3 ways a BYOD policy for your business will make your life easier

In an effort to stay current, many companies (even the US government) are moving their solutions and tools to the cloud. Everything is interconnected via the internet, so it doesn’t matter whether the staff is in the building or not.

There are countless benefits to this change, but migrating to the cloud has its own potenial problems. Here is one of the most basic one. How do you handle employees working from their own devices? Do you provide employees with company devices? Or do you just let them use their own if they want to?

While there are benefits to both approaches, a solid BYOD (Bring Your Own Device) policy can make the whole thing a lot easier on you. Especially if you lead a smaller company with limited capital.  You get the assurance of good cybersecurity practices, and your employees get the flexibility they want.

If you BYOD policy is well planned.

Who doesn’t want lower overhead?

You can’t zero-out your IT budget. Not unless you want your staff to ditch all technology. (We don’t recommend that.) But there are ways to bring your tech-based overhead down.

Like utilizing BYOD.

Providing a device for every employee has a steep upfront cost, especially for an SMB or startup just getting on its feet. Even a cheap laptop will run in the hundreds-of-dollars. More specialized equipment, like Apple products for your design team, will cost even more.

We recommend providing equipment that’s essential to your staff to do their jobs. But if you already do that and they want to use their own tablet or laptop, as well, that benefits you—without an additional cost.

Factor in the increase in productivity, and it’s an automatic win for you.

Speedier training

Think about this: if you could get a boost in productivity with no investment of time or money, would you?

That’s what you get with a BYOD policy.

When your staff is empowered to bring in their own device, they’ll be working on equipment they already know and like.

No training. No expense. No lost time. You’ve preemptively checked off one item on their training itinerary.

Better equipment

People tend to update their personal equipment more often than their employers do. (And many businesses tend to hang onto their equipment much longer than they should). Newer equipment means tech tools that operate faster with fewer breakdowns and repairs.

Most people replace their personal devices when it’s convenient or when a newer device comes out, regardless of the performance of their current device. Businesses tend to replace their equipment when the old device breaks down, which could mean that it ends up being years out of date.

Long story short—most of the time a BYOD policy will mean your employees have greater access to newer equipment.

The policy itself

BYOD, in general, brings several benefits to the table. But without a written policy the practice can cause more trouble than it’s worth.

Here are several areas worth covering in the policy.

  • Acceptable use
  • What devices qualify for use
  • Whether the in-house IT department will perform repairs on personal devices or not
  • Whether the company will reimburse/subsidize for the use/repair of personal devices

And most importantly . . .

  • Security policies

The biggest downside to BYOD is the potential security risk. Since your IT team doesn’t directly manage these devices, you have limited control over what the user is or isn’t doing with them.

Your security policy should definitely include requirements for anti-virus and firewall use. Perhaps the IT team can give it a once-over as part of the employee’s onboarding process, or check in every so often to make sure the device is functioning properly.

A required best-practices training course could also be a good means of keeping the device safe for use on your network. And you should absolutely train employees to understand the inherent risks of using public Wi-Fi. Sure, it’s free, but it may not always keep your company data safe.

Nothing matters as much as security.

A BYOD policy has a lot of benefits—for your business and your employees. Just make sure you think through all the potential pitfalls.Do your research and draft a policy keeps your company data safe. And if you need some input from some experts in the field, don’t hesitate to give your managed IT services provider a call.

5 End-of-Year Tech Tips 2018

As many business owners, CFOs, and solo practitioners think about their end-of-year business planning, it’s a good time to look at your technology end-of-year needs as well. I have covered these five tips:

Passwords

With so many security compromises occurring, following good password management practices is critical. If it has been a while, now is the best time to change and update your passwords. Using passwords with long series of complex characters that are unique to each site can’t be overstated. A good New Year’s resolution would be to start using a password manager to help you keep up with the tasks, such as LastPass or 1Password.

Backups

Backups are the cornerstone of all disaster recovery plans. Each business has its own backup and recovery requirements, but they should be reviewed regularly. The biggest questions around backups tend to focus on time to recovery and archiving data.  Do you have new accounts that are depending on you to work all the time? Does the information you provide need to be stored and retrieved in a certain way, within certain time frames? Updated backup plans will help your company to recover from a cyberattack, major equipment failure, flood or catastrophic mistake made by a staff member.

Technology Budget Planning

Creating a budget or planning a tentative budget for technological needs is not an easy task. Similarly, to set goals for 2019, a certain type of review is required, looking at the past year. The business requirements need to be incorporated into these plans. Will business expansion require increased bandwidth on your Internet connection? in what ways can you improve the security of your client data? What can you do to add more security for remote users? These are just some of the important questions business managers might ask and need to plan for in the New Year. Start with your business goals and previous year challenges to map out new technology investments or enhancements.

Safeguarding Data

An annual review of all company and client data is important for obvious reasons, but it may have compliance implications as well. Putting safeguards in place can help to prevent fraud and identity theft as well as enhance customer confidence and trust. Safeguard reviews should start with an observance of HIPAA, IRS guidelines or other industry standards that may be necessary for your business. You will want to preserve the confidentiality and privacy of all data by restricting access and disclosure. This may not be a costly effort but one that takes awareness and often attention to simple procedures. The recently updated “Safeguarding Taxpayer Data: A Guide For Your Business (Rev. 6-2018)” from the IRS offers many ideas on how to approach the topic, even if you are not an accounting firm.

Policy Reviews

IT policies establish expectations and regulations for behavior related to company technology and networks. Liaise with managers to review past issues and update policies with the organization. Review your current acceptable use policy and find ways to communicate expectations to your employees about proper technology handling. And of course, incorporate a Bring Your Own Device (BYOD) policy along with guidelines on passwords, wire transfers and so on, as the Social Media Use Policy should be considered as a part of your policy review.

Top Holiday Tech Gifts for 2018

Do you struggle for gifts for that tech-savvy friend or family member every year?  Even millennials enjoy a lot of the newer tech gadgets on the market today. Here are a few of our picks from the Ease Tech Team this season.

The Apple Watch Series 4

The Apple Watch Series 2 brings advanced fitness-tracking capabilities as one of its more attractive features. The GPS, bright screen and waterproof features make it extremely compelling for anyone that has considered a smartwatch. This latest hardware and software is designed to work with the iPhone, offering the convenience of using a variety of apps like calendar, texts, weather, notes and reminders without needing to pull out a phone. Ideal for the health-conscious geek in the family. Cellular options available but the base price starts at $399 at the Apple Store.

NytStand

First came the iPhone, then the iPad and Apple Watch ─ and now Apple TV with a remote that charges just like an iPhone.  At the end of the day, your devices become a cluttered mess next to your bed. NytStnd is a charging station for all of your devices and organizes them in a presentable fashion for ease of use and decoration. NytStnd takes the clutter and frustration of nightly charging and cleans it up with an attractive all-in-one charging station. 

Google Home Hub

The Home Hub is Google’s first own-brand smart display, combing Google Assistant, advanced smart-home control and a digital photo frame into a neat and tidy package. You access your home assistant through your voice commands and are able to hear responses back or see them on the display.  Going for about $150 from Google during the holidays.

Audible

Do you have someone that is always in the car and never has time to read? Audible is a provider and producer of spoken audio entertainment, information, and educational programming on the Internet. Audible sells digital audiobooks, radio and TV programs, and audio versions of magazines and newspapers.  

Tile Pro

Do you know someone who’s always losing their keys, wallet or purse at home? Tile is a simple way of keeping track of your things while at home or traveling. It’s a little device that is attached to the thing you want to manage and then paired with your iPhone. Tiles work with keys, wallets, bags or bikes. They’re best when monitoring things in close range and urban areas. Tiles are relatively inexpensive, very easy to set up and even have replaceable battery options. There are several versions for bags and keys and one that has a flattering style for a wallet.

Zero Grid Electronics Travel Organizer – Cord, Cable, and Accessories Case

No more messy wires and fumbling for cords. Fully customizable for electronics and accessory organization. Neatly manage tech, cords, and gadgets in one secure place with this travel cable organizer.  Carry your total tech arsenal ─ perfect for chargers, converters, camera and iPhone accessories. Zippered pouch holds smaller memory cards, USB flash drives and more. Of course, Amazon for $15.

Battery recharging pack

All this mobile tech gear requires additional power while on the road. There are a wide variety of small powerful recharging battery packs that can keep those smartphones, iPads and digital cameras functioning and extend their battery life by many hours. Great for road warriors and families that are always taking trips. The RAVPower 16750mAh Portable Charger found Amazon is one of the best for about $35.

Portable speaker

The iPhone is one of the most advanced pieces of portable computing devices ever created. One way to turn that smartphone into a quality music player is by pairing it with a mobile Bluetooth speaker. The best speakers are portable, rechargeable, small and waterproof, but with good-quality sound. These can be taken on vacations, to the beach and to parties. The UE Roll Wireless Mobile Bluetooth Speaker meets all of these needs for about $90, and there are plenty of choices if you want to spend less too.

Stocking Stuffer Ideas

You can never have enough power adapters and charging cables. I always purchase extra USB car chargers, iPhone USB cables, and wall outlet adapters, as they are pretty inexpensive and always needed. A plentiful supply is great for travel, keeping in the car or office, or for use when a guest shows up. Again, found at Amazon for $5-$20.

Holiday Beer

A favorite amongst the Ease Tech Support Team is Mad Elf. Tröeg’s kicks off our inner Mad Elf momentarily taking over the support team. So blame “him” for this cheerful ruby red creation reminiscent of ripened cherries, raw honey and cocoa with notes of cinnamon, clove and allspice.

We taste: chocolate malt, cherries, honey, peppercorn

 

The Facts About Web Filtering at Schools

Technology has transformed education. Students have access to an endless supply of information, and teachers can leverage online tools to enhance lessons in every subject. However, there are drawbacks to allowing students unlimited use of the web through school-supplied desktops, laptops, and mobile devices.

Here are some facts that you need to keep in mind in order to make smart decisions about web filtering at school.

Web filtering at schools… and the law

When internet access started to become mainstream, schools were excited to have new research options to offer their students. Unfortunately, parents and teachers soon noticed a significant problem:

Unrestricted web-based technology made it possible for children to be exposed to obscene and dangerous content. Many cybercriminals took to opportunity to start collecting confidential data on school-based internet users. In addition, some of the more technologically-savvy students leveraged their school-based web access to partake in illegal hacking.

Congress developed a comprehensive response to these concerns by passing the Children’s Internet Protection Act (CIPA) in 2000. This law created requirements for web filtering at schools in exchange for participation in the E-rate program. The E-rate program gives educational institutions discounts on web-based technology.

CIPA requirements

If you choose to move forward with web filtering at schools, there are minimum standards you must meet to comply with CIPA. The most critical are as follows:

  • You must provide notice and hold at least one public hearing to discuss implementation of web filtering at schools.
  • You must also create an internet safety policy that covers monitoring the online activity of minors, access to inappropriate websites, safe use of email and other forms of electronic communication, illegal activity, and unauthorized collection and use of students’ personal information.
  • Additionally, you must offer education for students regarding appropriate online behavior and online safety.
  • You must choose software that can block access to obscene images, child pornography, and anything else considered harmful to minors.

It’s important to note that adult staff members are permitted to override web filtering at schools. Sometimes, they’ll need to so that they can conduct legitimate research or complete other appropriate activities.

Choosing software for web filtering at schools

A variety of technology vendors design and implement software for web filtering at schools. As a result, the specific results of a filter can vary. The biggest drawback? Web filters can sometimes block legitimate sources of information, causing problems down the line. For example, students may wish to research breast cancer, but they are unable to access the resources they need because the filter blocks all mentions of the word “breast”.

When choosing a provider and specific software for web filtering at schools, convenience and reliability are paramount. Administrators must install, configure, and maintain the software with ease. Additionally, they should have the ability to easily adjust the configurations as needed.

Most web filtering at schools functions through a combination of category and keyword filters. Ideally, you will be able to fine-tune these as necessary. Naturally, you’ll base this on your audience and the needs of your student population. Consider software that offers multiple access levels, so that teachers can conduct appropriate research without going through a lot of digital red tape.

Finding a school security partner

We’re experienced in scholastic IT solutions that take the burden of selecting, installing, and maintaining web filters out of your hands. Our experts specialize in full-service IT support, so that you can focus on your primary role as an educator.

Want to learn more? Reach out to us – we’re happy to answer your questions.

4 Must-Have Modern Technologies for Schools

Advances in digital technology aren’t just affecting the way that we work and live—they’re also improving how students learn in the classroom. 82% of teachers agree that students who use technology for education are better prepared for their future careers.

The good news is that adoption of these new-fangled technologies seems to be on the rise. In a 2016 survey, 60% of teachers said that they planned to increase their use of technology during the upcoming school year, and three in four said that they use technology every day with their students.

This article will go over four of the most transformative digital tools that are helping students of all ages learn more and perform better in the classroom.

  1. Interactive Whiteboards

Often called SMART boards after their largest manufacturer, interactive whiteboards are large displays that imitate the function of a whiteboard — without the need for messy chalk or smelly dry erase markers.

For one, interactive whiteboards are more “fun” to use than chalkboards, boosting students’ interest and engagement. Interactive whiteboards allow teachers to easily incorporate multimedia into their presentations, from text and audio files to videos and images. Teachers can even record lessons and save them for future playback.

  1. Laptops and Tablets

Laptops and tablets are a vital part of students’ digital lives. It’s only natural that they’re taking a more prominent place in the classroom.

In 2017, sales of Apple’s iPad to schools rose by 32% when compared to the previous year. Chromebooks, which are Google-issued basic laptops that run the Chrome operating system, made up just under half of all device sales in the education sector. More than 30 million children in the U.S. use Google apps for education such as Google Docs and Gmail.

There are a variety of benefits and use cases for laptops and tablets in the classroom. These include taking notes, watching lectures, finding useful information during lessons, collaborating with other students via Internet forums, allowing students to download and submit assignments online, and more.

Related: How to Build an Efficient IT Budget

  1. Class Websites

Students need access to a class website as their one-stop shop for learning. Class portals can host everything from lecture videos and homework assignments to blogs and discussion forums. These can allow students to help each other and share their ideas about what they’ve learned.

Depending on the institution and the tech-savviness of the teacher, this website may be custom-built. It could even be hosted on a third-party content management system such as Google Sites or WordPress.

  1. Augmented and Virtual Reality

The latest release of Apple’s iOS mobile operating system, iOS 12, includes support for augmented reality for the first time. While still not widely used, augmented and virtual reality (AR/VR) offer tremendous learning opportunities for students of all ages.

Related: 7 Ways to Improve Technology at Your School

By overlaying additional information onto real-world inputs, AR devices make it easier for students to learn through experience. For example, students looking at the night sky through AR glasses could see the names of the different constellations. It would be a great way to view more information about the stars in our galaxy.

Final Thoughts on Technologies for Schools

Regardless of the specific technologies for schools, all schools should seriously consider investing more in their IT infrastructure in order to improve educational outcomes for their students. By partnering with a managed education services provider, you can improve the predictability, efficiency, and security of your school’s IT resources.

 

6 Ways to Reduce Your Business IT Spending

The cost of implementing, managing and maintaining IT spending is one of the most challenging tasks any modern business faces. And like any expense, constantly searching for ways to minimize it is crucial to the long-term success of a commercial entity. But unlike other areas of expenditure, making significant cuts is often a highly complex process — fraught with potential for disruption and lost sales.

But there are a few quick-wins when it comes to reducing your business IT spending — you just need to know where to look for them.

1. Virtualize and Consolidate Your Servers

Don’t pay for servers that you’re not going to utilize fully — which is a mistake a lot of small business owners are still making today. Instead, adopt virtual servers that consolidate your total capacity by making applications share existing servers. This one move can slash capital expenditure within your IT department, and cut the costs of security, maintenance and repair.

2. Consolidate Systems and Software

As businesses grow, so do their IT infrastructures. Over time, these systems can become disjointed and inefficient. For example, imagine all of the employees in your IT team are expected to create their own documents. You might find that there are several word processing packages in operation, along with several different storage and email solutions. By consolidating these services within a new ERP platform, you should be able to make the processes involved more efficient — and cheaper.

3. Implement a BYOD Policy

More and more firms are slashing their IT budgets by implementing a “bring your own device” (BYOD) policy. For example, rather than splashing out on new phone contracts and laptops for your team, you can provide a small cash incentive for people to use their own devices. This, combined with a move to cloud-based business platforms, should deliver significant IT spending savings on both hardware and software.

4. Leverage Bundled IT Deals for Discounts

The average IT department has, at the very least, phone and internet charges to cover. But by bundling these together and buying them as a package from a single supplier, you might be able to secure a hefty discount. It may also be possible to add other services such as VoIP, mobile services and security to the bundle.

Related: How to Manage Your Business Technology

5. Outsource Support

Maintaining IT systems and repairing them when things go wrong is usually a complex, specialized job. A lot of firms hire employees to take care of these tasks and to oversee data security issues. But the cost of employing specialists directly is often prohibitive. In most cases, outsourcing this area of IT is the most cost-effective option for SMBs. When support is needed, help is usually available via email, live chat or a 24-hour telephone helpline.

6. Switch to the OPEX Cloud Model

There’s a cloud-based software platform for just about every business function imaginable. Whether you’re managing your business’ tax affairs or nurturing leads, the software you need is available on remote servers — for a relatively modest subscription charge. Switching to OPEX-based cloud services reduces your reliance on hardware, and cuts the cost of data security, malware protection and maintenance (all of which are included in the price).

Before you make cuts to your own IT budget, consult with an IT spending specialist from us at EaseTech. We’ll talk you through your options, based on your business’ specific requirements. This should allow you to trim your expenditure without adversely affecting your operations or the service you provide to your customers.

How to Build an Efficient IT Budget

Technology continues to advance at a rapid rate, and every industry has been affected. IT plays a role in most aspects of doing business, from connecting with clients to producing products and services.

Allocating an IT budget is no longer optional.

You simply can’t compete without digital communication and efficiency tools, so a certain amount of investment in IT solutions is crucial to your success. However, unrestricted spending isn’t practical. The key is finding a balance between the IT expenses that are critical to your business and those that add unnecessary costs.

Category 1: Basic IT Expenses

At first glance, it may appear that your basic IT expenses are non-negotiable. Many organizations carry the costs of IT hardware, infrastructure, applications, and related maintenance over from year to year with minimal review.

Related: 3 Ways to Save Your SMB Money with Technology

However, this assumption can be costly. As technology advances, replacing obsolete systems can add efficiency and productivity with little or no additional expense.

For example, if you still use an on-site storage system, you may wish to explore the opportunities offered by cloud storage solutions. If you are struggling with an outdated software application, look into cost-efficient, cloud-based SaaS (Software as a Service) options.

The bottom line is that none of your expenses should be carried over without proper examination.

Category 2: Projects with IT Components

Once you have considered the must-haves, review your plans for developing and expanding your business in the upcoming year. As your business grows and changes, your IT needs will change as well. Avoid unpleasant surprises by budgeting for related expenses.

Some examples of project-related expenses to consider:

  • New licenses for additions to the staff.
  • Additional offices that may require improvements to your infrastructure.
  • Regulatory changes that may bring IT-related compliance obligations.
  • Branding campaigns, client engagement strategies, and upgrades to business efficiency platforms.

All of these rely heavily on your IT capabilities, and you will need to account for them in your IT budget.

Related: GDPR: How Does This New Regulation Affect U.S. Firms?

Category 3: IT Safeguards

The final group of expenses to include in your IT budget are the services that keep your systems secure and operational. No business is totally safe from cyberthreats, as today’s rogue actors target organizations of every size, in every industry. Schemes typically involve various forms of data theft, such as holding your data for ransom and stealing personal information for sale or use in identity theft schemes.

Related: 5 simple ways to achieve IT device security

In 2017, ransomware payments exceeded $2 billion – double the figure from 2016. Cybercrimes have grown more sophisticated, and the number and variety of schemes is difficult to measure. Fraud through business email is particularly difficult to combat, and associated costs are expected to exceed $9 billion in 2018. Protecting your company must be at the top of your priority list, and standard security software may not be enough. In today’s complex security environment, engaging an experienced IT support service may save you the costs associated with a data breach.

Building an IT Budget with Expert Assistance

Organizations that rely on a salaried IT professional often learn that a managed IT services firm offers more value per dollar when it comes to preventative maintenance, troubleshooting, and repairs. Such firms ensure real-time support on an as-needed basis, and they have an expert staff with diverse skill sets to ensure a fast solution to any IT-related issues.

If you’d like more information on managed IT services or IT support (including IT budgeting), reach out to us today.

How to Meet the New GDPR Compliance Requirements

The new General Data Protection Regulations (GDPR) went into effect May 25, 2018. These European regulations ALSO apply to US companies who collect, maintain, or process personal data for individuals living in the European Union.

The monetary fees for non-compliance can reach over €20 million (approximately $23.2 million USD), but the reputation damage incurred can cost you your entire business.

Learn how to comply with GDPR and avoid costly mistakes with these tips.

1. Know Your Data

You likely know what your business process flows are, but map them to review what data you generate. Look at the types of personal data your business collects, stores and shares. Don’t forget to review internal data like personnel information as well as customer data.

2. Determine What Data You Need

Create lists and categorize data. Look at the purpose of personal data you keep to decide what you really need. Remember, the more you have, the more you can be fined for.

3. Decide What to Keep and Delete

Is your company a data controller, data processor or both?

Data controllers are companies that decide how customer data is to be processed and the purpose of the data. Data processors are companies that process that data for the controllers. Based on how your business fits into the controller and processor roles, start weeding out unnecessary data.

Related: Keeping Your Business Secure Online

4. Choose How Long Data Must Be Kept

Now that you have a clearer picture of the personal data you need for business operation, choose a relevant time period for storage. Your customers will need to know how long you plan on keeping their data and the process for requesting copies of their data usage. You’ll also need a process for how they can request to remove their data from your system.

5. Review Who Has Data Access

If you employ a 3rd-party processor, review its privacy policies to ensure compliance. Don’t be afraid to ask for clarification on GDPR issues. When the data originates with your company, you’re responsible to whoever you grant data access.

Related: How to Manage Your Business Technology

6. Define Who You Share Data With

Your processor may not be the only entity you share data with. Now is a great time to define exactly who data can be shared with as well as why. Be sure to include this in your own privacy policies.

7. Review Security Measures

Security breaches are a major issue in GDPR compliance. Look at past and present security for all of your protected data. Make any necessary changes, address training gaps and make certain that personal data is secure in all your business process flows.

Related: GDPR: How Does This New Regulation Affect U.S. Firms?

8. Implement Safe Storage Protocols

Know where you store your data. How safe is it? If you can’t answer that, it’s time to reevaluate storage protocols. Implement awareness trainings for staff so that protected data isn’t being stored in places it shouldn’t be. Also remember to focus your time on robust security tools and strategies.

9. Update Your Privacy Policies

As previously discussed, under the GDPR, customers have the right to request records and removal of their personal data from your systems. Update all of your privacy policies to include these process requests.

Companies can no longer assume consent to policies in the absence of an action. Make policies clear that the customer must give consent. When policies are updated, customers must also accept the new policies, even if they had previously given consent.

10. Appoint a Data Protection Impact Process and Officer

Implementing a data protection impact process means non-stop management of data. It may be suitable to assign these duties to a single data protection officer or a small team of data managers to ensure that testing and data protection processes run smoothly. This person or team can also address issues quickly without the distractions of other duties.

 

Still not sure if your company falls within GDPR compliance? Let’s have a chat and explore your unique situation. With proper preparation, you can gain and maintain GDPR compliance and avoid hefty fines.

GDPR: How Does This New Regulation Affect U.S. Firms?

Remember getting a bunch of emails in May from websites changing their privacy policies? You can thank the GDPR. Enacted by the European Commission, the GDPR (General Data Protection Regulation) is a law in the European Union that seeks to give individuals more control over how organizations store and use their personal data.

The GDPR has much more significant implications for your U.S. business than a few annoying emails, however. Unfortunately, 84% of U.S. companies confess that they don’t understand what the GDPR means for their business.

In this article, we’ll discuss the impact that the GDPR is having on companies in the United States. We’ll also cover what steps you should take to address that impact.

GDPR: What It Does and Who It Affects

The goal of the GDPR is to strengthen the protections that EU citizens and residents have over their personal data. This includes any information that organizations can use to identify a unique person. We’re talking about names, physical addresses, email addresses, ID numbers, and even online identifiers such as IP addresses and cookies.

In particular, organizations must be able to justify why they are storing personal data, and delete the data when it no longer has a justifiable business purpose. Organizations must also be transparent about how they use this information in response to an inquiry.

The guiding philosophy of the GDPR is that people, not companies, have ultimate ownership and control of how their personal information is used.

One of the biggest stipulations of the GDPR—and one that far too many U.S. companies are unaware of—is the fact that it doesn’t just affect businesses in the EU. Every organization that stores the personal information of EU citizens and residents must comply with the terms of the GDPR. Or, they could face the potential penalties: fines up to 4% of annual revenue or 20 million euros, whichever is higher.

Related: 5 simple ways to achieve IT device security

Companies that refuse to comply with the GDPR will be effectively shut out of the EU market, with an estimated population of 508 million people. This makes the GDPR’s impact effectively worldwide.

Because the EU is so large, it’s a near-certainty that any company over a certain size will do business with an EU national. That’s especially true for those that operate online.

GDPR: How It Affects Your Business

The GDPR has come into effect in May 2018. Therefore, your company should already be in compliance—or at least taking steps to do so. The sooner you prove that your business is GDPR-ready, the less likely you are to face penalties and fines.

Many websites have chosen to display a notification the first time that a EU user visits the site. This window either informs visitors how their data will be used, or asks them for their explicit consent to use their data in a certain manner (such as for marketing purposes).

Once the company collects this information, they must store it securely to minimize the risk of a data breach. In the event that a cyberattack does occur, you must notify an EU regulator within 72 hours of discovering the breach.

The GDPR has undoubtedly had an impact on the operations of U.S. companies with a strong web presence. Organizations that understand the GDPR requirements and take action will be able to thrive in this new regulatory environment.

Understanding GDPR with EaseTech

Have more questions? No problem.

Talk to an expert in online data privacy and security to see how you can make your business compliant with GDPR today.