We like tech, it’s what we do. As the holiday shopping season kicks into overdrive, we are bringing you 12 of the most requested, most wanted tech gifts for 2017. Check back each business day between now and December 19th for another must-have tech item and why you should check it out. Nintendo knows how to get people excited, and excited they are to get the newest Nintendo console, the Nintendo Switch. The biggest draw might be the ability to play on your TV at home then remove it from its docking station and continue playing on the go as a handheld system. The console seamlessly transitions from one mode to the other, allowing you to take the game with you. Attached to your TV, the Switch docking station connects via HDMI and gives you true HD gameplay. The controller, the Joy-Con, separates into two controllers for multiplayer or the two can be attached to the sides of the console for gaming on the go. The Switch comes with a tiny 32GB of internal storage, but that can be easily upgraded to 2TB with a micro SD card. Unlike previous Nintendo consoles, or even the Xbox and PlayStation, the Switch doesn’t use discs. Instead, it uses small cartridges, like the games on the 3DS handheld system. At only $299.99 it’s an affordable piece of hardware with a unique array of software already available for it. It doesn’t play DVDs or Blu-rays, but it makes up for it with fun and exciting games such as The Legend of Zelda: Breath of the Wild and Super Mario Odyssey. Nintendo has said that they are doubling their production on the Switch, so it should be in ample supply this holiday. Happy Holidays and good luck on the tech hunt from all of us here at {company}!
We like tech, it’s what we do. As the holiday shopping season kicks into overdrive, we are bringing you 12 of the most requested, most wanted tech gifts for 2017. Check back each business day between now and December 19th for another must-have tech item and why you should check it out. Google has been hitting the market over the past year with their own devices to rival their competition in the tech market. One of these innovations is the Google Home Mini. The Mini is considerably smaller than their standard Google Home device ($129) and sports a smaller price tag accordingly. The Mini is built with families in mind and works in conjunction with Chromecast to control your TV, stream movies, and send music to your speakers. You can also have the Google Mini play from the device itself. It recognizes your voice, so multiple users can access their own playlists, calendars, and more with just their voice. It also features hands-free calling for those times when too busy to hold a phone to your ear. The mini can control your lights, thermostat, and more with a voice command, but those require external devices and/or apps. Overall, for only $49 it does a solid job of bringing your entertainment into the next generation without depleting your rainy-day fund. Happy Holidays and good luck on the tech hunt from all of us here at {company}!
The case for abandoning break-fix, volunteer-based IT support Elementary schools are very busy places with a variety of moving parts and different departments. Administrators face a big task in making sure the needs of students, families, teachers and support staff are met. Considering this long list of responsibilities, IT support often takes a back seat to other critical tasks. In fact, there is a growing trend in the education industry that is seeing elementary schools rely on casual, volunteer-based IT support. Instead of laying out a deliberate plan and partnering with a managed IT service provider, educational administrators are simply using break-fix, as-needed models of support, provided by volunteers or tech-savvy team members. “Bill Can Probably Fix That” – Why Casual IT Support Doesn’t Make Sense We get it. For busy elementary schools, IT simply isn’t the top priority – and it shouldn’t have to be. School administrators have more important things to be worrying about than making sure email is up-and-running and library computers are working. So, they get in a habit of only dealing with tech issues as they arise. Volunteers are called in on an SOS basis to address problems as they happen. However, looking at the big picture, this approach can actually result in more work and stress for school administrators. Setting up a proactive plan with a team of strategic IT professionals can keep school networks secure and functional while making the lives of administrators easier. It must be noted that tech volunteers can be extremely qualified professionals. It’s not at all to say that volunteers aren’t reliable or don’t know what they’re doing – it’s just that they can’t provide the same consistency and robust support that a managed service provider can. So, even though volunteers may be pretty good at answering your SOS calls, it just makes more sense to be proactive – especially in an increasingly digital world. Let’s look at the leading ways schools can benefit from abandoning volunteer-based, break-fix IT support: Security & Peace of Mind The cyber climate is more dangerous than ever and it’s evolving by the day. As cybercriminals get more sophisticated, it’s critical that organizations get more vigilant. While your school may have anti-virus and firewall solutions in place, and volunteer support may be able to mitigate minor threats, there’s something to be said for a robust and layered security strategy. Managed service providers rely on industry best practices to implement proactive cybersecurity strategies and strategic monitoring tools. This kind of security strategy takes pressure off administrators and avoids potentially disastrous situations when volunteers are unavailable. Having a constant eye on the school’s network provides unparalleled peace of mind for busy administrators. Consistency & Predictability Some of the concern around abandoning volunteer IT support is the potential impact on the budget. Education budgets are already stretched thin and there are rarely surplus funds to finance elaborate technical support. However, partnering with a fair and valuable IT service provider is actually cost-effective in the long run. First, with managed IT services, schools avoid the downtime associated with tech failures or waiting on volunteer support. With a team of tech experts on standby, problems will be handled more quickly and employees in every department will remain productive. Second, partnering with a managed service provider offers huge cost predictability potential. Administrators work with providers to determine what’s needed and then they have a predictable monthly cost, which ensures systems stay consistently secure and functional. No surprising tech costs or guesswork when pricing out equipment – an IT partner works to support organizational budgets. Strategic Optimization Partnering with an MSP provides more than security and support. Teams of IT professionals have extensive experience optimizing tech resources to meet the unique needs of any organization. By examining how a school operates and understanding department workflows, IT providers can help administrators streamline processes and increase efficiency. For example, email platforms can be optimized to streamline communication between office and teaching staff. Calendar integration tools can help administrators and educators organize meetings and events and keep track of important deadlines and dates. Cloud platforms can help schools organize data, collaborate on projects and reach out to students and families. The possibilities for optimization are truly endless, and having a strategic IT partner to drive that optimization makes all the difference. Continual Development Finally, in a constantly evolving world of technology, it’s critical to acknowledge that things move fast. In order to keep up, schools need to embrace new resources for learning and educational administration. Partnering with a managed IT service provider is a way of keeping a finger on the pulse of tech development. A strategic IT partner can continually consult with school administrators to re-evaluate tech strategies and ensure the latest tech capabilities are being utilized to support educational goals. From smart-boards to learning software, having a technology partner on standby helps schools stay consistently connected with technological development. Making the Switch: How to Transition from Volunteer IT Support to Proactive Managed Services Understanding the benefits is one thing, but making the transition is an entirely different beast. Many school administrators have understandable concerns about finding a reliable service provider who will meet their needs without overselling. However, there are a few simple strategies that can help administrative teams make informed decisions when it comes to more formal IT support. Really, it’s is all about creating a ‘needs inventory.’ What does the current infrastructure look like and what does the school need in terms of technology resources? Is there already a reliable network infrastructure or is there a need to start from scratch? Are there dynamic software solutions in place for employees or is there a more casual and scattered approach? Once a school determines what they need from technology, choosing the right provider and resources will be much easier. However, for administrators who are completely lost on where to start, it’s a great idea to reach out to local IT service providers to get their input on how to best
Digital photography is becoming easier to do with your smartphone, some phone cameras even rivaling some of the lower end cameras. But for those purists out there, it’s tough to beat the value you get with the Sony Alpha 6000. The camera is a mirrorless design with interchangeable lenses and takes photos at 24 megapixels, that’s double what the iPhone X offers. The body design is the perfect size for the average human, not too small nor too large. It fits just right in your hand. It offers fast, continuous shooting (up to 11 frames per second) all while maintaining autofocus and auto exposure, and is sports a quicker autofocus than the leading DSLR camera. The A6000 also shoots video in 1080p and comes equipped with HDMI output. A great camera for the price, you can snag one with a 16-50mm lens for around $550. More lenses are available but will quickly run up the price.
Weighing the pros and cons of software subscription and perpetual license models With a big name, traditionally boxed products like Microsoft Office 365 being offered via new subscription licensing models and online subscription platforms like G Suite we, as IT pros, have decided to consider the subscription model and determine if and when it is right for businesses. Many of our clients rely on software platforms to get work done and have been asking us questions about subscription vs. purchase options. In some cases, like with Microsoft Office, businesses have the choice to buy boxed products, volume license deals, or subscription licenses. This is very flexible and allows us a variety of alternative options. G Suite, however, doesn’t offer the physical purchase version – online subscription licensing is the only option. As the business environment continues to evolve, subscription models of all kinds will be a growing trend – something that the tech industry must face and understand. Why Subscribe? The Top Reasons Software Subscription Licensing is Becoming More Popular First, let’s outline some of the basic pros and cons of the subscription and purchase models. Many people, especially in IT, assume that subscriptions are designed to extract higher fees from customers. However, at its core, subscription pricing is simply a licensing approach and it doesn’t necessarily mean an increase in cost. In fact, in some cases, subscription models may result in a cost decrease. Finance Benefits: Budget-Friendly with Big Value Very simply, a move to subscription licensing means businesses are able to move from capital expenses to operational expenses which are generally regarded as a smart business move. However, the subscription model offers far more value than that. Subscription pricing gives businesses huge control when it comes to cost predictability. Using a subscription model for software needs allows businesses to more accurately predict their costs over time, with very few unexpected surprises. In the traditional purchase approach, software updates are manual and often forgotten, meaning some users would require old platforms to be updated. This would then result in expensive renewal invoices with seemingly no warning. Even worse, these costs are often followed by a spike in training costs, to help users quickly adapt to big gaps in software versions. Subscription pricing is more budget-friendly because costs normally fluctuate fluidly with employee count. This provides optimal scalability potential. As new employees are hired, businesses can predict exactly how much they will cost. Furthermore, when employees leave, subscriptions can be discontinued and cost can be reduced. The only software that is truly used is purchased. The need to overbuy in the name of predicted growth is no longer an issue with the subscription model. Subscription licensing also provides huge flexibility and supports business growth by allowing businesses to pay only for what they use, as they use it. IT Benefits: How the Subscription Model Helps Tech Departments Work Smarter Not Harder Now that we know it makes financial sense, let’s take a look at the IT benefits gained by adopting the subscription model pricing. First and foremost, IT efforts are streamlined because relationships with finance and human resources are optimized using the subscription model. This eliminates redundancies and helps make all components of business work in support of one another. But the subscription model offers far more IT benefits than that. Let’s outline some of the specific ways that the subscription model optimizes business IT: Best Practices and Automatic Updates Business IT is enriched thanks to the effective enforcement of best practices through the subscription licensing model. Businesses are often on the fence when it comes to investing in new software versions, which often results in support issues, unnecessary complexity, and frustrated users. With subscription pricing, IT is constantly supplied with the latest updates for users, which strongly enriches functionality and user experience. Simply put, the subscription model makes software optimization relatively automatic. Optimized License Management Speaking of automatic, the subscription model also enriches overall IT efforts by optimizing licensing management. The subscription model makes it far easier to determine license availability and need. Internal audits are unnecessary because the licensing process is generally handled via an authentication mechanism with the vendor. This means unless some drastic and specific effort is taken to violate licensing protocols – like cracking software or some other extreme measure – licensing accidents are very rare and easy to mediate. Customization and User Control The subscription model also offers a huge boost when it comes to customization and user controls. Some employees require a more dynamic feature set than others. In the traditional, license purchase model, complex processes would be required to designate user permissions and customize account controls. With the subscription model, licenses can be purchased at the minimum level and upgraded as needed. The model offers the ability to easily customize per user, over time, based on a variety of different needs. This makes it easier than ever for administrators to customize access and optimize user experience Okay, The Subscription Model is Great – But Should You Go Microsoft or Google? Understanding the benefits of the subscription model is just the first part. While there are many providers on the market, the clear leaders are Microsoft’s Office 365 and Google’s G Suite. While both models offer their service through a subscription pricing model, there are some key things to consider when choosing a provider to subscribe to. When it comes down to it, we’re team Microsoft. To understand why let’s break down the benefits and limitations of each platform: Microsoft Office 365 POWER Office 365 is the market champion when it comes to business software. It’s familiar, integrated and has a legacy all its own. Under the subscription model, users can subscribe to on-server versions, Cloud versions or both – making anytime work a constant possibility. Additionally, since Microsoft has been on the market so long, they’ve worked out bugs and created a truly optimized package of integrated apps. CUSTOMIZATION Customization and user control runs at optimal levels in Office 365. Licenses
If you’re a gamer, especially a console gamer, you’ve no doubt heard of or are watching the Xbox One X. Microsoft has taken its flagship console, the Xbox One, and turned it up a few notches. Sporting 40% more power than any other console on the market and a 6 teraflop GPU (that’s crazy fast), it’s able to produce true 4K visuals. The new Xbox comes equipped with a 4K Blu-ray disc drive ( the only console that has this), 4K DVR and 4K streaming, fastest load times of any console on the market, and is compatible with all of your Xbox One games and accessories. The Xbox One X comes with a 1TB hard drive and retails for $499.99 and is in stock at most retailers but you might want to check availability before driving down to your local retailer. The Xbox One X is an impressive piece of hardware that brings 4K visuals to stunning life. Now you just need that beautiful new 4K TV. (check back next week for more on 4K TVs)
We like tech, it’s what we do. As the holiday shopping season kicks into overdrive, we are bringing you 12 of the most requested, most wanted tech gifts for 2017. Check back each business day between now and December 19th for another must-have tech item and why you should check it out. There’s little denying that this year’s “must have” tech item must be the new iPhone X from Apple. The iPhone X (pronounced “ten”) arrives during the tenth anniversary of the original iPhone back in 2007. Apple has released their iPhone 8 this year as well, but the big dog here is the iPhone X. Sporting a 5.8-inch, OLED super retina HD display, the screen is capable of 4K video up to 60 frames per second, stunning colors, true blacks, and a 1,000,000 to 1 contrast ratio. It’s the largest iPhone screen to date. It sports dual 12 MP cameras that use facial recognition to unlock your phone. The home button is gone and has been replaced with facial recognition. The phone is water and dust resistant and covered front and back in the most durable glass in a smartphone. The iPhone X has an all glass and steel construction including surgical grade stainless steel. The new iPhone charges wirelessly. If all this sounds like your cup of tea, prepare to empty the bank to get one. The 64 GB model will run you $1,000 while the 256 GB model goes for $1,150. It comes in both silver and space gray. All Apple stores, carriers, and retailers have limited stock with several not shipping until mid-December. It’s best to get your order in as early as possible. The new iPhone a bit too pricey this holiday? Don’t worry, {company} has you covered. Keep an eye out next week for a less expensive alternative for the must-have smartphone. Happy Holidays and good luck on the tech hunt from all of us here at {company}!
Breaking Down Compliance Concerns for Healthcare Providers Using Skype Every day, we work alongside a variety of healthcare providers to ensure HIPAA data compliance standards are implemented correctly. As technology-for-business continues to evolve, instant messaging platforms – like the one provided in Skype – offer a convenient way of quickly communicating information between team members or departments. However, we’ve been getting this question a lot lately: is Skype HIPAA compliant? More specifically, can Skype be used to send electronic protected health information (ePHI) without violating HIPAA mandates? Very simply, should healthcare providers be using Skype when it comes to the transmission of sensitive patient health data? The debate is still out on Skype and HIPAA compliance. Skype does include built-in security features to prevent unauthorized access of transmitted data, and all Skype messages are encrypted. However, built-in security tools don’t necessarily mean total HIPAA compliance. When it comes down to it, the way healthcare organizations implement and use Skype is what makes the difference when it comes to compliance. First Things First: Is Skype Considered a Business Associate under HIPAA? Under HIPAA, business associates are defined as any organizations or people working in association with or providing services to a covered entity who handles or discloses Personal Health Information (PHI) or Personal Health Records (PHR). So, does Skype count? Again, this is a topic that is continually up for debate. Technically, Skype could be considered an exception to the business associate mandate, under the HIPAA Conduit Rule. The Conduit Rule stipulates that any conduit through which information flows does not require an explicit business associate agreement. However, don’t get too excited. A business associate agreement is necessary if a vendor creates, receives or transmits patient data on behalf of a HIPAA-covered entity or one of its business associates. While Skype definitely doesn’t create personal health information, it can be used to receive and transmit it. However, it should be reaffirmed that Skype messages are encrypted – both in transit and at rest – and Microsoft doesn’t access these messages unless there is a legal subpoena to do so. In the case of subpoenaed information, data must first be decrypted. Therefore, it becomes unclear that whether providing information to law enforcement and being able to decrypt messages, would mean Skype would no longer satisfy the Conduit Rule. Furthermore, Skype is a software-as-a-service as opposed to a common carrier. There’s no doubt that all the legal jargon is enough to leave your head spinning. That’s why, we urge clients and other businesses to air on the side of caution and consider a Skype business associate, requiring a business associate agreement. Better safe than sorry. When it comes to drafting a business associate agreement, Microsoft generally will sign a HIPAA compliance associate agreement for a providers entire Office 365 subscription. Additionally, Skype for Business may be included in that overreaching agreement. However, in order to ensure compliance, make sure you look over your business associate agreement with Microsoft to make sure that Skype for Business is included and covered. Microsoft has recently explained that not all business associate agreements are the same – so play on the safe side and get specific. Skype and HIPAA Compliance: Encryption, Access, and Audit Controls While HIPAA doesn’t insist that ePHI is encrypted, they do outline encryption as a mandatory consideration. Basically, if a covered entity decides not to use encryption, they must outline and implement an equivalent safeguard instead. When it comes to Skype, all messages are encrypted using AES 256-bit encryption; therefore, this aspect of HIPAA compliance is taken care of. However, the problem lies in administrative controls for back-up and auditing. Skype doesn’t automatically include appropriate controls for communications back up, nor does it maintain a compliant audit-trail, as mandated by HIPAA standards. Without these features, Skype simply isn’t HIPAA compliant. However, there may be a workaround if healthcare organizations are implementing Skype for Business instead of the basic app. The Final Verdict: Is Skype HIPAA Compliant or Not? So, lets cut to the chase: is Skype HIPAA compliant or not? The short answer is no. As a standalone application, the basic Skype platform does not comply with HIPAA compliance regulations. So, for healthcare organizations who rely on Skype – let this be your warning to never send ePHI via Skype instant messaging. However, for organizations using Skype for Business – like many of our clients – the platform can be made to better support HIPAA compliance – but only if it is implemented correctly. If the Enterprise E3 or E5 Skype For Business packages are purchased, the application can be configured to better support HIPAA mandates. However, it’s up to your organization to ensure that compliance standards are met. This means that you must actively set up a business associate agreement with Microsoft, before using the Skype for Business app to transmit any kind of ePHI. Furthermore, the application must be configured carefully. In order to be fully HIPAA compliant, Skype for Business must maintain an audit trail and all transmitted communication must be saved and backed up securely. Additionally, access controls must also be applied to all devices that use Skype for Business to prevent any and all unauthorized disclosures of ePHI. Controls must also be configured to prevent any sensitive information from being sent outside the organization. Finally, healthcare organizations must also implement agreements that insist Microsoft will notify them immediately in the event of a breach. But, let’s not get ahead of ourselves… Unfortunately, it must be noted that even with a business associate agreement and the correct application package, there is still significant potential for HIPAA compliance to be violated when using Skype for Business. The short answer is, when it comes to Skype for Business, it’s hard to be entirely confident that all HIPAA regulations are upheld. However, healthcare companies need not panic or dig out the post-it notes. There are many secure instant messaging platforms available to healthcare providers, designed specifically for use by the healthcare
Online shopping is something many are becoming increasingly familiar with in the digital age. From Amazon Prime to special online-only sales, anything one could ever want, or need can be bought online. However, an aspect of online shopping that is often overlooked is security. This means being aware of what sites you are visiting as well as what information you are providing. There are several steps that are easy and effective in ensuring online safety that anyone can and should work on implementing into their everyday lives. Don’t Shop on Public Wi-Fi Inputting your personal information on any site while on public Wi-Fi or a hot spot is just asking for that information to be stolen. These Wi-Fi spots are not secured and allow anyone access to them. Everyone can see what everyone else is doing, including shopping. You wouldn’t want to type out your Amazon password with a stranger looking over your shoulder, but that’s essentially what you’re doing when on a public network. You also want to be wary of stores that use Wi-Fi or Bluetooth to track your movements within their stores or websites. This could be another potential avenue for hackers to get into your device and steal your data. Password protection dos and don’ts You’ve probably heard this a thousand times before, but protecting passwords is the easiest thing you can do to safeguard your information. You should have a different password for each site or app. Using a password manager can be helpful with this. You also want to make sure that you are changing your passwords on a regular basis, at least every thirty to ninety days. Unique passwords or sentences as passwords are also a good idea. The more complicated the password is the better. It’s also a good idea not to share your passwords with too many people. Is it really secure if ten people know it? Virtual account numbers Virtual account numbers are special cards with a set time and amount to spend, and after they expire the card and money on it are no good. This is a safe alternative to using your debit card online. If someone gets access to your debit card, they have access to your bank account and could end up costing you plenty before the transactions are sorted out. If you don’t have access to this type of card a standard credit card is still more secure than a debit card. Most credit card companies give you 60 days to report theft, while some banks only give you 2 business days for reporting debit card fraud. Beware of links in emails and on social media The days when you could safely click a link on Facebook and buy that new amazing thing safely and securely are gone. Today hackers are using links and attachments to deliver malicious malware and ransomware to your system. It is always best to type in the address to your address bar manually, rather than clicking the link. Always make sure that the site you think you are going to is actually the site you end up on. You can verify that the link is legit by hovering your mouse over it, which will display the address it links to. This way you can see where the link takes you before clicking it. It doesn’t hurt to follow the old adage, “if it’s too good to be true, it probably is.” So, if that post on Facebook for the $20 iPad seems like too good of a deal, it most likely is. Stick to reputable sites and places you have shopped before. Losing your money to thieves is not worth saving money on a tablet. Beware of what info is asked for Would you enter your social security number on Amazon if they suddenly asked you to provide it to make a purchase? Of course not. Be wary of what information the site is asking for. If it seems strange or out of place, it’s probably not legit. Things like name, phone, email, and address are all pretty standard things for a shopping site to ask for. Social security numbers, bank account numbers, or driver’s license number however are not standard practice for shopping online. You also want to make sure that what the site is doing with your information is legit and that they aren’t selling it or stealing it for themselves. Always know the privacy policy and terms of service, especially when you aren’t sure about the site. Also, make sure that the site is protected and secure before entering any personal information. Look for the https When you visit a webpage look for the https in the address. The difference between http and https is how secure the site is. The extra “s” means that the site is secure and safe. It encrypts the message so that only the intended recipient sees the information. If you’re shopping there it should have https in the address bar. If it doesn’t, don’t shop there. Beware shopping on mobile devices We all do it. We hit up Amazon or some other shopping app on our phone or tablet because it’s easy and convenient. We like shopping from our couches or chairs without going to the computer. But the potential for identity theft or the theft of your payment information is far greater from a mobile device than the family desktop. Beware of shortened URLs. It is common to see them on a phone or mobile device, but could also be a trick to get you to click on them. Use the full address and avoid these shortened ones. Another thing to remember is to download a virus protection app for your device. Most devices don’t natively come with one, but the device is just as prone to hackers and malware as your PC. You want to keep them clean and safe, especially if this is your primary means of shopping or browsing. Understanding how online security works is a
Combatting Cybercrime with Multi-Factor Authentication in Microsoft Azure For business owners, the cybercrime landscape is only getting worse. More and more, businesses are looking for the best ways to lock down company data and implement strengthened lines of defense. Two-step account verification is becoming an increasingly popular means of keeping hackers away from business account data. Breaking Down the Basics: What is Two-Step Verification? Two-step verification serves as a critical second layer of security that demands an additional method of authentication to allow user sign-ins and transactions. It works by requiring two forms of account authentication to prevent unauthorized access or account hacks. Two-factor authentication involves any two or more of the following verification methods: Something a user creates and knows (typically a password) Something only the user has possession of (a trusted device that is not easily duplicated, like a smartphone or tablet) Something entirely unique to the user’s actual being (biometrics like fingerprint logins) Today, more than ever, people are increasingly connected – especially across the business landscape. Between smartphones, tablets, laptops, and PCs, business users have multiple ways to access accounts and applications from anywhere. Two-step verification allows business users to implement an extra layer of protection in this growing digital atmosphere. Furthermore, as leaders in business technology optimization, Microsoft has wasted no time in implementing their own two-factor authentication method for Azure. Secure Azure: Benefits of Multi-Factor Authentication in Microsoft Azure Azure Multi-Factor Authentication (MFA) is an easy to use, scalable, and reliable two-factor authentication solution that provides increased protection of user accounts. Azure MFA helps professionals control and protect access to data and applications without creating a ridiculously complicated and irritating sign-in process for users. Azure MFA allows users to implement a reliable authentication system, through a variety of mediums. Let’s break down the key benefits of implementing Azure MFA: Easy to Use First and foremost, Azure MFA is incredibly simple to implement and even easier to use. The extra protection that comes with Azure MFA allows users to manage their own devices which alleviates the security burden for management and IT admin staff. Scalable Azure MFA harnesses the power of the cloud and integrates seamlessly with on-premises applications. This means Azure’s authentication feature can handle high-volume, mission-critical situations and is equipped to support business growth. Consistent Protection Azure MFA is designed specifically to ensure consistent and user-friendly authentication processes for business users. Azure MFA provides this consistent protection by deploying the highest industry standards and best practices. Reliable Because business never sleeps, Microsoft guarantees 99.9% availability of Azure MFA. The service is only unavailable when it is unable to receive or process verification requests for authentication. How it Works: Functionality Considerations for Azure Multi-Factor Authentication Azure MFA is so secure thanks to its layered approach to protection. Hackers looking to gain unauthorized access to an account will have a much harder time compromising multiple check-points as opposed to basic, password-only options. By implementing Azure MFA, even if a cybercriminal were to crack a user’s password, the information would be useless without possessing a trusted device or completing the next authentication step. Azure Multi-Factor Authentication helps lock down access to data and applications while meeting user demand for a simple sign-in process. It provides additional security by requiring a second form of authentication via a wide range of easy and customizable verification options. The following are a list of methods that can be used for second-step verification: Phone Call Here, a call is automatically placed to a user’s registered phone. To authenticate access, users enter a PIN if necessary, followed by the # key. Text message If preferred, users can also receive a text message to their mobile phone. The text message will provide a six-digit code and users then enter this code on the sign-in page to authenticate. Mobile app notification Users can also set up verification through the Azure mobile app. A verification request will be forwarded to a user’s smartphone, and the user is then able to enter a PIN if necessary, followed by selecting Verify on the mobile app to authenticate. Mobile app verification code Similar to the previous option, the Azure mobile app also has a verification code feature that users can take advantage of. The app, running on user smartphones, has a tool that generates verification codes that change every 30 seconds. Users select the most recent code and enter it on the sign-in page to authenticate. Third-party OATH tokens Finally, if for whatever reason, the above options aren’t preferred, the Azure Multi-Factor Authentication Server can be configured to accept third-party verification strategies as well. IMPORTANT NOTE: Azure Multi-Factor Authentication provides varying verification methods for both the Cloud and server platforms. Business owners can choose which methods are available for users. For full details, check out info on selectable verification methods. Strategies for Implementation: Getting Started with Azure Multi-Factor Authentication Now that we have the lay of the land, let’s take a look at the steps necessary for implementing Azure MFA for business users. Implementing the solution isn’t difficult at all and if business owners follow this step-by-step guide, they’ll have a second layer of security deployed in no time. PREREQUISITE Before anything else, businesses must be signed up for an Azure subscription. In order to take advantage of Azure MFA, businesses who do not already have an Azure subscription will need to sign-up for one. If you are just starting out and want to take a test-drive, there is a trial subscription option. Enable Azure Multi-Factor Authentication This part is generally easy and automatic. As long as business users have licenses that include Azure MFA, there’s nothing that you need to do to manually activate the feature. You can start requiring two-step verification on an individual user basis under the following Azure licenses: Azure Multi-Factor Authentication MFAAzure Active Directory Premium Enterprise Mobility + Security However, if you don’t have one of these three licenses, or you don’t have enough licenses to cover all business users, you’re not