Mode:         
Posts

What Surveys Say about Moving to the Cloud

Cloud ServicesCloud computing has surged in popularity. The 2015 Cloud Security Spotlight Report clearly makes this point.  More than 70 percent of the 1,010 participants reported that they use or plan to use a cloud computing solution.  Yet, some organizations are still apprehensive about using the cloud.

Common Concerns

Organizations hesitant about cloud computing are often concerned about:
Security. Security is by far the biggest concern preventing organizations from embracing the cloud. They are afraid that their data will not be as safe in the cloud as it is in their on-premises systems.
Lack of control. Some companies are leery they will lose control of their data if they move it to the cloud.
Compatibility. Organizations fear that their applications will not be compatible with cloud computing solutions.
Just a fad. Some companies view the cloud as just another fad. They believe that if they were to start using the cloud, their IT systems would become obsolete as soon as the next technological marvel comes around.

Discovering What's Right for Your Business

Fears about the cloud often come from misinformation and a lack of knowledge. Learning about cloud computing can help ease your apprehension.

The 2015 Computerworld Forecast survey reported that over 40 percent of the IT executives surveyed predict they will increase their spending on software as a service (SaaS) and a mix of public, private, hybrid, and community clouds.

Searching the Internet about cloud security is not as helpful. For every article or blog you find saying it is safe, you will find another one saying it is not. Talking with IT experts is a better course of action. You can discuss the security issues that pertain to your data and applications to determine whether using the cloud is a good fit for your business. They can help you decide on the best type of cloud options for your company and show you the best ways to keep your data safe and in your control.

IT experts can also help you understand the savings that cloud services can provide.  A cloud solution may not be a fit for everyone, but contact our offices today to see what is right for your business at (301) 854-0010.

Comments (0)

Demystifying the Cloud [Online Webinar]

Cloud ServicesDid your office productivity grind to a halt during last weeks winter storm? Are you interested in innovative ways to securely work remotely from any device?

Participants in the webinar will learn how advances in cloud services can provide employees of all size firms the ability to securely work from anywhere.

You will understand how the integration of servers, desktops, mobile devices and applications in the cloud can reduce expenses and increase your peace of mind. 

Topics:
Remote and mobile productivity
Secure file sharing 
Mobile device access 
Reducing capital expenditures 
Back up and recovery 
Improved firm data security

Learn how more advanced cloud solutions can transform the way you work today.

Date:
Wednesday, Feb 17, 2016
12:00 pm -1:00 pm

Where:
Online Webinar

Presenters:
Dave Kile - Senior Vice President, Ease Technologies, Inc.
Pat Bubeck - Cloud Engineer, Ease Technologies, Inc.

I'm ready! Sign me up



Comments (0)

4 Steps to Prepare for a Major Storm

winter stormThe mild winter we started out with in the Baltimore-Washington Region last month has now turned something we hear about in movies.  Is your office prepared?  Follow these steps to weather the storm.

1. Keep an Off-Site List of Contacts
You probably have thousands of customers and vendors. Keeping an offsite contact list will allow you to stay in touch with them and keep your business running during downtime. This list should contain vendors that you need to contact every week, as well as any customers with current, unresolved issues. A printed paper version can be important and don't forget to keep a list of employee phone numbers too.

2. Back Up Critical Data Offsite or in the Cloud
You only have a day or two after forecasters tell you that a storm has a high chance of hitting your area. Power failures, melting floods, and even looting are all risks to your infrastructure and data that come with a severe storm.

A thorough disaster recovery plan will already accommodate the offsite storage of critical data. If you don't have such a plan, you'll want to start backing up critical data to an offsite location as soon as possible. This will give the data time to fully transfer before the storm hits.

One of the best options is to store your backups in the cloud. Data saved in the cloud is also readily available and redundantly stored.  Implementing cloud backups can take some time to plan, store and test.  

3. Have a Communication Plan
Work with your employees to create primary and secondary ways of to communicate during the storm.  You might want to forward your phones or extensions to cell phones.  Many newer VoiP phones systems provide a lot of options including just carrying your office phone home and plugging it into you home Internet connect.  Email and even texting should be part of the triage plan.  Not only do you want to have plans that include employees, but what is your message to your customers.    Some companies have used social media like Facebook and Linkedin as ways to stay in touch as well.

4. Practice Your Recovery Plan
Test restoring your data to your servers. Ensure that your local and remote backups can be used to restore operations in the event that you suffer extended downtime. Stepping through your recovery plan makes everyone familiar with what needs to be done to get your company back up and running.

Need help with your own disaster recovery plan? Automated backups are your best defense against massive data loss. These systems mean one less headache when worrying about your business during a winter storm. Contact us as soon as possible and we'll help you set up a complete data backup procedure to ensure that you don't lose data in case of a catastrophic event. Contact Ease Technologies today at (301)854-0010 and learn how our Ease Cloud Workspace can help keep your business secure in Baltimore-Washington Region.
Comments (0)

How to Create a Small Business Cloud Policy

cloud services

As you begin to move your company away from a physical infrastructure and into the cloud, it's important to make sure that proper security policies are in place. While you may have a general information security policy, don't think that absolves your organization from the need for a specific cloud security policy. The dangers that come along with using cloud software or infrastructure are markedly different than those of the typical security concerns encountered by most organizations.

The biggest risk for most cloud applications is a breach of the cloud provider's security. There is no real way to create a policy averting this risk, so the ideal solution is to look at things from the perspective of risk management—all cloud providers need to be evaluated for risk, based on their history, the architecture they use, stated security measures in place, and the value or risk of data being stored on that cloud platform.

The second biggest risk for organizations is employee negligence and inappropriate cloud usage. Curbing this risk requires several steps. First is identifying a point person in your organization, usually the IT manager, who will evaluate cloud services and approve or deny requests to use certain cloud providers. Next, employees need to be informed that they are not to use cloud services unless they have been vetted and approved by the point person. Finally, organizational data needs to be stratified by level of security it requires, so that cloud services can be evaluated for certain levels of security. For example, while one service may be perfectly fine to temporarily store or transport low–security information, it might not be secure enough for high–security information. Employees must be made aware that using cloud services is a major risk, and not to be done without authorization.

All cloud policies should integrate a worst–case–scenario plan. This can include plenty of redundant backups in case the cloud service storing your data goes down. It should also include a communication plan to inform your clients and customers in the event of a security breach at your cloud service provider.

Cloud services can offer your business a lot of flexibility and significant savings, but unless they are approached in a methodical and cautious manner, they can result in significant risk. A good cloud service policy is the biggest step towards minimizing this risk.

To learn more about how cloud services can cut costs and improve you company security check out the benefits of our Ease Cloud Workspace™ or call us today at (301) 854-0010.

Comments (0)

5 End of Year Technology Focus Areas

We are in the time of year when many business owners and CFOs think of their end of year business planning. It is a good time to look at your technology end of year needs as well.  I have covered these five tips:  

1. Technology Budget Planning

2016 tech planningCreating a budget or planning a tentative budget for technological needs is not an easy task. Similarly, to set goals for 2016, a certain type of reviewing is required, looking to the past year. The business requirements need to be incorporated into these plans.  Will business expansion require increased bandwidth on your Internet connection? What ways can you improve the security of your client data? What can you do to add more secure remote users? These are just some of the important questions business managers might ask and need to plan for in the New Year.  Start with your business goals and previous year challenges to map out new technology investments or enhancements. 

2.  Passwords 

With so many security compromises occurring, following good password management practices is critical. If it has been a while, now is the best time to change and update your passwords.  Using passwords with long complex characters and unique to each site can’t be over stated.   A good New Year's resolution would be to start using a password manager to help you keep up with the tasks, such as LastPass or 1Password. 

3. Backups

Backups are the cornerstone to all disaster recovery plans.  Each business has its own backup and recovery requirements, but they should be reviewed regularly.  The biggest questions around backups tend to focus on the time to recovery and archiving data.   Do you have new accounts that are depending on you to work all the time?  Does the information you provide need to be stored and retrieved in a certain way, within certain time frames?  Updated back up plans will help your company to recover from a cyber attack, major equipment failure, or catastrophic mistake made by one of your staff members. 

4. Safeguarding Data

An annual review of all company and client data is important for obvious reasons, but may have compliance implications as well.   Putting safeguards in place can help to prevent fraud and identity theft, as well as enhances customer confidence and trust.  Safeguard reviews should start with an observance to HIPAA, IRS guidelines or other industry standards that may be necessary for your business. You will want to preserve the confidentiality and privacy of all data by restricting access and disclosure. This may not be a costly effort, but one that takes awareness and often simple procedures.  The recently updated Safeguarding Taxpayer Data: A Guide For Your Business from the IRS, offers many ideas on how to approach the topic, even if you are not an accounting firm.

5.  Policy Reviews

IT policies establish expectations and regulations for behavior related to company technology and networks. Liaise with managers to review past issues and update policies with the organization.  Review your current acceptable use policy and find ways to communicate expectations to your employees about proper technology handling. Also the Bring Your On Device (BYOD) policy and the Social Media Use Policy should be considered as a part of your policy review. 

Ease Technologies can help you determine the best ways to help you plan for prepare technically for 2016. Please contact us today at (301) 854-0010.
Comments (0)
Our Newsletter

Upcoming Events
Calendar Icon

Upcoming Events

Wounded Warrior iPad Training
2/18/2016 12:00 PM - 1:00 PM

Wounded Warrior iPad Training
3/17/2016 12:00 PM - 1:00 PM

Blog Archive

Archive by Years