Should Your Company Outsource IT?

By |2017-07-27T17:49:21-04:00July 27th, 2017|IT Support, Uncategorized|

IT service providers deliver the technical expertise small businesses need at a much lower cost than hiring IT staff. They can recommend, install, and manage technology according to business’ objectives and core competencies and ensure that critical data is safe.

That’s why nearly 70% small to medium sized businesses (SMBs) work with an IT service provider for some or all of their IT needs.

There are many considerations for SMBs thinking about moving their IT to another company. In this eBook, we’ve summed up the key factors to help you decide what’s best for your company.

Let’s get started!

What’s An Managed Service Provider (MSP)?

An MSP, or managed service provider, is an IT service professional to which SMBs outsource their IT needs. MSPs are the guardians of IT, delivering ongoing monitoring and management of client applications (email, web site, security, etc.) and IT infrastructure remotely. This is typically accomplished through remote monitoring services, which allows them to keep tabs on the health of their clients’ IT environments, change and update systems, and troubleshoot problems. MSPs closely monitor a wide variety of IT solutions a business has implemented, including web apps, desktop and server management software, backup and disaster recovery, storage management tools and security software.

Check out our EBook ‘Should Your Company Outsource IT?

Feel free to Contact Us for more information.
>

BEWARE: Phishing Scam for Office 365 Users

By |2017-07-12T13:56:06-04:00July 12th, 2017|Office 365 & G Suite, Uncategorized|

91% of cyber attacks start with a phishing email. From CEO fraud to ransomware, these attacks are a big problem for businesses.

Another phishing scam is happening for Office 365 users around the world.

What we know: • This type of hack creates rule(s) in Office 365 online mailbox to delete Sent item, contacts, etc. • It changes the User ID and account information to Dropbox Inc. • It accesses to other mailboxes, data and information on other accounts in Office 365 • It generates lots of spam emails that cause Office 365 mailbox to be locked.

To prevent this hack from happening: • Backup Office 365 accounts • Setup two factor authentication sign-in • Setup password reset policy

The best way to prevent this from happening to your office is to have Cloud-to-Cloud Data Protection. We offer all-in-one backup, search, restore and export solution for Office 365 or G Suite. E-Tech ensures business-critical data is always backed up seamlessly, restored quickly and protected securely.

What are the benefits? • Take full control of your organization’s Office 365 or G Suite data. • Protection against accidental or intentional deletion of data by users. • Protection due to ransomware hacker attacks. • Protect against data loss due to inactive license or scenarios that are not covered by Microsoft or Google. • Time loss in restoring files: Contacting Microsoft or Google Support for assistance with possible data loss issues and restore options after identifying the proper previous version is very time consuming. • Data loss within previous draft, accessing the previous versions in OneDrive or Google Drive is not an option as it saves only the most recent version, not the entire history. • Unlimited backup retention, this means your backups will never expire. • 3x/day automated backup. Perform additional backups as needed at any time. • Security controls that include compliance with SOC 2 Type II, HIPAA, and Safe Harbor. Data is secured with 256-bit encryption. • Browse and preview backups by user and item. Search for metadata. • Restore individual files or groups of files back into a user’s account or export them directly to your machine. • Monitor data with domain health status and activity log.

Try out our Cloud-to-Cloud Data Protection for Office 365 or G Suite for 15 days FREE Trial. As low as $3.99/mailbox user/month.

Feel free to Contact Us for more information.

>

Traditional Backup VS. Intelligent Business Continuity

By |2017-03-20T10:42:09-04:00March 20th, 2017|Uncategorized|

Traditional backup methods, such as tape, disk, or online only, are no longer sufficient. In fact, leading edge business owners are finding them unacceptable, due to their inability to recover data quickly and mitigate downtime. Technological innovations have established a comprehensive new standard, Intelligent Business Continuity (IBC). Only an IBC solution will ensure data protection, data security, instant recovery, mitigate downtime and ensure continuity.

Traditional Backup:

  • Can take weeks to recover data after a disaster occurs, if the data is recoverable
  • High risk of failure due to heavy manual administration: 58% of downtime is due to human error
  • Difficult to test if a backup is working properly
  • Time consuming and expensive to make a copy of, and store, backups in multiple locations
  • 61% of SMBs still ship tapes to an off-site location
  • Backup speeds are slower
  • Difficult to prioritize important data, files and applications
  • Physical to virtual conversions can be time consuming and have a high failure rate
  • Data and backups are at risk when based in only one location, either local OR in the cloud
  • Limited options for encrypting data, may not pass industry regulations (i.e., HIPAA, SOX)
  • Tape failure rates can exceed 50%
  • Potential for theft of loss of media
  • Perceived cost savings are deceiving–average cost of downtime is $163,674 per hour

Intelligent Business Continuity:

  • Downtime after a disaster is reduced to hours, minutes, or even seconds
  • Fully automated backup process—very little manual management required
  • Automated screenshots are taken of each image-based backup, to verify a successful backup
  • Each image-based backup is automatically saved in multiple locations for redundancy; local appliance and secure data centers
  • Quick and efficient transfer of files to off-site data centers, even with low bandwidth or busy networks
  • Critical data can be prioritized, to be transferred offsite first
  • Instant virtualization in mere seconds, due to both proprietary technology and already saved VMDKs
  • Avoid risk of downtime from a local disaster, as backups are stored in both local device AND secure cloud
  • AES 256 and SSL key-based encryption ensures data is safe both at rest and in transit, to meet industry regulations (ie. HIPAA, SOX)
  • Minimal risk of corrupted backups or data loss
  • Off-site backups stored in SSAE16 Type II data centers, ensuring security
  • The ability to keep your business running in the event of disaster has immeasurable value

Having a Business Continuity and Disaster Recovery plan is integral to the success of any Small Business or Non-Profit Association. For a visual demonstration, check out our videos.

Feel free to Contact Us for more information.

>

Cyber Theft Data Breaches are on the Rise for Non-Profits and SMB’s

By |2017-02-13T09:07:35-05:00February 13th, 2017|Infrastructure Security, Uncategorized|

Here’s one thing the cybersecurity world can agree on: there is no single product available today that will solve all your cybersecurity problems. In today’s world, it takes many technologies and processes to provide comprehensive risk and security management. Instead, Non-Profits and SMB’s should continuously be checking their systems for vulnerabilities, learning about new threats, thinking like attackers and adjusting their defenses as needed.

(more…)

5 Benefits of Partnering with a Managed Services Provider (MSP)

By |2017-02-13T09:01:56-05:00February 13th, 2017|Uncategorized|

A Managed Services Provider (MSP) is an Information Technology (IT) services provider that manages and assumes the responsibility for providing a defined set of services to its clients by remotely monitoring, managing, and updating their clients’ technology infrastructure, systems and services. This can include email, network and security software, and other Non-Profit and SMB applications that may be needed. Under managed services, the IT provider takes responsibility for the client’s network and provides regular preventative maintenance of the client’s systems.
(more…)

Title

Go to Top