now that the presidential candidates are discussing it. The merits of their positions are not for us to debate here. However, their actions underscore the idea that cybersecurity is an issue of concern to the citizens who might vote for them.

Statistics support this viewpoint, especially among the small and midsized business (SMB) community. In May, 2015, Endurance International Group (EIG) released the results of a survey that indicated 81 percent of SMB owners have cybersecurity concerns. Even more (94 percent) “often think” about online security. This is good news, given that SMBs are prime targets. A Verizon study found that organizations with 11-100 employees are 15 times more likely to have their security defenses breached than organizations with more than 100 employees.

Unfortunately, the EIG survey also contained some deeply worrisome statistics. Researchers discovered that 94 percent of SMB owners don’t have cybersecurity insurance. Eighty-three percent handle cybersecurity themselves, often because they don’t think they can afford to employ IT support staff or contract for managed IT services.

In reality, the risk of being breached has become so great that no business can afford not to engage professional help. Attack vectors are evolving so rapidly that it is impossible to avoid them completely. Multi-national, billion-dollar corporations work to manage risk with layers of protection that close security holes, remove or clean infections, detect and stop malicious activities, and provide other lines of defense for corporate systems.

As we head into 2016, we hope all SMB owners will embrace this approach and take action to fortify their companies’ defenses. There simply is no “silver bullet” for security. No single solution will protect a firm. Companies must use a multi-layered approach in order to mitigate threats. Beginning with our first January article, we will be covering various aspects of cybersecurity to help educate our readers regarding this daunting but critical task.

Cybersecurity is complex, and it deserves everyone’s full attention. To ignore it is to accept the consequences of a breach. For an SMB, such an event is almost always financially crippling. In 60% of cases, it will destroy the business within six months.

By the DynaSis Team

[featured_image]

DynaSis Founder and President Dave Moorman has released the second article in his IT for the C-Suite series, a collection of articles that details how business leaders and other C-level executives can use technology to improve business agility, security and productivity—and power the organization’s success. “Technology Outcomes Every C-Level Executive Should Expect” details the three fundamental benefits of technology from Moorman’s perspective, and explores in detail why these benefits are so important.

Increasing Productivity: Maximizing the use of technology to enhance the business effort and foster great customer service.

Reducing Expense: Hosting and maintaining a modern, properly managed IT infrastructure to reduce technology overhead and potentially shrink the organization’s ownership and management footprint for both technology and physical space.

Minimizing Risk: Implementing a cloud-based model to make it statistically impossible for corporate assets to be destroyed or displaced by a single event business.

Moorman illustrates his point by briefly discussing some of the world’s great business success stories—entrepreneurs who created an incredibly successful business model by relying almost exclusively on technology.

Backed by credible statistics and reports, Moorman offers solid advice on how technology helps business leaders achieve these three goals, and why it is so essential for them to place appropriate emphasis on technology. He also helps them envision how they can start leveraging technology to realize the advantages discussed in the article.

All of his advice, in this article and beyond, is designed to help even the most traditional operation become innovative and extraordinary—not only enjoying success today, but establishing the competitive advantage that is vital to ongoing business development and value.

By following the advice in Moorman’s article, C-level executives can help transform their operations into what Moorman calls “the Modern Business”—One whose leadership “embraces and leverages technology to deliver targeted, advantageous outcomes in the organization.” As he notes in this article, Moorman views technology not merely as an enabler, but literally as the fulcrum that provides leverage for success.

It’s a great read, and we hope you enjoy it! To download the PDF, use the link above, or click here.

About DynaSis

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visitwww.dynasis.com.

By the DynaSis Team

[featured_image]

In the current corporate landscape, business continuity requires ongoing access to important company files, no matter what. No longer are customers willing to wait a week to receive a quote for a job or to have their order confirmed. The world operates in real time, and customers expect the businesses with which they work to do the same.

This need is leading many business owners to rely on real time data storage solutions that could actually hamper their business continuity in certain situations. To illustrate this point, let’s consider Dropbox—one of the most popular file storage services on the planet. Dropbox is an inexpensive way for organizations to store and share files among employees, customers and other authorized individuals. However, Dropbox has serious limitations from a business continuity perspective.

Dropbox has an easy-to-use mechanism to help users recover deleted files—or restore older versions—for up to 30 days (up to a year with Dropbox for Business Accounts). It also has redundant servers protecting customer data in the event Dropbox itself experiences a server failure.

However, for company personnel to make the most effective use of Dropbox, they must sync some or all company files to their local computing devices. To do this, during setup they tell Dropbox what data they want to store and sync locally. Most users share and sync folders rather than individual files, and these can become enormous over time as other users add files to them.

If local devices lack enough storage to stay in sync, Dropbox will stop syncing and prompt the users to reevaluate their Dropbox allocations, a process that wastes time and drains productivity. When users don’t have time or knowledge to manage those allocations, many will save their files locally, planning to upload them to Dropbox later. When that doesn’t happen, the entire system falls apart, along with any pretense of having a complete backup.

Second, most file storage and sharing services such as Dropbox (and Google Drive) do not offer end-to end-security. Files stored with them are encrypted on those servers, but they're not locally encrypted on the computers where they originate before being synced to the cloud, which also means they are not encrypted during transit. If a hacker has access to a user’s account or has penetrated the corporate network, he or she could easily steal company data unless the firm is using local encryption, which is a rarity.

The advanced file backup solutions offered by companies such as DynaSis will eliminate both of these challenges, and they can incorporate on-demand file access and sharing, as well. Productivity is maximized, and concerns about local PC and backup continuity are resolved.

In today’s threat laden environment, data protection is king, and ensuring it is appropriately secured and replicated is essential. We’re not saying that companies should avoid online file storage and sharing. Rather, we’re suggesting that business owners should work with a competent IT advisor that can help them determine exactly which file storage, sharing and backup solutions are right for their environments.

About DynaSis

DynaSis is an Atlanta IT services and cloud computing provider for small and midsized businesses. All of our solutions focus on helping companies achieve the three fundamental IT necessities of the modern business—availability, security and mobility. We specialize in on-demand and on-premise managed IT services, managed cloud infrastructure, desktops and backups, and professional hardware and equipment installation. For more information about DynaSis’ IT support and services, visit www.dynasis.com.

 

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram