If you’re a gamer, especially a console gamer, you’ve no doubt heard of or are watching the Xbox One X. Microsoft has taken its flagship console, the Xbox One, and turned it up a few notches. Sporting 40% more power than any other console on the market and a 6 teraflop GPU (that’s crazy fast), it’s able to produce true 4K visuals. The new Xbox comes equipped with a 4K Blu-ray disc drive ( the only console that has this), 4K DVR and 4K streaming, fastest load times of any console on the market, and is compatible with all of your Xbox One games and accessories. The Xbox One X comes with a 1TB hard drive and retails for $499.99 and is in stock at most retailers but you might want to check availability before driving down to your local retailer. The Xbox One X is an impressive piece of hardware that brings 4K visuals to stunning life. Now you just need that beautiful new 4K TV. (check back next week for more on 4K TVs)
We like tech, it’s what we do. As the holiday shopping season kicks into overdrive, we are bringing you 12 of the most requested, most wanted tech gifts for 2017. Check back each business day between now and December 19th for another must-have tech item and why you should check it out. There’s little denying that this year’s “must have” tech item must be the new iPhone X from Apple. The iPhone X (pronounced “ten”) arrives during the tenth anniversary of the original iPhone back in 2007. Apple has released their iPhone 8 this year as well, but the big dog here is the iPhone X. Sporting a 5.8-inch, OLED super retina HD display, the screen is capable of 4K video up to 60 frames per second, stunning colors, true blacks, and a 1,000,000 to 1 contrast ratio. It’s the largest iPhone screen to date. It sports dual 12 MP cameras that use facial recognition to unlock your phone. The home button is gone and has been replaced with facial recognition. The phone is water and dust resistant and covered front and back in the most durable glass in a smartphone. The iPhone X has an all glass and steel construction including surgical grade stainless steel. The new iPhone charges wirelessly. If all this sounds like your cup of tea, prepare to empty the bank to get one. The 64 GB model will run you $1,000 while the 256 GB model goes for $1,150. It comes in both silver and space gray. All Apple stores, carriers, and retailers have limited stock with several not shipping until mid-December. It’s best to get your order in as early as possible. The new iPhone a bit too pricey this holiday? Don’t worry, {company} has you covered. Keep an eye out next week for a less expensive alternative for the must-have smartphone. Happy Holidays and good luck on the tech hunt from all of us here at {company}!
Breaking Down Compliance Concerns for Healthcare Providers Using Skype Every day, we work alongside a variety of healthcare providers to ensure HIPAA data compliance standards are implemented correctly. As technology-for-business continues to evolve, instant messaging platforms – like the one provided in Skype – offer a convenient way of quickly communicating information between team members or departments. However, we’ve been getting this question a lot lately: is Skype HIPAA compliant? More specifically, can Skype be used to send electronic protected health information (ePHI) without violating HIPAA mandates? Very simply, should healthcare providers be using Skype when it comes to the transmission of sensitive patient health data? The debate is still out on Skype and HIPAA compliance. Skype does include built-in security features to prevent unauthorized access of transmitted data, and all Skype messages are encrypted. However, built-in security tools don’t necessarily mean total HIPAA compliance. When it comes down to it, the way healthcare organizations implement and use Skype is what makes the difference when it comes to compliance. First Things First: Is Skype Considered a Business Associate under HIPAA? Under HIPAA, business associates are defined as any organizations or people working in association with or providing services to a covered entity who handles or discloses Personal Health Information (PHI) or Personal Health Records (PHR). So, does Skype count? Again, this is a topic that is continually up for debate. Technically, Skype could be considered an exception to the business associate mandate, under the HIPAA Conduit Rule. The Conduit Rule stipulates that any conduit through which information flows does not require an explicit business associate agreement. However, don’t get too excited. A business associate agreement is necessary if a vendor creates, receives or transmits patient data on behalf of a HIPAA-covered entity or one of its business associates. While Skype definitely doesn’t create personal health information, it can be used to receive and transmit it. However, it should be reaffirmed that Skype messages are encrypted – both in transit and at rest – and Microsoft doesn’t access these messages unless there is a legal subpoena to do so. In the case of subpoenaed information, data must first be decrypted. Therefore, it becomes unclear that whether providing information to law enforcement and being able to decrypt messages, would mean Skype would no longer satisfy the Conduit Rule. Furthermore, Skype is a software-as-a-service as opposed to a common carrier. There’s no doubt that all the legal jargon is enough to leave your head spinning. That’s why, we urge clients and other businesses to air on the side of caution and consider a Skype business associate, requiring a business associate agreement. Better safe than sorry. When it comes to drafting a business associate agreement, Microsoft generally will sign a HIPAA compliance associate agreement for a providers entire Office 365 subscription. Additionally, Skype for Business may be included in that overreaching agreement. However, in order to ensure compliance, make sure you look over your business associate agreement with Microsoft to make sure that Skype for Business is included and covered. Microsoft has recently explained that not all business associate agreements are the same – so play on the safe side and get specific. Skype and HIPAA Compliance: Encryption, Access, and Audit Controls While HIPAA doesn’t insist that ePHI is encrypted, they do outline encryption as a mandatory consideration. Basically, if a covered entity decides not to use encryption, they must outline and implement an equivalent safeguard instead. When it comes to Skype, all messages are encrypted using AES 256-bit encryption; therefore, this aspect of HIPAA compliance is taken care of. However, the problem lies in administrative controls for back-up and auditing. Skype doesn’t automatically include appropriate controls for communications back up, nor does it maintain a compliant audit-trail, as mandated by HIPAA standards. Without these features, Skype simply isn’t HIPAA compliant. However, there may be a workaround if healthcare organizations are implementing Skype for Business instead of the basic app. The Final Verdict: Is Skype HIPAA Compliant or Not? So, lets cut to the chase: is Skype HIPAA compliant or not? The short answer is no. As a standalone application, the basic Skype platform does not comply with HIPAA compliance regulations. So, for healthcare organizations who rely on Skype – let this be your warning to never send ePHI via Skype instant messaging. However, for organizations using Skype for Business – like many of our clients – the platform can be made to better support HIPAA compliance – but only if it is implemented correctly. If the Enterprise E3 or E5 Skype For Business packages are purchased, the application can be configured to better support HIPAA mandates. However, it’s up to your organization to ensure that compliance standards are met. This means that you must actively set up a business associate agreement with Microsoft, before using the Skype for Business app to transmit any kind of ePHI. Furthermore, the application must be configured carefully. In order to be fully HIPAA compliant, Skype for Business must maintain an audit trail and all transmitted communication must be saved and backed up securely. Additionally, access controls must also be applied to all devices that use Skype for Business to prevent any and all unauthorized disclosures of ePHI. Controls must also be configured to prevent any sensitive information from being sent outside the organization. Finally, healthcare organizations must also implement agreements that insist Microsoft will notify them immediately in the event of a breach. But, let’s not get ahead of ourselves… Unfortunately, it must be noted that even with a business associate agreement and the correct application package, there is still significant potential for HIPAA compliance to be violated when using Skype for Business. The short answer is, when it comes to Skype for Business, it’s hard to be entirely confident that all HIPAA regulations are upheld. However, healthcare companies need not panic or dig out the post-it notes. There are many secure instant messaging platforms available to healthcare providers, designed specifically for use by the healthcare
Online shopping is something many are becoming increasingly familiar with in the digital age. From Amazon Prime to special online-only sales, anything one could ever want, or need can be bought online. However, an aspect of online shopping that is often overlooked is security. This means being aware of what sites you are visiting as well as what information you are providing. There are several steps that are easy and effective in ensuring online safety that anyone can and should work on implementing into their everyday lives. Don’t Shop on Public Wi-Fi Inputting your personal information on any site while on public Wi-Fi or a hot spot is just asking for that information to be stolen. These Wi-Fi spots are not secured and allow anyone access to them. Everyone can see what everyone else is doing, including shopping. You wouldn’t want to type out your Amazon password with a stranger looking over your shoulder, but that’s essentially what you’re doing when on a public network. You also want to be wary of stores that use Wi-Fi or Bluetooth to track your movements within their stores or websites. This could be another potential avenue for hackers to get into your device and steal your data. Password protection dos and don’ts You’ve probably heard this a thousand times before, but protecting passwords is the easiest thing you can do to safeguard your information. You should have a different password for each site or app. Using a password manager can be helpful with this. You also want to make sure that you are changing your passwords on a regular basis, at least every thirty to ninety days. Unique passwords or sentences as passwords are also a good idea. The more complicated the password is the better. It’s also a good idea not to share your passwords with too many people. Is it really secure if ten people know it? Virtual account numbers Virtual account numbers are special cards with a set time and amount to spend, and after they expire the card and money on it are no good. This is a safe alternative to using your debit card online. If someone gets access to your debit card, they have access to your bank account and could end up costing you plenty before the transactions are sorted out. If you don’t have access to this type of card a standard credit card is still more secure than a debit card. Most credit card companies give you 60 days to report theft, while some banks only give you 2 business days for reporting debit card fraud. Beware of links in emails and on social media The days when you could safely click a link on Facebook and buy that new amazing thing safely and securely are gone. Today hackers are using links and attachments to deliver malicious malware and ransomware to your system. It is always best to type in the address to your address bar manually, rather than clicking the link. Always make sure that the site you think you are going to is actually the site you end up on. You can verify that the link is legit by hovering your mouse over it, which will display the address it links to. This way you can see where the link takes you before clicking it. It doesn’t hurt to follow the old adage, “if it’s too good to be true, it probably is.” So, if that post on Facebook for the $20 iPad seems like too good of a deal, it most likely is. Stick to reputable sites and places you have shopped before. Losing your money to thieves is not worth saving money on a tablet. Beware of what info is asked for Would you enter your social security number on Amazon if they suddenly asked you to provide it to make a purchase? Of course not. Be wary of what information the site is asking for. If it seems strange or out of place, it’s probably not legit. Things like name, phone, email, and address are all pretty standard things for a shopping site to ask for. Social security numbers, bank account numbers, or driver’s license number however are not standard practice for shopping online. You also want to make sure that what the site is doing with your information is legit and that they aren’t selling it or stealing it for themselves. Always know the privacy policy and terms of service, especially when you aren’t sure about the site. Also, make sure that the site is protected and secure before entering any personal information. Look for the https When you visit a webpage look for the https in the address. The difference between http and https is how secure the site is. The extra “s” means that the site is secure and safe. It encrypts the message so that only the intended recipient sees the information. If you’re shopping there it should have https in the address bar. If it doesn’t, don’t shop there. Beware shopping on mobile devices We all do it. We hit up Amazon or some other shopping app on our phone or tablet because it’s easy and convenient. We like shopping from our couches or chairs without going to the computer. But the potential for identity theft or the theft of your payment information is far greater from a mobile device than the family desktop. Beware of shortened URLs. It is common to see them on a phone or mobile device, but could also be a trick to get you to click on them. Use the full address and avoid these shortened ones. Another thing to remember is to download a virus protection app for your device. Most devices don’t natively come with one, but the device is just as prone to hackers and malware as your PC. You want to keep them clean and safe, especially if this is your primary means of shopping or browsing. Understanding how online security works is a
Combatting Cybercrime with Multi-Factor Authentication in Microsoft Azure For business owners, the cybercrime landscape is only getting worse. More and more, businesses are looking for the best ways to lock down company data and implement strengthened lines of defense. Two-step account verification is becoming an increasingly popular means of keeping hackers away from business account data. Breaking Down the Basics: What is Two-Step Verification? Two-step verification serves as a critical second layer of security that demands an additional method of authentication to allow user sign-ins and transactions. It works by requiring two forms of account authentication to prevent unauthorized access or account hacks. Two-factor authentication involves any two or more of the following verification methods: Something a user creates and knows (typically a password) Something only the user has possession of (a trusted device that is not easily duplicated, like a smartphone or tablet) Something entirely unique to the user’s actual being (biometrics like fingerprint logins) Today, more than ever, people are increasingly connected – especially across the business landscape. Between smartphones, tablets, laptops, and PCs, business users have multiple ways to access accounts and applications from anywhere. Two-step verification allows business users to implement an extra layer of protection in this growing digital atmosphere. Furthermore, as leaders in business technology optimization, Microsoft has wasted no time in implementing their own two-factor authentication method for Azure. Secure Azure: Benefits of Multi-Factor Authentication in Microsoft Azure Azure Multi-Factor Authentication (MFA) is an easy to use, scalable, and reliable two-factor authentication solution that provides increased protection of user accounts. Azure MFA helps professionals control and protect access to data and applications without creating a ridiculously complicated and irritating sign-in process for users. Azure MFA allows users to implement a reliable authentication system, through a variety of mediums. Let’s break down the key benefits of implementing Azure MFA: Easy to Use First and foremost, Azure MFA is incredibly simple to implement and even easier to use. The extra protection that comes with Azure MFA allows users to manage their own devices which alleviates the security burden for management and IT admin staff. Scalable Azure MFA harnesses the power of the cloud and integrates seamlessly with on-premises applications. This means Azure’s authentication feature can handle high-volume, mission-critical situations and is equipped to support business growth. Consistent Protection Azure MFA is designed specifically to ensure consistent and user-friendly authentication processes for business users. Azure MFA provides this consistent protection by deploying the highest industry standards and best practices. Reliable Because business never sleeps, Microsoft guarantees 99.9% availability of Azure MFA. The service is only unavailable when it is unable to receive or process verification requests for authentication. How it Works: Functionality Considerations for Azure Multi-Factor Authentication Azure MFA is so secure thanks to its layered approach to protection. Hackers looking to gain unauthorized access to an account will have a much harder time compromising multiple check-points as opposed to basic, password-only options. By implementing Azure MFA, even if a cybercriminal were to crack a user’s password, the information would be useless without possessing a trusted device or completing the next authentication step. Azure Multi-Factor Authentication helps lock down access to data and applications while meeting user demand for a simple sign-in process. It provides additional security by requiring a second form of authentication via a wide range of easy and customizable verification options. The following are a list of methods that can be used for second-step verification: Phone Call Here, a call is automatically placed to a user’s registered phone. To authenticate access, users enter a PIN if necessary, followed by the # key. Text message If preferred, users can also receive a text message to their mobile phone. The text message will provide a six-digit code and users then enter this code on the sign-in page to authenticate. Mobile app notification Users can also set up verification through the Azure mobile app. A verification request will be forwarded to a user’s smartphone, and the user is then able to enter a PIN if necessary, followed by selecting Verify on the mobile app to authenticate. Mobile app verification code Similar to the previous option, the Azure mobile app also has a verification code feature that users can take advantage of. The app, running on user smartphones, has a tool that generates verification codes that change every 30 seconds. Users select the most recent code and enter it on the sign-in page to authenticate. Third-party OATH tokens Finally, if for whatever reason, the above options aren’t preferred, the Azure Multi-Factor Authentication Server can be configured to accept third-party verification strategies as well. IMPORTANT NOTE: Azure Multi-Factor Authentication provides varying verification methods for both the Cloud and server platforms. Business owners can choose which methods are available for users. For full details, check out info on selectable verification methods. Strategies for Implementation: Getting Started with Azure Multi-Factor Authentication Now that we have the lay of the land, let’s take a look at the steps necessary for implementing Azure MFA for business users. Implementing the solution isn’t difficult at all and if business owners follow this step-by-step guide, they’ll have a second layer of security deployed in no time. PREREQUISITE Before anything else, businesses must be signed up for an Azure subscription. In order to take advantage of Azure MFA, businesses who do not already have an Azure subscription will need to sign-up for one. If you are just starting out and want to take a test-drive, there is a trial subscription option. Enable Azure Multi-Factor Authentication This part is generally easy and automatic. As long as business users have licenses that include Azure MFA, there’s nothing that you need to do to manually activate the feature. You can start requiring two-step verification on an individual user basis under the following Azure licenses: Azure Multi-Factor Authentication MFAAzure Active Directory Premium Enterprise Mobility + Security However, if you don’t have one of these three licenses, or you don’t have enough licenses to cover all business users, you’re not
Black Friday deals seem like they begin earlier every year. Most of the bigger retailers don’t even wait until Friday to roll out the specials on big-ticket or most wanted items. As your trusted IT company, we are here to offer you some insight into this year’s tech deals. Whether it’s about a new 4K TV or how to get that great new gaming system running, we will do our best to help make your Black Friday tech shopping a bit less stressful. But is it worth your time and aggravation to wait in line half the day or more on Thanksgiving, or should you stay home and overeat on turkey and stuffing? After all, the same retailers will have the same items available (mostly) on their website for the same prices and quantities, but with less physical violence over a toaster oven. Every year Wal-Mart is the hub people pushing and fighting for the last set of pans or the last coffee maker. In recent years, Wal-Mart has moved Black Friday deals to Thursday night and there have been less of the crazy pricing and more handing out numbers to alleviate tensions and fist fights. Quantities are still limited and you’re going to have pushing and shoving over things like WWE 2K18 for $29, but what you should be worried about is whether it’s worth it to stand in line for $100 off an Xbox One S. Speaking of the Xbox One S, Wal-Mart will have the 500GB model on sale for $189 (a savings of $110). Similarly, the PS4 will be on sale for $199, also a savings of $100. Wal-Mart is advertising that they will also have stock of the Nintendo Switch. No sale price, still $299, but considering you couldn’t find one anywhere all summer it’s an item worth braving the crowds for. Of all three retailers we’ve covered, Wal-Mart has the best overall pricing on movies and games for Black Friday. Titles vary by location and not every title Wal-Mart has the competitors have, but if you are in the market to pick up a few low-priced gems for someone, this would be a place to look. A couple highlights are the Call of Duty Combo Pack (WW2 & Infinite Warfare) for $59, Horizon Zero Dawn for the PS4 only $19, and Overwatch for $29. 4K TVs are the gift of the year for 2017. Everyone wants to go 4K, and Wal-Mart has a wide selection of TVs to do just that. The best buy here would be the Sharp 4K 55” Smart TV. It does everything you want a 4K TV to do, and it comes with Vudu, Netflix, and more already installed, and it’s only $298! 55” not big enough for you? How about the 65” inches for $998, featuring built-in streaming apps and 4K Ultra HD. Wal-Mart also has the Google Home Mini for $29, an iPad for $250, a Nintendo 2DS system that comes with The Legend of Ocarina of Time for $79, and everything you need to take your home into the next stratosphere with Google Home, a Netgear “Nighthawk” router for $89, and a home security setup. Bottom line, Wal-Mart may be the better overall deal as far as movies and games go, but do you really want to brave the crowds for something that you can find online with free shipping for $35 or more. The 4K TV might be hard to pass up, but is braving an angry mob of shoppers worth the savings? Only you can know for sure. {company} wants you to have a happy Thanksgiving and a productive Black Friday experience. Look for more Black Friday tips from us tomorrow.
Black Friday deals seem like they begin earlier every year. Most of the bigger retailers don’t even wait until Friday to roll out the specials on big-ticket or most wanted items. We are here to offer you some insight into this year’s tech deals. Whether it’s about a new 4K TV or how to get that great new gaming system running, we will do our best to help make your Black Friday tech shopping a bit less stressful. Once again, this year the deals (and lines) will begin at 6:00PM on Thursday, Thanksgiving Day at most retailers. But is it worth your time and aggravation to wait in line half the day or more on Thanksgiving, or should you stay home and overeat on turkey and stuffing? After all, the same retailers will have the same items available (mostly) on their website for the same prices and quantities, but with less physical violence over a toaster oven. First, we’ll look at Best Buy. The electronics giant seems to be bucking trends and will open at 5:00PM Thursday night, then reopen at 8:00AM Friday morning. Their ad is highlighted by 4K TVs and deals on video games, movies, and phones/tablets. The 4K TVs have savings ranging from $150 off to $350 off, depending on brand and size. In particular, the Sharp 50” 4K TV is only available in stores and will be on sale for $180, a savings of $320! There are savings (albeit small) on Amazon Kindle Fire, Apple iPad Mini 4, and loads of accessories for your TV or gaming system. Several Chromebooks are also on sale, most over $100 off. The big one to watch here is the Microsoft Surface Pro Core M, which is on sale for $629 (that’s $370 off!). On the gaming side, Best Buy is offering a PS4 1TB console for $199, a savings of $100 off retail. That’s a good deal for the PlayStation fan on your list. Best Buy will have the Xbox One S 500GB console for $229, which is $40 more than both Wal-Mart and Target. However, getting the console at Best Buy will also net you a free second wireless controller and a downloadable copy of Madden 18 video game. This amounts to $50 off the console and $120 worth of extras for free. Or you can get the Xbox One S on its own for $189, which matches Wal-Mart and Target’s price. Either way, expect quantities to be severely limited. If you’re desperate for a new 4K TV or getting that free football game with your Xbox, I suppose standing in line could be viable. But in all honesty, is it worth it when you could be sitting on your couch and order the same items from your phone, getting the same deals and free shipping? {company} wants you to have a happy Thanksgiving and a productive Black Friday experience. Look for more Black Friday tips from us tomorrow.
Internet of Things (IoT) has been dominating conversations in the tech industry for some time now. The interconnectedness of an IoT network offers streamlining capabilities that are attractive to individuals and businesses alike. Using technology to make life easier – at home or in the office – is a huge plus. However, considerations must be made for how an increase of connected devices also increases cyber-risk, making IoT networks more vulnerable to cyber invasions and infections. What is Internet of Things (IoT)? How Digital Connection and Transformation is Taking Shape in Business Simply put, the Internet of Things (IoT) is any network of physical devices that contain embedded technology which enable varying degrees of internet access, communication, command and control. Connected physical devices include traditional machines like laptops, and tablets, but goes further to include a variety of other non-traditional devices including vehicles, thermostats, appliances, wrist watches, manufacturing equipment, medical devices and more. For business owners, IoT offers huge streamlining capacities that pack a productivity punch. By having all business devices and equipment synced with internet access, communication and collaboration is easier and work gets done faster. In turn, business owners reduce overhead costs and can take on new business. Technological transformation like this can truly transform the way organizations do business. Though it may seem futuristic, the last few years have been huge for the actual implementation of IoT, driven by cost reductions and compelling business case value. There has been a transition from ideas and prototypes to production and implementation. On the market smart-cars and wearable devices with embedded systems are readily available. Business owners in every industry are looking for the ways to best capitalize on IoT technology. However, as IoT explodes onto the scene, many of these networks simply will not have adequate security, leaving businesses more susceptible to cyber invasion. Anatomy of an Attack: How IoT Devices Put a Cybercrime Target on Businesses TrapX Labs, a leading Cyber Security company in the US published a 2013 report detailing the specific ways in which IoT devices significantly increase cyber risk for businesses. “The vast majority of IoT devices provide a wide-open door to advanced attacks, persistent threats and other sophisticated malware,” says TrapX Labs Vice President, Founder and Security General Manager, Moshe Ben Simon. “Cybersecurity must be designed into these products initially. Without this design and implementation, these devices will present a huge potential risk to your organization, your employees, your business partners and your customers.” Cybercriminals are getting more sophisticated and malicious by the day. The ways in which these seasoned professionals can gain access to your company data are endless, but here are a few of the leading ways IoT hacks and attacks take shape: Botnets Botnet attacks, also referred to as ‘thingbot attacks’, specifically target networks of connected computers and smart devices to infect them with malicious software. Once infected, criminals can seize control of the entire network without the owner’s knowledge. This can result in a variety of damaging impacts to business networks including the wiping of data, the sending of inappropriate spam messages as well as identity and data theft. IoT networks are at increased risk simply because botnets are able to access and control more than just computers and laptops. They can get their hands on every device connected to the network, leaving endless opportunities to disrupt or rob a business. Data/Identity Theft As with all forms of cybercrime, a leading motivation is the accumulation and theft of useful data. This could be business data, but often cyber criminals seek out identity details to steal individual identities for financial fraud. The risks are even higher with the implementation of IoT, because obtaining these details becomes easier. Between a little online research into social media accounts, general Google inquiries and the ability to hack into non-traditional, less-monitored devices like office thermostats and smart-watches, becoming someone else is made much easier thanks to IoT networking. ‘Man-in-the-Middle’ Attacks The man-in-the-middle concept occurs when cybercriminals hack a network with the intention of intercepting communications between two systems. This can be incredibly damaging as it gives criminals the opportunity to trick parties into thinking they are having a legitimate communication exchange when they aren’t. This means clients could think they are communicating with your company, when really, they’re giving valuable information directly to criminals, without your knowledge. This is even more dangerous with IoT networks, as it leaves an open door for cybercriminals to intercept communications with company smart devices like manufacturing machines, connected vehicles or smart TV’s. Social Engineering Anyone with even a base-line understanding of cybercrime trends knows a little bit about social engineering scams like phishing emails. Criminals send convincing looking communications to clients and team members, often posing as a high-level company representative. The communications request details from recipients that could include anything from banking info to confidential company data. Social engineering scams are even scarier when it comes to IoT networks because of the varied ways criminals can stay connected once they gain access. Even with phishing protections in place, if a single, unmonitored connected device is missed, criminals can hold onto network access. This means even if an office has protected all their computers, tablets and cellphones to prevent phishing scams, but forget about the smart TV’s and thermostats that are also connected, cyber criminals can keep hold on their network access to attack again. Denial of Service A Denial of Service or DoS attack occurs when regularly functional services are rendered unavailable. Using a botnet, cybercriminals use a variety of programs to attack one specific target, often by overloading the service target with requests. This results in capacity overload and the service becomes unavailable to those who regularly rely on it. Unlike phishing scams, the goal of DoS attacks is not to steal data or identities, but rather, it is to completely disable businesses from operating. With IoT networks, more devices are connected meaning more services are open targets for criminals looking to shut down functionality. While
Construction companies, be they large or small, have some unique aspects of their business that make them a different kind of business from others that rely on a managed service provider. With programs like CAD, construction project planning and procurement of materials are unique to that industry and would require an MSP that is dedicated to the construction industry. Construction companies do use typical IT software and hardware for standard office tasks and accounting functionality. What really sets this industry apart, however, is how collaborative it is. Workflow does follow traditional paths such as design, construction, and testing. There is also a role played by industry compliance and security in all aspects of the industry. But success is dependent on collaboration between architects, engineers and the actual foremen and workers at the on-site level. An MSP must be able to manage this team and collaboration in real time. This is why many larger construction companies use an internal IT team rather than outsourcing to an MSP that isn’t fluent in CAD or certain planning software. When it comes to construction companies, not all MSP’s are created equal. You need one that can specialize in the construction industry and has your best interests at heart. Some things to look for are: Access to highly trained and specialized staff. Supporting the technologies that run your critical core applications such as estimating, accounting, project management, document management and scale management. Extensive experience with supporting software such as Sage, JD Edwards, Quickbooks and Autocad Solutions. An MSP that provides Mobile Device Management (MDM) and remote access solutions that allow your team to have access to anything, anytime and from anywhere. Affordable and comprehensive services, such as standard IT solutions, to go along with the specialized services. Any good MSP will do a few basic things for every type of industry, but these things are just as important to the construction industry as any other industry. You want one that will be available when you need them as well as one who is up-to-date with current technology. Hiring an outside IT company will save you money. Having IT in-house means paying them a salary and possible benefits and 401k. Hiring an outside company negates the salary and 401k, which becomes the problem of their company not yours. The MSP will perform monthly updates and preventative maintenance, keeping your software and hardware running at peak efficiency, cutting down the probability of failure at critical times. When the system is running efficiently and smoothly, that equals peace of mind and best of all, profits. By using a third-party IT provider, you are more likely to stay ahead of new cyber threats and viruses. An MSP makes it their business to stay up to date on new cyber threats and hackers so that they can keep your business ahead of these threats and running smooth. Should something get through or hardware breaks down, you have an experienced and dedicated team you can call to fix the problem. Most MSP’s are available 24/7. The MSP can run an analysis of your IT environment to prevent issues such as having to add equipment and up the budget given. This also serves to give your business a deliverable, comprehensive executive summary of your company. The summary shows any vulnerability in your system as well as the pros and cons of your current network. It will also give you the MSP’s recommendations for any adjustments to your current technology. Never one to rest on their laurels, tech giant Google started a project that could revolutionize the construction industry. Beginning as a project for Google X it has spun off into its own company, Flux.io. Essentially a cloud-based platform, Flux is a collaborative platform that allows architects and construction engineers to work together in real time on a project. It sports an advanced analytic engine and state of the art simulators. With the ability to translate data from multiple programs such as Excel, ACAD, and Rhino into a single platform, various collaborators could work simultaneously rather than one at a time. All computations are done in the cloud, so no worries that your system will slow down or cause it to freeze. Flux.io is touting that it will save 30% to 50% in manufacturing and construction costs. Overall, Flow has the potential to save the construction industry over $120 billion a year. As technology gets better and new software makes the collaboration process more streamlined and easier to communicate with members of your team, the need for dedicated IT grows even bigger. Whatever IT service provider that you choose to go with, make sure to get the system analysis to check for any vulnerability in your network. The MSP will be able to tell you what is essential and what isn’t while saving you money.
By following these simple steps, you can make your website stand out from the crowd with shining star ratings in Google’s search results. Have you ever tried searching for your own business on Google? If your business has a website, you likely pay attention to the content on your site, the efficacy of your site’s search engine optimization, how you advertise your site, and perhaps even its Google Analytics. Have you ever considered what your website looks like as a Google search result, though? Many business owners overlook this simple, yet important step in driving traffic to their websites. An organic search result listing which is well-designed and organized with respect to relevancy and aesthetics will ensure you make a great first impression on your webpage’s potential viewers. When searching through Google for other reasons, you have probably noticed that some webpage listings, which appear on the list of search results, include a star rating in addition to the site’s title, meta description, and meta tags. Although Google does not publicly release the specific parameters of its search algorithm, one can speculate the great difference that a good star rating which appears next to a website on a Google search results page makes when the average internet user selects one website while choosing to ignore the rest. The increased traffic to your webpage, as a result of displayed star ratings, should work well to improve your page’s place in search results for at least your top few keywords and keyword phrases. Not only do star ratings draw a surfer’s attention to your search listing, they also immediately gain your company priceless earned media (i.e. trusted reviews and word of mouth advertising from your customers). Simple Steps to Stardom You or your web developer can make short work of affixing a star rating (and its added credibility) to your website with the help of either a plugin or some basic backend HTML coding. Follow these simple steps to stardom: Get Rated and Reviewed– You can skip this step and go on to those which follow, but if your business has no existing online reviews or ratings, then Google will not be able to locate or calculate an average star rating to display on the search engine results page. To gather reviews, you will need to encourage your customers to rate your business, products, services, or their experience with you on a trusted review site, in an acceptable format, or on your Google Business Page. Google provides a complete list of the types of reviews which they consider trusted, here. Add a Schema Markup to Your Website– Once you have acquired a sufficient number of online reviews and ratings from customers, you can manually add directions to your website which specifically tell Google’s search engine crawler about all of the great, new reviews you want your customers to see when they search for you. In order for Google to detect your reviews, you will need to add a schema markup to your webpage. This schema should include various types of structured data for Google to read in order to learn more about your webpage and type of business. While you could include all sorts of data in the footnotes of your page, the most pertinent information for star rating purposes includes defining your company as a local business or a more specific sub-category and specifying your product or service. You will also need to point Google to your business name, address, logo, business hours, phone number, and email. You will also include a geolocation section in the schema, which defines your location’s latitude and longitude (NASA will help you determine your coordinates here). In the schema, you will add information to define the number of reviews you have and your average star rating, which will help Google include this on your page’s search result listing. As your reviews increase and the average rating changes, you will need to manually adjust the rating in your schema. Take a Shortcut Using a Plugin– Manual entry for the schema is the best way to ensure the most accurate search engine results and star ratings for your webpage. If, however, you feel uncomfortable with the code, you can add a plugin to your website to handle entering the schema (or structured data) on your behalf. Give It a Test Run– Once you have either entered all of your webpage’s structured data yourself or had a plugin fill in the blanks with an automated scan of your site, you can test the data using Google’s handy Structured Data Testing Tool. Enter your web address into the search tool and scan through the results looking for noted errors or warnings. This tool can help you locate typos, incorrect data, or data which might not add up in all of the right places. If the tester finds an error, go back and correct the issue and then re-test to make sure all of your data is in order. Wait and Watch– Your search result listing stars will not appear immediately after you have completed the setup process. It should take Google’s web crawlers about four or five days to re-crawl your recently updated website and add the star ratings to your listing on the search results page. Make Your Page a Star If you want to improve your business, your webpage’s search results, and bring your page to the top of the list with star ratings which are displayed in your customers’ and potential customers’ search results, but do not feel comfortable making the back-end changes to your website yourself, our skilled IT professionals can help you. In addition to setting up your star ratings, we can also provide advice on optimizing your existing webpage to improve your search engine results with back-end coding designed to assist web crawlers when they read your page and its riveting content to boost your click-through rates. To learn more about how we can help your business convert more leads through improved search engine results, contact us today. We look forward to being an integral